Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 24

Implementation guide
Table of Contents

Advertisement

24
Introducing Symantec Endpoint Protection Small Business Edition
About the types of threat protection that Symantec Endpoint Protection Small Business Edition provides
An overview of protection layers
Figure 1-1
Internet
Back doors
Application
File/process/
DoS attacks
vulnerabilities
Port scans
Back doors
Stack attacks
OS vulnerabilities
Trojans
Trojans
Worms
Worms
Network
Threat
Protection
Network Interface Card
Proactive Threat Protection
Memory / peripherals
Virus and Spyware Protection
File system
See
Components of Symantec Endpoint Protection Small Business Edition"
on page 37.
Company
Network
Insider threats
Adware
Back doors
Keyloggers
registry
Mutating threats
Retro viruses
modifications
Spyware
Spyware
Trojans
Targeted attacks
Trojans
Worms
Worms
Viruses
Zero day threats
DNS and host
file changes
Firewall
policy
Intrusion
Prevention
policy
Application and
Device Control
policy
Virus and Spyware
Protection policy
(SONAR)
Virus and Spyware
Protection policy
Endpoint

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 20032623 - Endpoint Protection Small Business Edition and is the answer not in the manual?

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents

Save PDF