Installation and Administration Guide SEP14
Installation and Administration Guide SEP14
Installation and Administration Guide SEP14
Protection 14 Installation
and Administration Guide
Symantec Endpoint Protection Installation and
Administration Guide
Product version 14
Documentation version: 3
Legal Notice
Copyright 2016 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo, LiveUpdate, and Norton are trademarks
or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to
provide attribution to the third party (Third Party Programs). Some of the Third Party Programs
are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under those
open source or free software licenses. Please see the Third Party Legal Notice Appendix to
this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Symantec as on premises
or hosted services. Any use, modification, reproduction release, performance, display or
disclosure of the Licensed Software and Documentation by the U.S. Government shall be
solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports
primary role is to respond to specific queries about product features and functionality.
The Technical Support group also creates content for our online Knowledge Base.
The Technical Support group works collaboratively with the other functional areas
within Symantec to answer your questions in a timely fashion. For example, the
Technical Support group works with Product Engineering and Symantec Security
Response to provide alerting services and virus definition updates.
Symantecs support offerings include the following:
A range of support options that give you the flexibility to select the right amount
of service for any size organization
Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
Upgrade assurance that delivers software upgrades
Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
Premium service offerings that include Account Management Services
For information about Symantecs support offerings, you can visit our website at
the following URL:
www.symantec.com/business/support/
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
Questions regarding product licensing or serialization
Product registration updates, such as address or name changes
General product information (features, language availability, local dealers)
Latest information about product updates and upgrades
Information about upgrade assurance and support contracts
Information about the Symantec Buying Programs
Advice about Symantec's technical support options
Nontechnical presales questions
Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
Table 1-1 The layers of protection that are integrated into Symantec Endpoint
Protection
1: Network-based protection The firewall and the intrusion prevention system Network Threat Protection:
block over 60% of malware as it travels over
Firewall
the network and before it arrives at the
Protocol-aware IPS
computer.
Virus and Spyware Protection:
This primary defense protects against drive-by
downloads, social engineering, fake antivirus Browser protection
programs, individual system vulnerabilities,
See Managing firewall protection
rootkits, botnets, and more. Stopping malware
on page 323.
before it reaches your computer is definitely
preferred to identifying a vulnerability that has See Managing intrusion prevention
already been exploited. on page 367.
Table 1-1 The layers of protection that are integrated into Symantec Endpoint
Protection (continued)
2: File-based protection This traditional signature-based antivirus Virus and Spyware Protection:
protection looks for and eradicates the malware
Antivirus engine
that has already taken up residence on a
Auto-Protect
system. Virus and Spyware Protection blocks
and removes the malware that arrives on the Bloodhound
computer by using scans. See Managing scans on client
Unfortunately, many companies leave computers on page 402.
themselves exposed through the belief that
antivirus alone keeps their systems protected.
3: Reputation-based Insight establishes information about entities, Virus and Spyware Protection:
protection such as websites, files, and IP addresses to be
Domain reputation score
used in effective security.
File reputation (Insight)
Download Insight determines the safety of files
See Managing Download Insight
and websites by using the wisdom of the
detections on page 429.
community. Sophisticated threats require
leveraging the collective wisdom of over 200
million systems to identify new and mutating
malware. Symantecs Insight gives companies
access to the largest global intelligence network
available to allow them to filter every file on the
internet based on reputation.
4: Behavioral-based SONAR looks at processes as they execute Proactive Threat Protection (Virus
protection and use malicious behaviors to indicate the and Spyware Protection policy):
presence of malware. SONAR
SONAR watches programs as they run, and See Managing SONAR on page 483.
blocks suspicious behaviors. SONAR catches
targeted and unknown threats by aggressively
monitoring file processes as they execute and
identify malicious behavior. SONAR uses
artificial intelligence, behavior signatures, and
policy lockdown to monitor nearly 1,400 file
behaviors as they execute in real time. When
SONAR is combined with Insight, this
technology is able to aggressively stop zero-day
threats without increasing false-positives.
Introduction to Symantec Endpoint Protection 31
What is Symantec Endpoint Protection?
Table 1-1 The layers of protection that are integrated into Symantec Endpoint
Protection (continued)
5: Repair and remediation When malware does get through, Power Eraser Power Eraser:
tools scrubs hard-to-remove infections and gets your
Boot to clean operating system
system back online as quickly as possible.
Power Eraser uses aggressive
Power Eraser uses aggressive remediation on
heuristics
hard-to-remove infections.
Threat-specific tools
6: Exploit mitigation Symantec Endpoint Protection mitigates attacks Generic Exploit Mitigation
on vulnerabilities in operating systems and
See Using Generic Exploit Mitigation
memory.
on page 385.
Symantec Endpoint Protection extends and enhances security with the following
additional technologies:
System Lockdown
System Lockdown lets you limit the applications that can run. System Lockdown
operates in either a whitelisting or a blacklisting mode. In either mode, System
Lockdown uses checksum and file location parameters to verify whether an
application is approved or unapproved. System Lockdown is useful for kiosks
where you want to run a single application only.
See Configuring system lockdown on page 504.
Application control
Application control monitors and controls an application's behavior.
Application control protects against unauthorized access and attack by controlling
what applications can run. Application control blocks or terminates processes,
limits file and folder access, protects the Windows registry, and controls module
and DLL loading. Application control includes predefined templates that block
application behaviors known to be malicious.
See About application control, system lockdown, and device control on page 490.
See Setting up application control on page 492.
Device control
Device control restricts and enables the access to the hardware that can be
used on the client computer. You can block and control the devices that are
connected to your systems, such as USB devices, FireWire, serial, and parallel
Introduction to Symantec Endpoint Protection 32
What is Symantec Endpoint Protection?
ports. Device control can prevent all access to a port or allow access only from
certain devices with a specific vendor ID.
See Allowing or blocking devices on client computers on page 529.
See How does Symantec Endpoint Protection enforce compliance? on page 32.
Component Description
Symantec Endpoint Symantec Endpoint Protection Manager is a management server that manages the
Protection Manager client computers that connect to your company's network.
Symantec Endpoint Protection Manager includes the following subcomponents:
The management server software provides secure communication to and from the
client computers and the console.
The console is the interface to the management server. The console software
coordinates and manages security policies, client computers, reports, logs, roles
and access, administrative functions, and security. You can also install a remote
console and use it to log on to the management server from any computer with a
network connection.
The embedded database stores security policies and events and is installed with
Symantec Endpoint Protection Manager. You can also install a SQL Server database
to use instead of the embedded database.
Symantec Endpoint The Symantec Endpoint Protection client runs on the following platforms:
Protection client
The Windows client protects computers by using virus and spyware scans, SONAR,
Download Insight, a firewall, an intrusion prevention system, and other protection
technologies. It runs on the servers, desktops, and portable computers that you
want to protect.
The Symantec Endpoint Protection Mac client protects computers by using virus
and spyware scans and an intrusion prevention system.
The Symantec Endpoint Protection Linux client protects computers by using virus
and spyware scans.
Component Description
LiveUpdate Administrator LiveUpdate Administrator downloads definitions, signatures, and other content from
an internal LiveUpdate server and distributes the updates to client computers. You can
use an internal LiveUpdate server in very large networks to reduce the load on the
Symantec Endpoint Protection Manager. You should also use the internal LiveUpdate
server if your organization runs multiple Symantec products that also use LiveUpdate
to update client computers.
You can get LiveUpdate Administrator from Download LiveUpdate Administrator (LUA).
Group Update Provider The Group Update Provider helps distribute content within the organization, particularly
(GUP) useful for groups at remote locations with minimal bandwidth. Organizations that have
a lot of clients may want to use Group Update Providers (GUPs) for Windows clients.
GUPs reduce the load on the management server and are easier to set up than an
internal LiveUpdate server.
See Using Group Update Providers to distribute content to clients on page 201.
