Antivirus Administrator Guide
Antivirus Administrator Guide
Antivirus Administrator Guide
Legal Notice
Copyright 2015 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo are trademarks or registered trademarks
of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may
be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to
provide attribution to the third party (Third Party Programs). Some of the Third Party Programs
are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under those
open source or free software licenses. Please see the Third Party Legal Notice Appendix to
this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Symantec as on premises
or hosted services. Any use, modification, reproduction release, performance, display or
disclosure of the Licensed Software and Documentation by the U.S. Government shall be
solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Contents
Chapter 1
Chapter 2
Chapter 3
28
39
40
42
45
46
51
51
52
53
Chapter 4
Contents
Chapter 5
Chapter
System requirements
System requirements
You manage your Symantec Endpoint Protection Small Business Edition (SEP
SBE) cloud account through your web browser. For the computers that you use to
manage your account, you can use most Windows, Linux or Macintosh computers.
Computers running the Endpoint Protection agent require a Windows operating
system.
Cookies enabled
JavaScript enabled
SSL enabled
Table 1-1
Browser requirements
Browser
Version(s)
Mozilla Firefox
Google Chrome
Other browsers
Note: Older browsers are less stable and more vulnerable to virus, spyware,
malware, and other security issues.
Upgrading to the latest version makes your experience using SEP SBE noticeably
greater and more secure.
Disk space
Servers: 1000 MB
Table 1-2
Operating system
Edition
Service pack
(SP)
Architecture
Endpoint
Protection
Local Update
Host
Microsoft Windows 7
Enterprise
SP1
Yes
Yes
Microsoft Windows 7
Professional
SP1
Yes
Yes
Microsoft Windows 7
Ultimate
SP1
Yes
Yes
Yes
Yes
Microsoft Windows 8
Table 1-2
Operating system
Edition
Microsoft Windows 8
Microsoft Windows 8
Architecture
Endpoint
Protection
Local Update
Host
Enterprise
Yes
Yes
Pro
Yes
Yes
Yes
Yes
Enterprise
Yes
Yes
Pro
Yes
Yes
Microsoft Windows 10
Pro
Yes
Yes
Microsoft Windows 10
Enterprise
Yes
Yes
Microsoft Windows
Server 2003*
Enterprise
SP2
Yes
Yes
Microsoft Windows
Server 2003*
Standard
SP2
Yes
Yes
Microsoft Windows
Server 2003* R2
Standard
SP2
Yes
Yes
Microsoft Windows
Server 2008
Enterprise
SP2
Yes
Yes
Microsoft Windows
Server 2008
Standard
SP2
Yes
Yes
Microsoft Windows
Server 2008 R2
Datacenter
SP1
x64
Yes
Yes
Microsoft Windows
Server 2008 R2
Enterprise
SP1
x64
Yes
Yes
Microsoft Windows
Server 2008 R2
Standard
SP1
x64
Yes
Yes
Microsoft Windows
Server 2012
Datacenter
x64
Yes
Yes
Microsoft Windows
Server 2012
Standard
x64
Yes
Yes
Microsoft Windows
Server 2012 R2
Standard
x64
Yes
Yes
Table 1-2
Operating system
Edition
Service pack
(SP)
Architecture
Endpoint
Protection
Local Update
Host
Microsoft Windows
Small Business Server
2008
Standard
SP2
x64
Yes
Yes
SP2
Yes
Yes
SP2
Yes
Yes
SP2
x86
Yes
Yes
SP2
x64
Yes
Yes
SP3
x86
Yes
Yes
Yes
No
Note: * Microsoft no longer supports Window Server 2003 and Windows XP.
See Internet access requirements on page 9.
www.symantec.com
www.norton.com
liveupdate.symantecliveupdate.com
ratings-wrs.symantec.com
stats.qalabs.symantec.com
avs-avpg.crsi.symantec.com
bash-avpg.crsi.symantec.com
csasmain.symantec.com
csasalt.symantec.com
central.b6.crsi.symantec.com
central.nrsi.symantec.com
central.avsi.symantec.com
cloudconnect.norton.com
cloudconnect2.norton.com
definitions.symantec.com
ent-shasha-rrs.symantec.com
faults.qalabs.symantec.com
faults.norton.com
hb.lifecycle.norton.com
lcsitemain.symantec.com
lc1alt.symantec.com
oem.lifecycle.norton.com
o2.norton.com
pif2.symantec.com
sasmain.symantec.com
sas1alt.symantec.com
sigs.symantec.com
sitedirector.symantec.com
spoc.symantec.com
stnd-ipsg.crsi.symantec.com
shasta-ars.symantec.com
shasta-clt.symantec.com
shasta-mr-healthy.symantec.com
shasta-mr-clean.symantec.com
shasta-nco-stats.symantec.com
shasta-rrs.symantec.com
siaw.symantec.com
ssaw.symantec.com
stats.qalabs.symantec.com
10
stats.norton.com
ss.symcb.com
spoc-pool-gtm.norton.com
heartbeat.s2.spn.com
message.s2.spn.com
hostedendpoint.spn.com
ins.spn.com
https://manage.symanteccloud.com
https://activate.symanteccloud.com
http://help.elasticbeanstalk.com
Adding these URLs to your proxy whitelist allows all necessary agent
communications.
See System requirements on page 6.
11
Version
11.0.7200.1147
N/A
11.0.7300.1294
N/A
11.0.3001.2224
N/A
SEP 11 MR3
11.0.4000.2295
N/A
SEP 11 MR4
12.0.1001.95
N/A
12.0.122.192
N/A
12.1.671.4971
SEP 12.1
12.1.1000.157
12
Table 1-3
Version
12.1.1101.401
12.1.2015.2015
12.1.2100.2093
12.1.3001.165
Table 1-4
Product
Version
Norton AntiVirus
2008
2009
2010
2012
2013
2014
2008
2009
2010
2012
2013
2014
Norton 360
Table 1-5
Product
Version
McAfee
Trend Micro
Sophos
13
Table 1-5
Product
Version
Kaspersky
Windows InTune
Endpoint Protection
To assist you in removing antivirus and firewall products from your computers,
Symantec Support suggests that you review this listing of vendor-specific removal
tools.
See Uninstalling antivirus and firewall products on page 14.
14
Administrator rights are necessary to install the agent. This requirement poses no
difficulty for organizations where users are administrators on their local computer.
When an organization's security policy prohibits local admin rights for computer
users, systems management tools like Altiris can be used to push out the agents.
Note: By default, new agents are automatically confirmed into your account. If your
Account Administrator disabled Auto-confirm new agents in your organization's
settings, new agents must be confirmed before they become active.
Note: All antivirus products or firewall products must be removed from your
computers before you install Symantec Endpoint Protection.
See Removing existing antivirus and firewall products on page 11.
If you are running Windows Vista, User Account Control allows only your computer
administrator to install a program that runs for every user account. Even if you have
disabled User Account Control, administrative rights are required to install the Agent.
When you upgrade a protected computer from Windows XP to Windows Vista you
must remove the Agent and restart the computer. When the computer restarts you
can begin the upgrade to Windows Vista.
Three deployment options are available to install agents on to your computers:
These different methods can be used to fulfill the needs of varying circumstances.
Standard Install
Redistributable
installer package
15
Email invitation
Verify Do not save encrypted pages to disk is unchecked and click OK.
If you want to add the new computer to a group other than the default group,
select that group from the Choose Your Group drop-down.
Click Install.
If you want to add the new computer to a group other than the default group,
select that group from the Choose Your Group drop-down.
16
When the Package Creator dialog box opens, click Browse to identify where
to save the redistributable package.
In the Advanced section, click edit next to Operating Systems to choose the
Windows versions that you want your package to support.
In the Advanced section, click edit next to Proxy Settings to enter your
organization's proxy settings for use by the Package Creator. This step is
optional and only necessary when these settings are required for Internet
access. Click Save.
If you intend to deploy using Active Directory, check Create Active Directory
Group Policy deployment in the Advanced section.
See Installing the cloud agent using Active Directory on page 21.
10 Click Begin.
17
Description
-silent
-force
-installpath <path>
-proxyhost <host>
-proxyport <port>
-proxytype
[HTTP|SOCKS]
-proxyauthpassword
<password>
-help, -h, -?
18
If you want to add the new computer to a group other than the default group,
select that group from the Choose Your Group drop-down.
Note: All antivirus products and firewall products must be removed from your
computers before you install Symantec Endpoint Protection.
See Removing existing antivirus and firewall products on page 11.
This command-line application can be used to perform a silent install at user login
or in other network push processes. The following parameters can be passed to
the application:
Usage: SymRedistributable.exe [options]
19
Table 1-6
Command
Description
-silent
-force
-installpath <path>
-proxyhost <host>
-proxyport <port>
-proxytype
[HTTP|SOCKS]
Specifies the HTTP proxy or SOCKS proxy type, the default proxy
type is HTTP, requires -silent and -proxyhost to be present
-proxyauthuser <user>
-proxyauthpassword
<password>
-help, -h, -?
In the Protect Computer(s) page, in the Choose Your Group section, use
the drop-down to select a computer group to populate with this install package.
When the Package Creator dialog box opens, click Browse to identify where
to save the redistributable package.
20
In the Advanced section, click edit next to Operating Systems to choose the
Windows versions that you want your package to support. Click Save.
In the Advanced section, click edit next to Proxy Settings to enter your
organization's proxy settings for use by the Package Creator. This step is
optional and only necessary when these settings are required for Internet
access. Click Save.
Note: You may create a number of distribution packages to fit the needs of
your organization's different network locations.
If you intend to deploy using Active Directory, check Create Active Directory
Group Policy deployment in the Advanced section.
See Installing the cloud agent using Active Directory on page 21.
10 Click Begin.
The selected files are downloaded and then the package is created. The
redistributable package files are associated with a specific organization and
should not be used outside of that organization.
When the download is complete, click Finish.
Note: All antivirus products and firewall products must be removed from your
computers before you install SEP SBE cloud.
See Removing existing antivirus and firewall products on page 11.
Note: Administrators of the SEP SBE cloud accounts that are provisioned through
eStore, must ensure that they have adequate licenses for the number of computers
targeted in the Active Directory deployment. If you run out of licenses during your
Active Directory deployment, the installations fail for computers without licenses.
Active Directory reports a successful install, but that is a false-positive.
21
SYMRedistributable.exe
SYMGroupPolicyDeployment.msi
SYMGroupPolicyDeployment.mst
For more information about using MST files, see the Microsoft documentation for:
Windows 2003
Another Microsoft article that may be useful in preparing for an Active Directory
deployment is: How to assign software to a specific group by using Group Policy
To download a redistributable installer package for Active Directory deployment
In the Protect Computer(s) page, in the Choose Your Group section, use
the drop-down to select a computer group to populate with this install package.
When the Package Creator dialog box opens, click Browse to identify where
to save the redistributable package.
In the Advanced section, click edit next to Operating Systems to choose the
Windows versions that you want your package to support. Click Save.
In the Advanced section, click edit next to Proxy Settings to enter your
organization's proxy settings for use by the Package Creator. This step is
optional and only necessary when these settings are required for Internet
access. Click Save.
Note: You may create a number of distribution packages to fit the needs of
your organization's different network locations.
22
10 Click Begin.
11 The selected files are downloaded and then the package is created. The
redistributable package files are associated with a specific organization and
should not be used outside of that organization.
Assign a package.
Publish a package.
Note: The redistributable installer package does not support publishing a
package.
Redeploy a package.
Remove a package.
Note: The administrator must complete the removal of an installation within the
SEP SBE Management Console.
Troubleshoot.
23
The Send Invites section of the page lets you send new download invitations by
email. You can enter up to 50 semicolon delimited, email addresses.
The Deactivate Invites/History section displays when, to whom and how many
download invitations you have sent. It also enables you to revoke an invitation with
the Deactivate action. When you deactivate an invitation, the download link in the
invitation, which is normally active for 30 days, is shutdown. Download invitations
expire 30 days after issuance.
To send download invitations and view your invitation history
In the Quick Task box on your Home page, click View Invitation History.
Note: You can also view you invitation history from the Computers page.
In the Quick Task box on your Home page, click View Invitation History.
Note: You can also deactivate an email invitation from the Computers page.
24
Inform the users receiving download invitations of the importance of your endpoint
protection strategy.
Provide invited users with the proxy information necessary for a successful
installation (if necessary).
Include this procedure to minimize the number of questions you receive about
the installation.
Open your email application and look for an email from Symantec alerting
service with the subject line: Symantec.cloud agent download. Download
and open it.
Note: If you cannot find the email, check your email application's Spam folder.
Click the link in the invitation email. The file download process begins.
Note: The antivirus products and firewall products that are installed on your
computer must be removed from your computer before you install Symantec
Endpoint Protection.
See Removing existing antivirus and firewall products on page 11.
The dialog box gives you the option to Run or Save the file. Click Run.
25
When the overall progress is complete, the SEP SBE cloud components are
installed. Click Next.
When the success screen appears, uncheck the Launch Website check box
and click Finish.
10 In most cases, your SEP SBE cloud installation is automatically added to your
organization's list of protected computers.
When an agent is upgraded or re-installed, the user mappings, alerts, reports, and
other settings for the computer are saved and reassociated with the computer upon
completion of the installation. Re-installing the agent helps in resolving any existing
agent error issues.
To upgrade or re-install on multiple computers, download the redistributable installer
package and create a redistributable to save time.
To upgrade/re-install the agent on an individual computer
26
When the computer restarts, the Installer screen appears. Click Install.
If you are running the installer on a server, another restart is required after the
installation.
In the Advanced section, click edit next to Operating Systems to choose the
Windows versions that you want your package to support.
In the Advanced section, click edit next to Proxy Settings to enter your
organization's proxy settings for use by the Package Creator. This step is
optional and only necessary when these settings are required for Internet
access. Click Save.
Click Begin.
27
Chapter
Customizing Endpoint
Protection
This chapter includes the following topics:
By default all new computers are added to the Default Group and are assigned
the Endpoint Security default policy. No further configuration required.
Note: Different agents are installed for desktops & laptops than for servers. The
protection settings available for servers differ from the protection settings available
for desktops & laptops.
To create policies
On the left pane, select the Endpoint Protection service, and click Add Policy.
Table 2-1
Table 2-2
Table 2-3
Table 2-4
Set a Scan Schedule by designating the scan frequency, time to start, and
the computers to scan.
Assign the policy to the appropriate groups in the Groups section of the page.
Click Save & Apply. The policy is applied to the computers in the selected
group or groups.
29
Table 2-1
Computer Protection
Protection
Setting
Description
Antivirus
15 minutes
one hour
five hours
30
Table 2-1
Protection
Setting
Description
SONAR
Security risk
Hacking tool
Spyware
Trackware
Dialer
Remote access
Adware
Joke programs
Misleading Applications
31
Protection
Setting
Description
USB device
access
Read only access The check box allows USB device access to be restricted to
read-only access.
Web Protection defends Internet Explorer and Firefox from attack; presents website
safety ratings; and evaluates downloads from the web.
32
Table 2-3
Web Protection
Protection
Setting
Description
Browser
Protection
33
Table 2-3
Protection
Setting
Download
Intelligence
Description
34
Table 2-3
Protection
Setting
Description
Download Intelligence provides information about the reputation
of any executable file that you download from the supported
portals. The reputation details indicate whether the downloaded
file is safe to install. You can use these details to decide the action
that you want to take on the file.
Some of the supported portals are:
Opera (Browser)
Firefox (Browser)
Chrome (Browser)
AOL (Browser)
Safari (Browser)
Yahoo (Browser)
QQ (Chat)
ICQ (Chat)
Skype (Chat)
Limewire (P2P)
BitTorrent (P2P)
Thunder (P2P)
Vuze (P2P)
Bitcomet (P2P)
uTorrent (P2P)
Outlook (email)
Thunderbird (email)
The reputation levels of the file are safe, unsafe, and unknown.
You can install safe files. Norton Internet Security removes the
unsafe files. In the case of unknown files, Download Intelligence
prompts you to take a suitable action on the file. You can run the
35
Table 2-3
Protection
Setting
Description
36
Table 2-4
Network Protection
Protection
Setting
Description
Intrusion
Prevention
Intrusion Prevention scans all the network traffic that enters and X
exits your computer and compares this information against a set
of attack signatures. Attack signatures contain the information that
identifies an attacker's attempt to exploit a known operating system
or program vulnerability. Intrusion prevention protects your
computer against most common Internet attacks.
For more information about the attacks that intrusion prevention
blocks, visit:
http://www.symantec.com/business/security_response/attacksignatures
If the information matches an attack signature, intrusion prevention
automatically discards the packet and breaks the connection with
the computer that sent the data. This action protects your computer
from being affected in any way.
Intrusion prevention relies on an extensive list of attack signatures
to detect and block suspicious network activity. You should run
LiveUpdate regularly to ensure that your list of attack signatures
is up to date.
37
Table 2-4
Protection
Setting
Description
Smart Firewall
15 minutes
one hour
five hours
38
By default all new computers are added to the Default Group and are assigned
the Endpoint Security default policy. No further configuration required.
To create computer groups
Enter a Name and Description for the group in the screen. Click Save.
On the left pane, under Groups, select the group you created.
On the right side of the page, click Move Computers to add computers to the
group.
In the Move Computers screen, filter and select the computers you want to
add to the group. Click Save. The selected computers are moved out of the
Default Group (or other assigned group) into your new computer group.
To create policies
On the left pane, select the Endpoint Protection service, and click Add Policy.
Click Save & Apply. The policy is applied to the computers in the selected
group or groups.
39
Allow
The default Endpoint Protection policy setting for device control allows full access
to USB storage devices.
Block
By default, small pop-up notifications on the endpoint are disabled.
As individual events that are recorded on Computer Profile > History tab
On the Policies page, locate the Endpoint Protection policy to modify and
double-click it.
In the USB Device Control section, use the drop-down to Allow or to Block
access to USB devices.
40
The agent administrator password can now override USB device controls or
uninstall password protection on an endpoint.
This feature enables a trusted administrator to insert and use a USB device in
endpoint computers.
41
When the main Endpoint Protection page opens, click the Override USB
Device Control option in the right side menu.
Enter the administrator password into the USB Device Control password box
when it opens and click OK.
The agent Administrator password provides full access to the inserted USB
storage device until you restart the computer.
Note: The administrator's password must be entered and confirmed before the
USB device is inserted into the computer. If the USB device is inserted before
the password is entered, remove the USB device, reenter the administrator
password, then reinsert the USB device.
[COMMON_APPDATA]
[PROGRAM_FILES]
C:\Program Files
[PROGRAM_FILES_COMMON]
C:\Program Files\Common
[COMMON_PROGRAMS]
[COMMON_STARTUP]
42
Table 2-5
[COMMON_DESKTOPDIRECTORY]
[COMMON_DOCUMENTS]
[SYSTEM]
C:\Windows\System32
[WINDOWS]
C:\Windows
[drive letter]:\path\filename
[path_macro]\path\filename
[path_macro]\path to directory\
Activate the Subfolders check box to add all files and child directories to the
exclusion rule
In the SEP SBE Management Console > Policies page, click Add Policy.
43
Click Add and the exclusion appears in the Current Exclusions list.
To finish, click Save & Apply at the bottom of the policy configuration page.
In the SEP SBE Management Console > Policies page, click Add Policy.
Add the directory you want to exclude to the predefined path variable. It should
appear as:
[PROGRAM_FILES]\Directory_Path_to_file_to_be_excluded\name_of_file_to_exclude.
In actual use it might appear as [PROGRAM_FILES]\W2_v3\Word2WAV_v3.exe
Click Add and the exclusion appears in the Current Exclusions list.
To finish, click Save & Apply at the bottom of the policy configuration page.
To exclude a folder
In the SEP SBE Management Console > Policies page, click Add Policy.
If you want to exclude all subdirectories within the excluded folder, click the
Subfolders check box.
Click Add and the exclusion appears in the Current Exclusions list.
To finish, click Save & Apply at the bottom of the policy configuration page.
In the SEP SBE Management Console > Policies page, click Add Policy.
44
Add the directory you want to exclude to the predefined path variable. It should
appear as: [PROGRAM_FILES]\Directory_Path_to_folder_to_be_excluded\.
In actual use it might appear as [PROGRAM_FILES]\W2_v3\
If you want to exclude all subdirectories within the excluded folder, click the
Subfolders check box.
Click Add and the exclusion appears in the Current Exclusions list.
To finish, click Save & Apply at the bottom of the policy configuration page.
In the SEP SBE Management Console > Policies page, click Add Policy.
Using the ... drop down, you can pick from commonly used file types, or you
can enter the file extension directly without the leading period. File type
exclusions are system-wide; specifying a drive letter is unnecessary.
Note: File type exclusions must be entered singly; delimited lists of extensions
are not accepted.
To finish, click Save & Apply at the bottom of the policy configuration page.
45
Port scans
Intrusions
User can disable Firewall to allow users to disable the firewall a specified time
period
15 minutes
one hour
5 hours
The User can disable Firewall and Report Blocked Events check boxes turn a
control on or off. Firewall Rules and Program Control provide additional
configuration options.
IP addresses only
46
Connections
Computers
Communications
These rules are then applied to a group or groups of computers which represent
internal IP addresses for the firewall rule.
Connections
The first step in defining a firewall rule is to declare what should be done with a
connection meeting the criteria defined by the rule. Two actions are possible:
Allow
Block
The direction of the connection is the next element identified for the connection:
Inbound
Outbound
Inbound and
Outbound
Computers
Specify the computers to which the rule should apply:
Any computer
Any computer in
the local subnet
Choose computers The rule applies only to the computers, sites, or domains that are listed.
The options include:
47
Communications
The final step in creating a new firewall rule is to define the communications protocols
that are used for the connection. You can specify these protocols:
TCP, UDP, TCP and UDP, ICMP, ICMPv6, or All
When a protocol other than ALL is selected, communications of all types of the
selected protocol are allowed. Whenever you need to be more restrictive build a
Custom List.
A Custom List lets you build the list by:
Known Ports from
List
The rule applies to the ports that are selected using Click to view list.
Known Ports offer well-known services. Less common or proprietary
applications require that you identify the ports that are used by the
application.
Individual specified The rule applies to the ports that you enter. Delimit multiple ports with
ports
spaces.
Port Range
The rule applies to all of the ports between the lowest to highest port
number.
Enter the Port Range from lowest to highest port number.
Finally, you must identify the ports in the list as Local or Remote.
Local
Remote
48
Create a new firewall rule and save & apply the policy with the new rule.
Repeat the process and test the policy for each new rule added.
In the Connections section, set the Connection drop-down to Allow and the
Connection Type to Outbound.
In the Communications section, set the drop-down to TCP, Custom List and
Known Ports from List. Skip down to the Local/Remote drop-down and set
it to Remote.
Click Click to View List to see the list of well-known TCP ports, check 110 for
the POP 3 protocol, and then click Apply.
Note: Most modern POP mail servers use SSL/TLS security for communications
so additional rules may be necessary to make a service accessible.
10 When you are finished creating or modifying the policy, click Save & Apply at
the bottom of the policy configuration page. This action pushes out the policy
and any new or any modified firewall rules to groups using the policy.
To allow access to a specific port at a specific address
49
In the Connections section, set the Connection drop-down to Allow and the
Connection Type to Outbound.
In the Communications section, set the drop-down to TCP, Custom List and
Individual Specified Ports.
Enter the Port number: 54321, and then click >> to add the port to the
communications list.
Enter a Rule Name: Allow access to internal service from trusted, external
network.
In the Connections section, set the Connection drop-down to Allow and the
Connection Type to Inbound.
Under Communications, select TCP, Custom List, Port Range, Local, and
enter the port 6000 to 6005. Click >> to add the port to the communications
list.
When you are finished creating or modifying the policy, click Save & Apply at
the bottom of the policy configuration page. This action pushes out the policy
and any new or any modified firewall rules to groups using the policy.
50
To use the default policy with file and printer sharing enabled
From the Policies page, click Endpoint Protection > Endpoint Protection
Default Policy.
At the top of the Endpoint Protection policy configuration page, click Save a
Copy.
Change the Name and Description to identify the policy as the default policy
with file and printer sharing enabled.
Click the Enable File and printer sharing policy option so that it is green, or
active.
In the Groups portion of the policy configuration page, select the groups that
should use the modified, default policy. Click Save & Apply.
51
Note: Agents that are installed on Windows Server 2012 do not support the
management console restore of quarantined files.
To remotely scan a computer
On the Computers page, click the name of the computer you want to scan.
On the Computer Profile page > Services tab, under the Tasks menu, click
Scan Now.
On the left pane, select the group or you can select various filter options.
Based on the filters selected, the applicable computers are displayed in the
right pane.
52
Select the check box in the header to select all computers that are listed or
select specific computers individually.
Click the Quick Scan or Full Scan icon, and then click OK to confirm scan.
The scan runs silently on the remote computers.
If you do not have your serial number written down, click Subscription Details
under Endpoint Protection Small Business Edition, to retrieve it.
You must have your serial number information to both access and download
your on-premises software.
A separate window opens enabling you to both access and download your
software.
Install the downloaded software using your serial number to activate it.
53
Chapter
Without local update hosts, each of your endpoint protection computers does the
same thing, consuming your Internet bandwidth. The heavy network load can be
complicated when workers turn on their computers in the morning and agents look
to the Cloud for updates. Even when you deploy local update hosts, Endpoint
Protection computers still consume local network bandwidth to download updates
and definition files. However, the downloads consume only local network bandwidth
rather than Internet bandwidth. Your strategy for local update host placement can
mitigate heavy network loads by spreading out local update hosts by network
segment.
To successfully deploy local update hosts to your network, planning and forethought
are essential. However, there is no configuration required once you determine the
best candidates to be your local update hosts.
If the remote office is small, the potential benefit is small. However, as the number
of agents increases so do the benefits. A single local update host can support about
100 agents, 50 agents concurrently.
After considering your network topology and network utilization, you must delegate
computers to be local update hosts. Some key requirements are:
55
Symantec recommends using a dedicated server for the best performance. A local
update host reserves 1 GB for cache. This memory consumption makes a few
specific computer hardware requirements important:
On the Computers page, click on the computer name of the computer that
you want to designate as a local update host.
On the Computer Profile page, in the list of actions on the right side, click
Enable as Local Update Host.
56
As agents update Global System policy or learn of a local update host on their
network, the agent begins downloading updates from the local update host
Note: It may take up to 12 hours for agents to connect to new local update
hosts.
On the Computers page, click on the computer name of the local update host.
On the Computer Profile page, in the Local Update Host section, click the
number link next to Assigned Computers to view a listing of the assignments.
On the Computers page, click on the computer name of the local update host
that you want to decommission.
On the Computer Profile page, in the list of actions on the right side, click
Disable as Local Update Host
As other computers on the network communicate with SEP SBE cloud, the
computers either resume getting updates from the cloud or are assigned to a
new local update host on their network.
57
NT IIS 5.0 Malformed HTTP Printer Request Header buffer overflow Vulnerability
These mitigation factors protect the local update host from external attack.
Administrators must, however, be alert for possible internal threats.
See Configuring a local update host on page 56.
See About the Local Update Service on page 54.
58
Chapter
Creating alerts
On the Computers page, in the left pane, select the applicable filters. For
example: you can select a group and all computers that needs attention.
The computers matching the filter options are displayed in the list pane.
You can select all computers or only the computers you want to perform an
action on.
SEP SBE cloud then dispatches the action to all of the computers that are
connected when the action is performed.
The proxy settings that are assigned through the local agent, override global
proxy settings.
See Configuring the local agent's proxy settings on page 62.
The global policy for scheduling LiveUpdate also enables the management of agent
software updates. Whenever software updates are more than 30 days old, the
updates are delivered without regard to the global policy schedule.
Note: The LiveUpdate schedule does not affect delivery of virus definitions.
To configure a global System Policy
You can now configure proxy settings and assign local update hosts.
To configure global system proxy settings
To assign local update hosts
To configure a LiveUpdate schedule
60
Under Proxy Settings, activate the Enable Proxy check-box to configure the
proxy on your agents.
Note: The proxy type is set to HTTP by default and cannot be changed.
In the Groups section, assign the proxy settings to the groups that need them.
Note: You can assign local update hosts in the Local Update Service section.
The next procedure describes the process.
Under Local Update Service choose the correct approach for this System
Policy.
Connect to any available This option permits an agent to discover its local update
local update host(s)
host.
Do not connect to any
available local update
host(s)
When you select Specify the local update host(s) for this group, the host
selection interface opens.
Select the local update host(s) to assign for this System Policy and click Add.
All of the local update hosts maybe selected at once with Add All.
61
In the Groups section, assign the Local Update Service configuration to the
groups that need them.
Carefully consider the scheduling option that best serves your needs.
Anytime
During business
hours
During
non-business
hours
Non-business hours are after 1700 local time and before 0800
local time.
Weekends only
Disable
Under Live Update Schedule choose the correct option for LiveUpdate agent
software updates.
In the Groups section, assign the Live Update Schedule configuration to the
groups that need them.
62
The policy-controlled proxy settings that are configured within the Management
Console are applied to selected groups in your organization. Before you implement
proxy settings from the Management Console, Symantec recommends testing the
intended configuration on a number of test computers first. Incorrectly configuring
Proxy Settings in the management console risks locking out all of your cloud agents.
Fortunately, the Endpoint Protection agent interface can override an errant
configuration, but the correction requires manual intervention.
To configure proxy settings for a computer using the Endpoint Protection agent
user interface
When the user interface opens, click Settings in the banner bar.
Activate the Enable Proxy check-box in the proxy configuration portion of the
window.
When you are finished, click Apply and Close to save your configuration.
Creating alerts
You create alerts by creating rules to determine when to alert.
You set up your alerts according to:
Note: Your default email contact method is already set up using the email address
that is associated with your account. You can receive alerts at another email address
or an SMS device.
63
To create an alert
Click Alert Preferences, and then expand the contact method you want to
create an alert for by clicking "+".
If you want to receive alerts at a contact method other than the ones shown,
you must first add a new contact method.
Click the Add Rule link for the contact method you want to create an alert for.
In the Rule Name box, enter a useful name for the alert rule.
Category
Endpoint Protection:
Severity
General
Detected Risks
Informational+
Informational+ delivers informational, warning, and error
messages.
Computers
Warning+
Warning+ delivers warning and error messages.
Error
This selection delivers only error alerts.
By default the rule applies to all computers. Select the Apply rule
to selected computers to create an alerting rule for specific
computers.
Click Save.
To edit an alert rule, click the name of the rule for the alert and make the changes.
64
Chapter
Finding help
This chapter includes the following topics:
Getting help with Symantec Endpoint Protection Small Business Edition cloud
Technical assistance
Customer care
Symantec sales
Table 5-1
Resource type
Resource location
Online Help
FAQ
Administrator's Guide
Technical support
Finding help
Symantec Endpoint Protection Small Business Edition videos
Table 5-1
Resource type
Resource location
Customer care
(800) 339-1136
Note: Customers of Symantec partners should contact their partner directly for
prompt assistance.
Downloading the Agent for Symantec Endpoint Protection Small Business Edition
cloud
66