
Including definitions, signatures, whitelists to prevent false The downloading and installation of a wide variety of content, Enhanced LiveUpdate: LiveUpdate now supports.Symantec Endpoint Protection Manager now stores all informationĪbout client computers in a SQL database (either the embedded Where legacy products stored information in the registry, Protection stores client information in a database on the management SQL database support: Symantec Endpoint.Management servers in a failover configuration.

The ability to configure redundancy, you can configure additional

Large network and need the ability to conserve bandwidthĬonsumption, you can configure additional management servers in a Failover and load balancing: If you have a.This feature is advanced and should be used only if Domains: Domains let you create additional.Policy-based settings: Policies control mostĬlient settings, and can be applied down to the location level.Each group can be divided into multiple locations, and whenĪ client is in that location, policies can be applied to that Protection expands location awareness support to the group Providers do not have to be in the group or groups that they update.
#Symantec antivirus update#
This way, they are called group update providers. Protection clients can be configured to provide signature andĬontent updates to clients in a group.
#Symantec antivirus serial#
Device and application control: Device-levelĬontrol is implemented using rule sets that block or allow accessįrom devices, such as USB, infrared, FireWire, SCSI, serial ports,Īnd parallel ports.Sometimes referred to as zero-day protection. To determine if it exhibits characteristics of threats, such as Process scanning analyzes the behavior of an application or process Scanning uses heuristics to detect unknown threats.

Proactive threat scanning: Proactive threat.More intrusion prevention technologies can automatically block it. System (IPS) is the Symantec Endpoint Protection client's second Intrusion prevention: The intrusion prevention.Information, and eliminates unwanted sources of network traffic. It detects possible hacker attacks, protects personal Internet, preventing unauthorized users from accessing the computersĪnd networks. Protection firewall provides a barrier between the computer and the Personal firewall: The Symantec Endpoint.Spyware, adware, and other files, that can put a computer or a Antivirus and antispyware: Antivirus andĪntispyware scans detect viruses and other security risks, including.Via IUware, combines technologies from previous Symantec Symantec Endpoint Protection for Macintosh and Windows, available Information here may no longer be accurate, and links may no longer be available or reliable. This content has been archived, and is no longer maintained by Indiana University.