IT Analytics server The IT Analytics tool expands upon the built-in reports in Symantec Endpoint Protection
Manager by enabling you to create custom reports and custom queries. The tool also
offloads the reporting burden from the management server to another server. IT
Analytics keeps information for a longer period of time, enforces compliance, reduces
costs, and provides summaries.
Manuals and documentation English: Product guides for all versions of Symantec Endpoint Protection
updates
Other languages:
Brazilian Portuguese
Chinese (simplified)
Chinese (traditional)
Czech
French
German
Italian
Japanese
Korean
Polish
Russian
Spanish
Includes knowledge base articles, product release details, updates and patches,
and contact options for support.
Training SymantecTV
For free online technical training.
Symantec Education Services
Access the training courses, the eLibrary, and more.
Getting up and running on Symantec Endpoint Protection for the first time
Perform the following tasks to install and protect the computers in your network
immediately:
Step 1: Plan your installation structure
Step 2: Prepare for and then install Symantec Endpoint Protection Manager
Step 3: Add groups, policies, and locations
Step 4: Change communication settings to increase performance
Step 5: Activate the product license
Step 6: Decide on a client deployment method
Step 7: Prepare the client for installation
Step 8: Deploy and install the client software
Step 9: Check that the computers are listed in the groups that you expected and
that the clients communicate with the management server
See What do I do after I install the management server? on page 63.
If you add new groups, you can use the following group structure as a basis:
Desktops
Laptops
Servers
See Importing existing groups and computers from an Active Directory or an
LDAP server on page 223.
See How you can structure groups on page 222.
See Adding a group on page 223.
2. You use locations to apply different policies and settings to computers based
on specific criteria. For example, you can apply different security policies to
the computers based on whether they are inside or outside the company
network. In general, the computers that connect to your network from outside
of your firewall need stronger security than those that are inside your firewall.
A location can allow the mobile computers that are not in the office to update
their definitions automatically from Symantec's LiveUpdate servers.
See Best Practices for Symantec Endpoint Protection Location Awareness.
See Adding a location to a group on page 260.
3. Disable inheritance for the groups or locations for which you want to use
different policies or settings.
By default, groups inherit their policies and settings from the default parent
group, My Company. If you want to assign a different policy to child groups,
or want to add a location, you must first disable inheritance. Then you can
change the policies for the child groups, or you can add a location.
See Disabling a group's inheritance on page 230.
4. For each type of policy, you can accept the default policies, or create and
modify new policies to apply to each new group or location. You must add
requirements to the default Host Integrity policy for the Host Integrity check to
have an effect on the client computer.
Increase the heartbeat interval. For fewer than 100 clients per server, increase
the heartbeat to 15-30 minutes. For 100 to 1,000 clients, increase the heartbeat
to 30-60 minutes. Larger environments might need a longer heartbeat interval.
Symantec recommends that you leave Let clients upload critical events
immediately checked.
Increase the download randomization to between one and three times the
heartbeat interval.
See Randomizing content downloads from the default management server or a
Group Update Provider on page 192.
See Configuring push mode or pull mode to update client policies and content
on page 162.
You should have administrator credentials available for each client computer
that is not part of an Active Directory domain.
See Preparing Windows and Mac computers for remote deployment
on page 108.
2. With the Client Deployment Wizard, create a client installation package with
selections from the available options, and then deploy it to your client
computers. You can only deploy to Mac or Windows computers with the Client
Deployment Wizard.
See Installing clients with Web Link and Email on page 61.
See Installing clients with Remote Push on page 59.
See Installing clients with Save Package on page 53.
See Exporting client installation packages on page 118.
Symantec recommends that you do not perform third-party installations simultaneous
to the installation of Symantec Endpoint Protection. The installation of any third-party
programs that make network- or system-level changes may cause undesirable
results when you install Symantec Endpoint Protection. If possible, restart the client
computers before you install Symantec Endpoint Protection.
Step 9: Check that the computers are listed in the groups that
you expected and that the clients communicate with the
management server
In the management console, on the Clients > Clients page:
1. Change the view to Client status to make sure that the client computers in
each group communicate with the management server.
Look at the information in the following columns:
The Name column displays a green dot for the clients that are connected
to the management server.
See Checking whether the client is connected to the management server
and is protected on page 158.
The Last Time Status Changed column displays the time that each client
last communicated with the management server.
The Restart Required column displays whether or not the client computers
need to be restarted to be protected.
See Restarting the client computers from Symantec Endpoint Protection
Manager on page 124.
Getting Started with Symantec Endpoint Protection 43
Installing Symantec Endpoint Protection Manager
The Policy Serial Number column displays the most current policy serial
number. The policy might not update for one to two heartbeats. You can
manually update the policy on the client if the policy does not update
immediately.
See Using the policy serial number to check client-server communication
on page 163.
See Manually updating policies on the client on page 302.
2. Change to the Protection technology view and ensure that the status is set
to On in the columns between and including AntiVirus Status and Tamper
Protection Status.
See Viewing the protection status of client computers on page 236.
3. On the client, check that the client is connected to a server, and check that the
policy serial number is the most current one.
See Checking the connection to the management server on the client
computer on page 719.
See Checking whether the client is connected to the management server and is
protected on page 158.
See Troubleshooting connectivity problems between Symantec Endpoint Protection
Manager and the Symantec Endpoint Protection client on page 716.
You can also start the Management Server Configuration Wizard at any time after
installation from Start > All Programs > Symantec Endpoint Protection Manager
> Symantec Endpoint Protection Manager Tools.
To configure Symantec Endpoint Protection Manager after installation
1 See Installing Symantec Endpoint Protection Manager on page 43.
2 With the Default Configuration selected, click Next.
3 Enter company name, a password for the default administrator admin, and an
email address.
Alternately, you can add details to use a specified mail server.
4 Click Send Test Email.
Symantec Endpoint Protection Manager sends password recovery information
and other important notifications to this email account, so you should not
proceed with configuration if you do not receive the email.
5 Once you verify that you receive the test email, click Next.
6 Indicate whether you want to run LiveUpdate as part of the installation. If you
run LiveUpdate as part of a new installation, content is more readily available
for the clients you deploy. Click Next
You can also add the optional Partner Information, if a partner manages your
Symantec licenses.
7 Indicate whether you want Symantec to receive anonymous data, and then
click Next to begin the database creation.
8 When the database creation completes, click Finish to complete the Symantec
Endpoint Protection Manager configuration.
The Symantec Endpoint Protection Manager console logon screen appears if
you leave the option checked to launch Symantec Endpoint Protection Manager.
Once you log on, you can begin client deployment.
See Logging on to the Symantec Endpoint Protection Manager console
on page 48.
See About choosing a database type on page 82.
Note: To provide connectivity to the database, you must install SQL Server client
tools on the server that runs Symantec Endpoint Protection Manager.
4 On this screen, you can customize the following settings, and then click Next:
Site name
Server name
Port numbers
You should contact your network administrator before you make changes
to the default Symantec Endpoint Protection Manager port configurations.
The location of the Symantec Endpoint Protection Manager server data
folder
If there is not enough available free space on the drive on which Symantec
Endpoint Protection Manager is installed, relocate the server data folder to
an alternate drive.
5 On the database selection screen, click Microsoft SQL Server database and
then click Next.
Getting Started with Symantec Endpoint Protection 47
Installing Symantec Endpoint Protection Manager with a custom configuration
7 On the Step One: Database Server Authentication screen, fill in the details
for the SQL Server to which Symantec Endpoint Protection Manager connects,
and then click Connect to database.
If the database connection is successful, the Step Two: New Database
Creation section becomes available.
8 Under Step Two: New Database Creation, fill in the details to create a new
database, and then click Next.
For questions regarding either Database Server Authentication or Database
Creation, contact your SQL Server database administrator.
9 Enter company name, a password for the default administrator admin, and an
email address.
Alternately, you can add details to use a specified mail server.
10 Click Send Test Email. Once you verify that you receive the test email, click
Next.
Symantec Endpoint Protection Manager sends password recovery information
and other important notifications to this email account, so you should not
proceed with configuration if you do not receive the email.
11 Create an encryption password, or choose to use a random password, and
then click Next.
This password is used to protect the communication between clients and
Symantec Endpoint Protection Manager, and is stored in the Symantec Endpoint
Protection Manager recovery file.
Getting Started with Symantec Endpoint Protection 48
Logging on to the Symantec Endpoint Protection Manager console
12 Indicate whether you want to run LiveUpdate as part of the installation. If you
run LiveUpdate as part of a new installation, content is more readily available
for the clients you deploy. Click Next
You can also add the optional Partner Information, if a partner manages your
Symantec licenses.
13 Indicate whether you want Symantec to receive anonymous data, and then
click Next to begin the database creation.
14 After the database is created and initialized (which may take several minutes),
click Finish.
The Symantec Endpoint Protection Manager console logon screen appears if
you leave the option checked to launch Symantec Endpoint Protection Manager.
Once you log on, you can begin client deployment.
See Logging on to the Symantec Endpoint Protection Manager console
on page 48.
See About choosing a database type on page 82.
Note: For Windows Server 2016, use the host name of the computer on which
the management server is installed.
When you log on remotely, you can perform the same tasks as administrators
who log on locally. What you can view and do from the console depends on the
type of administrator you are. Most administrators in smaller organizations log
on as a system administrator.
Getting Started with Symantec Endpoint Protection 49
Logging on to the Symantec Endpoint Protection Manager console
Note: If you installed the remote Java console with an earlier version of the
product, you must reinstall it when you upgrade to a later version.
You can also access the reporting functions from a standalone web browser that
is connected to your management server.
See Logging on to reporting from a standalone web browser on page 594.
For security, the console logs you out after a maximum of one hour. You can
decrease this period of time. In version 12.1.4 and earlier, you can disable the
timeout period.
See Changing the time period for staying logged on to the console on page 295.
To log on to the console locally
1 Go to Start > Programs > Symantec Endpoint Protection Manager >
Symantec Endpoint Protection Manager.
2 In the Symantec Endpoint Protection Manager logon dialog box, type the
user name (admin by default) and the password that you configured during the
installation.
If the console has more than one domain, click Options and type the domain
name.
3 Optionally check Remember my user name, Remember my password or
both, if available, and then click Log On.
See Displaying the Forgot your password? link so that administrators can reset
lost passwords on page 289.
Getting Started with Symantec Endpoint Protection 50
Logging on to the Symantec Endpoint Protection Manager console
You can start the License Activation Wizard in the following ways:
The Getting Started screen that appears after you install the product.
You can also access the Getting Started screen through Help > Getting Started
Page.
The Admin page of the Symantec Endpoint Protection Manager console.
If you activate or import your license from the Getting Started screen, you can skip
to step 3.
To activate or import your Symantec Endpoint Protection product license
1 In Symantec Endpoint Protection Manager, click Admin > Licenses.
2 Under Tasks, click Activate license.
3 Click Activate a new license, and then click Next. If you do not see this panel,
continue to the next step.
4 On the License Activation panel, select the option that matches your situation,
and then click Next.
The following table describes each option:
Option Description
I have a serial number You may receive a license serial number when you or
your Symantec Partner purchased the license. If you
have a license serial number, select this option.
I have a Symantec License In most cases, you receive a Symantec license file (.slf
File (.slf) file) in an email from Symantec shortly after you
complete the purchase process. The file arrives attached
to the notification email as a .zip file. If you have
received a .slf file, select this option.
Note: You must extract the .slf file from the .zip file
before you can use it to activate your product license.
5 Do one of the following tasks based on the selection that you made in the
previous step:
If you selected I have a serial number, enter the serial number, and then
click Submit. Review the information about the license you added, and
then click Next.
Note: To activate a license with a serial number, you must have an active
internet connection and be able to reach the Symantec Licensing Server.
If the connection succeeds, the Symantec home page loads. If the
connection fails, see the following:
How to test connectivity with Insight and Symantec Licensing servers
If you selected I have a Symantec License File (.slf), click Add File.
