SlideShare ist ein Scribd-Unternehmen logo
1 von 24
www.mindrivergroup.com Symantec Endpoint Protection
Symantec Endpoint Protection www.mindrivergroup.com 	About Symantec Endpoint Protection Symantec Endpoint Protection protects endpoint computing devices from virus, threats, and risks, and provides three layers of protection to your endpoint computing devices. The layers are network threat protection, proactive threat protection, and antivirus and antispyware protection. 2
SEP Features Symantec Endpoint Protection provides the following features: Essential threat protection technologies are combined into a single Symantec Endpoint Protection client: Antivirus and Antispyware Protection adds rootkit detection and removal and has an improved resource footprint. Network Threat Protection provides new rules-based firewall and Generic Exploit Blocking (GEB) that blocks malware before it can enter the computer. This feature provides protection that is based on signatures and protection against buffer overflows. Proactive Threat Protection adds protection for zero-day attack threats without relying on signatures. Administrators can customize the interface to control what configuration options are available to the end user and can completely hide the interface. www.mindrivergroup.com 3
SEP Features The redesigned management console can be used to: Manage both Symantec Endpoint Protection and Symantec Network Access Control. You can manage all security technologies from a single console. Monitor and report on security threats and system response from a central point. Allow different administrators to access different levels of the management system based on their roles and responsibilities.  www.mindrivergroup.com 4
Symantec Endpoint Protection Install Symantec Endpoint Protection Manager Installing management software for the first time is divided into two parts. The first part installs Symantec Endpoint Protection Manager. The second part installs and configures the Symantec Endpoint Protection Manager database. In the first, you can accept all defaults. In the second part, you must add at least one custom value, which is a password.  	Note: Management software does not include Symantec Endpoint Protection or any other client software that is managed. www.mindrivergroup.com 5
SEP Installation Insert the installation CD and start the installation. In the installation panel, do one of the following:  If you install Symantec Endpoint Protection Manager, click Install Symantec Endpoint Protection Manager. If you install Symantec Endpoint Protection Client , click Install Symantec Endpoint Protection Client. www.mindrivergroup.com Note:To configure the Symantec Endpoint Protection Manger, IIS as to installed in the computer . . 6
SEP Installation www.mindrivergroup.com ,[object Object],7
SEP Installation In the License Agreement panel, check I accept the terms in the license agreement, and then click Next. www.mindrivergroup.com ,[object Object],8
SEP Installation Select the type of the installation , and click Next. www.mindrivergroup.com ,[object Object],9
SEP Installation Features are being  Installed to the computer . www.mindrivergroup.com 10
SEP Installation Once it complete the installation it automatically checks for the live Updates . This will help you to up to date the SEP components. www.mindrivergroup.com ,[object Object],11
SEP Options This is client status of the SEP, in this u can able to see 2 types, Antivirus & Antispyware Protection. Proactive Threat Protection www.mindrivergroup.com ,[object Object],12
SEP Configurations Antivirus & Antispyware Protection configure setting In this window you can able to configure the settings of the SEP. www.mindrivergroup.com ,[object Object],13
SEP Configurations This will enable the auto Protection in file system & Emails. www.mindrivergroup.com ,[object Object],14
SEP Configurations Proactive Threat protection Configure Settings Search for the Trojans & Worms.  Configure the notification details Tab,  Scan frequency will be default. 	Note: This tab not supported for Server, 64bit win XP & win 7 OS. And you can configure the Commercial applications. www.mindrivergroup.com 15
SEP Configurations Network threat protection Configure  setting Network setting can control the traffic, & configure the setting according to the requirement of the company.  www.mindrivergroup.com ,[object Object],16
SEP Configurations In this option you can able to browse the files, printers & also you can share the files & printers on the network. www.mindrivergroup.com ,[object Object],17
SEP Configurations www.mindrivergroup.com Centralized Exceptions Configure settings ,[object Object]
To create exception Click on add, then choose the selected item to do the exception18
SEP Configurations Client Management settings Security Notifications pop up on the Desktop, & display the icon in notification area. www.mindrivergroup.com ,[object Object]
This will Protect the SEP Software to temper with or shut down Symantec security.19
SEP Configurations Schedule the automatic Updates by setting the time & date. www.mindrivergroup.com ,[object Object],20
SEP Configurations View logs provides the information about each protection logs. www.mindrivergroup.com ,[object Object]
In each  type of logs you will get different types of logs. 21

Weitere ähnliche Inhalte

Was ist angesagt?

Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
amiable_indian
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 

Was ist angesagt? (20)

Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 
Incident response
Incident responseIncident response
Incident response
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 

Andere mochten auch

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
Symantec
 
SEP Possible Interview Questions
SEP Possible Interview QuestionsSEP Possible Interview Questions
SEP Possible Interview Questions
Greg Lehr
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
Symantec
 
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec
 

Andere mochten auch (12)

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
SEP Possible Interview Questions
SEP Possible Interview QuestionsSEP Possible Interview Questions
SEP Possible Interview Questions
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Symantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product PositioningSymantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product Positioning
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Best practices in firewall management
Best practices in firewall managementBest practices in firewall management
Best practices in firewall management
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
 
Symantec Endpoint Protection 12.1
Symantec Endpoint Protection 12.1Symantec Endpoint Protection 12.1
Symantec Endpoint Protection 12.1
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 

Ähnlich wie Symantec Endpoint Protection

Implementation guide sep12.1
Implementation guide sep12.1Implementation guide sep12.1
Implementation guide sep12.1
eduhost
 
so big ppt
so big pptso big ppt
so big ppt
cainem
 
so big
so bigso big
so big
cainem
 
so big 22
so big 22so big 22
so big 22
cainem
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
saurabh_classic
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
Saurabh Singh
 
VMS Troubleshooting Guide
VMS Troubleshooting GuideVMS Troubleshooting Guide
VMS Troubleshooting Guide
Michael Dotson
 

Ähnlich wie Symantec Endpoint Protection (20)

SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
 
Sace client guide
Sace client guideSace client guide
Sace client guide
 
spnt_5.58_gsg
spnt_5.58_gsgspnt_5.58_gsg
spnt_5.58_gsg
 
Implementation guide sep12.1
Implementation guide sep12.1Implementation guide sep12.1
Implementation guide sep12.1
 
so big ppt
so big pptso big ppt
so big ppt
 
so big
so bigso big
so big
 
Symantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management GuideSymantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management Guide
 
so big 22
so big 22so big 22
so big 22
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
 
SPI Dynamics web application security 101
SPI Dynamics web application security 101 SPI Dynamics web application security 101
SPI Dynamics web application security 101
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 
Examen
ExamenExamen
Examen
 
VMS Troubleshooting Guide
VMS Troubleshooting GuideVMS Troubleshooting Guide
VMS Troubleshooting Guide
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
 
AltiGen Max In Sight Manual
AltiGen Max In Sight  ManualAltiGen Max In Sight  Manual
AltiGen Max In Sight Manual
 
Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020
 

Mehr von MindRiver Group

Mehr von MindRiver Group (8)

ITIL
ITILITIL
ITIL
 
Microsoft Outlook 2007
Microsoft Outlook 2007Microsoft Outlook 2007
Microsoft Outlook 2007
 
Mcafee Epolicy Orchestrator
Mcafee Epolicy OrchestratorMcafee Epolicy Orchestrator
Mcafee Epolicy Orchestrator
 
MindRiver Induction Presentation
MindRiver Induction PresentationMindRiver Induction Presentation
MindRiver Induction Presentation
 
MindRiver Managed Servces
MindRiver Managed ServcesMindRiver Managed Servces
MindRiver Managed Servces
 
Windows 7
Windows 7 Windows 7
Windows 7
 
MindRiver Success Stories
MindRiver Success StoriesMindRiver Success Stories
MindRiver Success Stories
 
MindRiver Corporate Presentation
MindRiver Corporate PresentationMindRiver Corporate Presentation
MindRiver Corporate Presentation
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Symantec Endpoint Protection

  • 2. Symantec Endpoint Protection www.mindrivergroup.com About Symantec Endpoint Protection Symantec Endpoint Protection protects endpoint computing devices from virus, threats, and risks, and provides three layers of protection to your endpoint computing devices. The layers are network threat protection, proactive threat protection, and antivirus and antispyware protection. 2
  • 3. SEP Features Symantec Endpoint Protection provides the following features: Essential threat protection technologies are combined into a single Symantec Endpoint Protection client: Antivirus and Antispyware Protection adds rootkit detection and removal and has an improved resource footprint. Network Threat Protection provides new rules-based firewall and Generic Exploit Blocking (GEB) that blocks malware before it can enter the computer. This feature provides protection that is based on signatures and protection against buffer overflows. Proactive Threat Protection adds protection for zero-day attack threats without relying on signatures. Administrators can customize the interface to control what configuration options are available to the end user and can completely hide the interface. www.mindrivergroup.com 3
  • 4. SEP Features The redesigned management console can be used to: Manage both Symantec Endpoint Protection and Symantec Network Access Control. You can manage all security technologies from a single console. Monitor and report on security threats and system response from a central point. Allow different administrators to access different levels of the management system based on their roles and responsibilities. www.mindrivergroup.com 4
  • 5. Symantec Endpoint Protection Install Symantec Endpoint Protection Manager Installing management software for the first time is divided into two parts. The first part installs Symantec Endpoint Protection Manager. The second part installs and configures the Symantec Endpoint Protection Manager database. In the first, you can accept all defaults. In the second part, you must add at least one custom value, which is a password.  Note: Management software does not include Symantec Endpoint Protection or any other client software that is managed. www.mindrivergroup.com 5
  • 6. SEP Installation Insert the installation CD and start the installation. In the installation panel, do one of the following: If you install Symantec Endpoint Protection Manager, click Install Symantec Endpoint Protection Manager. If you install Symantec Endpoint Protection Client , click Install Symantec Endpoint Protection Client. www.mindrivergroup.com Note:To configure the Symantec Endpoint Protection Manger, IIS as to installed in the computer . . 6
  • 7.
  • 8.
  • 9.
  • 10. SEP Installation Features are being Installed to the computer . www.mindrivergroup.com 10
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. SEP Configurations Proactive Threat protection Configure Settings Search for the Trojans & Worms. Configure the notification details Tab, Scan frequency will be default. Note: This tab not supported for Server, 64bit win XP & win 7 OS. And you can configure the Commercial applications. www.mindrivergroup.com 15
  • 16.
  • 17.
  • 18.
  • 19. To create exception Click on add, then choose the selected item to do the exception18
  • 20.
  • 21. This will Protect the SEP Software to temper with or shut down Symantec security.19
  • 22.
  • 23.
  • 24. In each type of logs you will get different types of logs. 21
  • 25. SEP LiveUpdate Live Update search for the each protection Update form the internet, Live Update can be scheduled manually or automatically. www.mindrivergroup.com 22
  • 26.