Enabling Or Disabling Client Submissions To Symantec Security Response - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

172
Managing Virus and Spyware Protection

Enabling or disabling client submissions to Symantec Security Response

Enabling or disabling client submissions to Symantec
Security Response
How policy features work together (continued)
Table 11-16
Policy Feature
SONAR
Browser Intrusion Prevention
Trusted Web Domain exception
See
Managing Download Insight detections"
See
Managing SONAR"
See
Managing intrusion prevention on your client computers"
Symantec Endpoint Protection Small Business Edition can protect computers by
submitting information about detections to Symantec Security Response. Symantec
Security Response uses this information to address new and changing threats.
Any data you submit improves Symantec's ability to respond to threats and
customize protection for your computers. Symantec recommends that you choose
to submit as much detection information as possible.
Interoperability Notes
SONAR has the following dependencies:
Download Protection must be installed.
Auto-Protect must be enabled.
If Auto-Protect is disabled, SONAR loses some
detection functionality and appears to
malfunction on the client. SONAR can detect
heuristic threats, however, even if
Auto-Protect is disabled.
Insight lookups must be enabled.
Without Insight lookups, SONAR can run but
cannot make detections. In some rare cases,
SONAR can make detections without Insight
lookups. If Symantec Endpoint Protection
Small Business Edition has previously cached
reputation information about particular files,
SONAR might use the cached information.
Download Protection must be installed. Download
Insight can be enabled or disabled.
Download Protection must be installed.
When you create a Trusted Web domain
exception, the exception is only applied if
Download Protection is installed.
on page 165.
on page 196.
on page 229.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents