Deploying Clients By Using Remote Push - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

Deploying clients by using Remote Push

Installing the Symantec Endpoint Protection Small Business Edition client
Utility or the
command. You cannot use either the Mac unzip command or
ditto
any Windows unzip application.
To deploy clients by using a Web link and email
1
On the Home page, in the Common Tasks menu, select Install protection
client to computers.
2
Select the type of deployment you want to use and then click Next.
The New Package Deployment option uses the packages that are stored on
the Symantec Endpoint Protection Manager. By default, two packages are
available. You can optionally create new packages with custom settings and
features. Existing Package Deployment lets you use the packages that have
been exported previously.
3
For a new package, select the package, the group, the installation feature set
and content options and then click Next.
The management server includes preconfigured packages.
4
Click Web Link and Email, and then click Next.
5
In the Email Recipients and Message panel, specify the email recipients and
the subject, and then click Next.
You can either specify who receives the URL by email, or copy the URL and
post it to a convenient online location. To specify multiple email recipients,
type a comma after each email address.
6
If you want to deliver the link in email, accept the default email subject and
body or edit the text, and then click Next.
7
Click Finish.
8
You or the computer users must restart the client computers.
See
Restarting client computers"
9
Confirm that the computer users received the email message and installed
the client software.
See
Viewing client inventory"
Remote Push lets you control the client installation. Remote Push pushes the
client software to the computers that you specify. Using Remote Push requires
knowledge of how to search networks to locate computers by IP address or
computer names.
See
About client deployment methods"
About client deployment methods
on page 80.
on page 266.
on page 75.
77

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents