SlideShare ist ein Scribd-Unternehmen logo
1 von 15
MODULE 20: INTERFACING THE
SEPM WITH PROTECTION CENTER
1
DESCRIBING PROTECTION CENTER
Protection Center lets you manage Symantec Endpoint Protection
together with other Symantec products in a single environment.
Symantec Endpoint Protection is integrated with Protection Center by
means of a series of Web services.
These Web services provide communication between the Symantec
Endpoint Protection Manager server and the Protection Center server.

2
DESCRIBING PROTECTION CENTER
Run the Symantec Endpoint Protection Manager console from
Protection Center together with other Symantec product consoles.
The Symantec Endpoint Protection Manager console in Protection
Center is almost identical to the standalone console.
The main function options that appear to the left of the console
window in the standalone version, however, appear at the top in
Protection Center.

3
DESCRIBING PROTECTION CENTER
Run the reports that contain data from Symantec Endpoint Protection
and from other products, such as Symantec Messaging Gateway.
The data feed Web services define the Symantec Endpoint Protection
data that is written to the Protection Center database.

4
DESCRIBING PROTECTION CENTER
Initiate the Protection Center workflows that include Symantec
Endpoint Protection tasks.
Protection Center provides the following Symantec Endpoint Protection
workflows:
■ Quarantine Endpoint Workflow
■ Move Endpoint Workflow
■ Update Virus Definitions on Endpoint Workflow
■ Update Virus Definitions and Scan Endpoint Workflow

5
DESCRIBING THE PROTECTION CENTER
APPLIANCE
Protection Center can be deployed as a virtual or a physical
appliance.
The appliance type that you choose depends on the number of nodes
in your network and your preferences.

6
DESCRIBING THE PROTECTION CENTER
APPLIANCE
A virtual appliance is a good option if all of the following are true:
■ You already use VMware ESX.
■ You can make sufficient hardware resources available for the
appliance in your VMware ESX environment.

7
DESCRIBING THE PROTECTION CENTER
APPLIANCE
A physical appliance is a good option if any of the following is true:
■ You want a standalone appliance.
■ You cannot make sufficient hardware resources available for the
appliance in your VMware ESX environment.

8
DESCRIBING THE PROTECTION CENTER
APPLIANCE
Protection Center can be deployed as a virtual or a physical
appliance.
To create a Protection Center virtual appliance, you create a virtual
machine and have it mount the Protection Center Appliance Creator
ISO. To create a Protection Center physical appliance, you boot your
server with the Protection Center Appliance Creator DVD.
When you create and deploy a virtual or a physical appliance, the
appliance creation process installs Windows and other required
software.

9
CONFIGURING PROTECTION CENTER
You set up Symantec Endpoint Protection in Protection Center by
performing the following tasks:
■ Add the Symantec Endpoint Protection Manager server to Protection
Center, and enable the server.
■ Create Protection Center accounts to access Symantec Endpoint
Protection and your other integrated products.
■ Map the Protection Center accounts to the appropriate accounts in
Symantec Endpoint Protection and your other integrated products.

10
CONFIGURING PROTECTION CENTER
You must set up multiple domains individually. If your Symantec
Endpoint Protection Manager includes only the default domain, you do
not need to specify any domain information in Protection Center.
Protection Center can automatically discover the Symantec Endpoint
Protection Manager servers in your network.
This network discovery is enabled in Symantec Endpoint Protection
Manager by default. If you disabled it, you can add Symantec
Endpoint Protection Manager manually.

11
CONFIGURING PROTECTION CENTER
To manage multiple Symantec Endpoint Protection domains in
Protection Center, you must add each domain to Protection Center
separately.
You must specify the domain as part of the user name, in the form
<domain_name>account_name.

12
CONFIGURING PROTECTION CENTER
When you configure Symantec Endpoint Protection Manager, you
configure ports for your entire system.
You can use the default ports, or you can specify custom ports.
When you add multiple domains in Protection Center, you must specify
these ports for each domain that you add.
The port numbers are the same, but Protection Center requires that
you provide them for each domain.

13
USING PROTECTION CENTER
Protection Center control panel options
The Protection Center control panel is the user interface of the Protection
Center appliance that is equivalent to the desktop of a Windows
computer.
The control panel lets you perform some essential configuration tasks.
Some of the tasks that you can perform through the control panel are also
available in the Protection Center interface.
For example, you can update the appliance software, change the
administrator password, and specify the appliance network settings in
both locations.

However, tasks such as activating Windows can only be performed
through the control panel.
14
USING PROTECTION CENTER
Accessing the Protection Center control panel
The Protection Center control panel is the appliance user interface that
is equivalent to the desktop of a Windows computer.
Before you can access the control panel, you need to connect a
monitor directly to the Protection Center appliance.
Alternatively, you can use a virtual console if one is provided within
your virtual environment.

15

Weitere ähnliche Inhalte

Was ist angesagt?

Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Symantec
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
webhostingguy
 
Five ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFive ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 system
Femi Baiyekusi
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 

Was ist angesagt? (20)

Prueba de Presentacion
Prueba de PresentacionPrueba de Presentacion
Prueba de Presentacion
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
spnt_5.58_gsg
spnt_5.58_gsgspnt_5.58_gsg
spnt_5.58_gsg
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
Security
SecuritySecurity
Security
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Five ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 systemFive ways to Securing and Hardening your Windows 10 system
Five ways to Securing and Hardening your Windows 10 system
 
Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide	Antivirus Monitoring Security Use Case Guide
Antivirus Monitoring Security Use Case Guide
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIM
 
Reconnaissance Security Use Case
Reconnaissance Security Use Case	Reconnaissance Security Use Case
Reconnaissance Security Use Case
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide	IDS - IPS Monitoring Security Use Case Guide
IDS - IPS Monitoring Security Use Case Guide
 
Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3?
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 

Andere mochten auch

CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 

Andere mochten auch (20)

CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
 
acit mumbai - ospf rouitng
acit mumbai - ospf rouitng acit mumbai - ospf rouitng
acit mumbai - ospf rouitng
 
Cisco CCNA Certification Exams
Cisco CCNA Certification ExamsCisco CCNA Certification Exams
Cisco CCNA Certification Exams
 
ACIT - CCNA Training - Wan Interface
ACIT - CCNA Training - Wan InterfaceACIT - CCNA Training - Wan Interface
ACIT - CCNA Training - Wan Interface
 
ACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPNACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPN
 
ACIT - CCNA Training Course Topic - Switch Stp ACIT
ACIT - CCNA Training Course Topic - Switch Stp ACITACIT - CCNA Training Course Topic - Switch Stp ACIT
ACIT - CCNA Training Course Topic - Switch Stp ACIT
 
CCNA Network Monitoring
CCNA Network MonitoringCCNA Network Monitoring
CCNA Network Monitoring
 
CCNA Broadband
CCNA BroadbandCCNA Broadband
CCNA Broadband
 
CCNA site-to-site connectivity security
CCNA  site-to-site connectivity securityCCNA  site-to-site connectivity security
CCNA site-to-site connectivity security
 
CCNA eBGP Protocol
CCNA eBGP ProtocolCCNA eBGP Protocol
CCNA eBGP Protocol
 
CCNA Quality of Services (QoS)
CCNA Quality of Services (QoS)CCNA Quality of Services (QoS)
CCNA Quality of Services (QoS)
 
ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT
ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENTACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT
ACIT Mumbai - CCNA Training Coourse- IP ADDRESS ASSIGNMENT
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 

Ähnlich wie SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center

Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
Ronni Pedersen
 
Save guard 60_ig_eng_installation, encrypt
Save guard 60_ig_eng_installation, encryptSave guard 60_ig_eng_installation, encrypt
Save guard 60_ig_eng_installation, encrypt
nilicfu
 
Exchange manage with scom
Exchange   manage with scomExchange   manage with scom
Exchange manage with scom
Gary Jackson
 

Ähnlich wie SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center (20)

Technical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a ServiceTechnical Note - ITME: Running StADOSvr.exe as a Service
Technical Note - ITME: Running StADOSvr.exe as a Service
 
Server Core Remote Management by Sander Berkouwer & Joachim Nässlander
Server Core Remote Management by Sander Berkouwer & Joachim NässlanderServer Core Remote Management by Sander Berkouwer & Joachim Nässlander
Server Core Remote Management by Sander Berkouwer & Joachim Nässlander
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
Deployment Guide for Risk_Insight 1.1
Deployment Guide for Risk_Insight 1.1Deployment Guide for Risk_Insight 1.1
Deployment Guide for Risk_Insight 1.1
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 
ArcSight Management Center 1.0 Release Notes
ArcSight Management Center 1.0 Release NotesArcSight Management Center 1.0 Release Notes
ArcSight Management Center 1.0 Release Notes
 
Ibm smart cloud entry+ for system x administrator guide
Ibm smart cloud entry+ for system x administrator guideIbm smart cloud entry+ for system x administrator guide
Ibm smart cloud entry+ for system x administrator guide
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Advanced Programming Using Visual Basic. NET
Advanced Programming Using Visual Basic. NETAdvanced Programming Using Visual Basic. NET
Advanced Programming Using Visual Basic. NET
 
Save guard 60_ig_eng_installation, encrypt
Save guard 60_ig_eng_installation, encryptSave guard 60_ig_eng_installation, encrypt
Save guard 60_ig_eng_installation, encrypt
 
ESM Installation Guide (ESM v6.9.1c)
ESM Installation Guide (ESM v6.9.1c)ESM Installation Guide (ESM v6.9.1c)
ESM Installation Guide (ESM v6.9.1c)
 
Exchange manage with scom
Exchange   manage with scomExchange   manage with scom
Exchange manage with scom
 
Actor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active DirectoryActor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active Directory
 
Introduction to OBIEE 11g
Introduction to OBIEE 11gIntroduction to OBIEE 11g
Introduction to OBIEE 11g
 
Dell EMC OpenManage Enterprise Ovierview 3.3
Dell EMC OpenManage Enterprise Ovierview 3.3Dell EMC OpenManage Enterprise Ovierview 3.3
Dell EMC OpenManage Enterprise Ovierview 3.3
 
VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual
 
Sun & VMware Desktop Training
Sun & VMware Desktop TrainingSun & VMware Desktop Training
Sun & VMware Desktop Training
 
ESM 6.9.1c Patch 3 Release Notes
ESM 6.9.1c Patch 3 Release NotesESM 6.9.1c Patch 3 Release Notes
ESM 6.9.1c Patch 3 Release Notes
 

Mehr von Dsunte Wilson

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
Dsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
Dsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
Dsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
Dsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
Dsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
Dsunte Wilson
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
Dsunte Wilson
 

Mehr von Dsunte Wilson (20)

IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center

  • 1. MODULE 20: INTERFACING THE SEPM WITH PROTECTION CENTER 1
  • 2. DESCRIBING PROTECTION CENTER Protection Center lets you manage Symantec Endpoint Protection together with other Symantec products in a single environment. Symantec Endpoint Protection is integrated with Protection Center by means of a series of Web services. These Web services provide communication between the Symantec Endpoint Protection Manager server and the Protection Center server. 2
  • 3. DESCRIBING PROTECTION CENTER Run the Symantec Endpoint Protection Manager console from Protection Center together with other Symantec product consoles. The Symantec Endpoint Protection Manager console in Protection Center is almost identical to the standalone console. The main function options that appear to the left of the console window in the standalone version, however, appear at the top in Protection Center. 3
  • 4. DESCRIBING PROTECTION CENTER Run the reports that contain data from Symantec Endpoint Protection and from other products, such as Symantec Messaging Gateway. The data feed Web services define the Symantec Endpoint Protection data that is written to the Protection Center database. 4
  • 5. DESCRIBING PROTECTION CENTER Initiate the Protection Center workflows that include Symantec Endpoint Protection tasks. Protection Center provides the following Symantec Endpoint Protection workflows: ■ Quarantine Endpoint Workflow ■ Move Endpoint Workflow ■ Update Virus Definitions on Endpoint Workflow ■ Update Virus Definitions and Scan Endpoint Workflow 5
  • 6. DESCRIBING THE PROTECTION CENTER APPLIANCE Protection Center can be deployed as a virtual or a physical appliance. The appliance type that you choose depends on the number of nodes in your network and your preferences. 6
  • 7. DESCRIBING THE PROTECTION CENTER APPLIANCE A virtual appliance is a good option if all of the following are true: ■ You already use VMware ESX. ■ You can make sufficient hardware resources available for the appliance in your VMware ESX environment. 7
  • 8. DESCRIBING THE PROTECTION CENTER APPLIANCE A physical appliance is a good option if any of the following is true: ■ You want a standalone appliance. ■ You cannot make sufficient hardware resources available for the appliance in your VMware ESX environment. 8
  • 9. DESCRIBING THE PROTECTION CENTER APPLIANCE Protection Center can be deployed as a virtual or a physical appliance. To create a Protection Center virtual appliance, you create a virtual machine and have it mount the Protection Center Appliance Creator ISO. To create a Protection Center physical appliance, you boot your server with the Protection Center Appliance Creator DVD. When you create and deploy a virtual or a physical appliance, the appliance creation process installs Windows and other required software. 9
  • 10. CONFIGURING PROTECTION CENTER You set up Symantec Endpoint Protection in Protection Center by performing the following tasks: ■ Add the Symantec Endpoint Protection Manager server to Protection Center, and enable the server. ■ Create Protection Center accounts to access Symantec Endpoint Protection and your other integrated products. ■ Map the Protection Center accounts to the appropriate accounts in Symantec Endpoint Protection and your other integrated products. 10
  • 11. CONFIGURING PROTECTION CENTER You must set up multiple domains individually. If your Symantec Endpoint Protection Manager includes only the default domain, you do not need to specify any domain information in Protection Center. Protection Center can automatically discover the Symantec Endpoint Protection Manager servers in your network. This network discovery is enabled in Symantec Endpoint Protection Manager by default. If you disabled it, you can add Symantec Endpoint Protection Manager manually. 11
  • 12. CONFIGURING PROTECTION CENTER To manage multiple Symantec Endpoint Protection domains in Protection Center, you must add each domain to Protection Center separately. You must specify the domain as part of the user name, in the form <domain_name>account_name. 12
  • 13. CONFIGURING PROTECTION CENTER When you configure Symantec Endpoint Protection Manager, you configure ports for your entire system. You can use the default ports, or you can specify custom ports. When you add multiple domains in Protection Center, you must specify these ports for each domain that you add. The port numbers are the same, but Protection Center requires that you provide them for each domain. 13
  • 14. USING PROTECTION CENTER Protection Center control panel options The Protection Center control panel is the user interface of the Protection Center appliance that is equivalent to the desktop of a Windows computer. The control panel lets you perform some essential configuration tasks. Some of the tasks that you can perform through the control panel are also available in the Protection Center interface. For example, you can update the appliance software, change the administrator password, and specify the appliance network settings in both locations. However, tasks such as activating Windows can only be performed through the control panel. 14
  • 15. USING PROTECTION CENTER Accessing the Protection Center control panel The Protection Center control panel is the appliance user interface that is equivalent to the desktop of a Windows computer. Before you can access the control panel, you need to connect a monitor directly to the Protection Center appliance. Alternatively, you can use a virtual console if one is provided within your virtual environment. 15

Hinweis der Redaktion

  1. Symantec Endpoint Protection domains are the equivalents of tenants inProtection Center. You also provide the domain name in the tenant field whenyou add a Symantec Endpoint Protection domain to Protection Center.