Browse to and select the .slf file you extracted from the .zip file that came
with your Symantec notification email. Click Open, and then click Next.
6 Enter information about your technical contacts and primary contacts, and
about your company. Click to acknowledge the disclosure statement, and then
click Submit.
If you provided this information when you purchased your license, this panel
does not display.
7 Click Finish.
See About the trial license on page 94.
See About renewing your Symantec Endpoint Protection license on page 98.
See About purchasing licenses on page 95.
See Licensing Symantec Endpoint Protection on page 92.
You save the installation package to a folder on the computer that runs Symantec
Endpoint Protection Manager.
For Windows, the installation package can be for 32- or 64-bit operating systems.
The installation package comprises one setup.exe file or a collection of files that
includes a setup.exe file. Computer users often find one setup.exe file easier
to use.
Note: The Mac and Linux client install packages automatically export a .zip archive
file format. To correctly preserve the file permissions, you should expand the archive
file with a native archive program, such as the Mac Archive Utility or the ditto
command. You cannot use the Mac unzip command, a third-party application, or
any Windows application to expand the files for these operating systems.
3 Make selections from the available options, which vary depending on the
installation package type, and then click Next.
Note: To uninstall existing security software on the Windows client, you must
configure custom Client Install Settings before launching the Client Deployment
Wizard.
See Configuring client packages to uninstall existing security software
on page 121.
Note: Use Single .exe file unless you require separate files for a third-party
deployment program.
6 Click Next.
7 Review the settings summary, click Next, and then click Finish.
8 Provide the exported package to the computer users.
Provide the exported package to the users in the following ways: email, save
the package to a secure shared network location, or use a third-party program.
9 Confirm that the user downloads and installs the client software, and confirm
the installation status of the clients.
For new Symantec Endpoint Protection installations, the client computers may
not appear within Symantec Endpoint Protection Manager until after they restart,
either automatically or by action you or the user takes. Mac clients automatically
prompt a restart when installation completes. Linux clients do not require a
restart.
See Restarting the client computers from Symantec Endpoint Protection
Manager on page 124.
See Running a report on the deployment status of clients on page 591.
See Deciding which features to install on the client on page 116.
See Choosing a method to install the client using the Client Deployment Wizard
on page 115.
See Preparing for client installation on page 105.
client at any time by importing client-server communication settings into the Mac
client.
Note: To prepare the Symantec Endpoint Protection client for Mac for use with
third-party remote deployment software, see Exporting and Deploying a Symantec
Endpoint Protection client via Apple Remote Desktop or Casper.
Note: The resulting virtual disk image or folder contains the application installer and
a folder called Additional Resources. Both items must be present in the same
location for a successful installation. If you copy the installer to another location,
you must also copy Additional Resources.
Note: You must have superuser privileges to install the Symantec Endpoint
Protection client on the Linux computer. The procedure uses sudo to demonstrate
this elevation of privilege.
Getting Started with Symantec Endpoint Protection 58
Installing clients with Save Package
Where directory is the name of the directory into which you copied the .zip file.
4 Extract the contents of the .zip file into a directory named tmp with the following
command:
unzip "InstallPackage" -d sepfiles
Where InstallPackage is the full name of the .zip file, and sepfiles represents
a destination folder into which the extraction process places the installation
files.
If the destination folder does not exist, the extraction process creates it.
5 Navigate to sepfiles with the following command:
cd sepfiles
6 To correctly set the execute file permissions on install.sh, use the following
command:
chmod u+x install.sh
7 Use the built-in script to install Symantec Endpoint Protection with the following
command:
sudo ./install.sh -i
The installation completes when the command prompt returns. You do not
have to restart the computer to complete the installation.
To verify the client installation, click or right-click the Symantec Endpoint Protection
yellow shield and then click Open Symantec Endpoint Protection. The location
of the yellow shield varies by Linux version. The client user interface displays
Getting Started with Symantec Endpoint Protection 59
Installing clients with Remote Push
information about program version, virus definitions, server connection status, and
management.
See Importing client-server communication settings into the Linux client
on page 169.
See Preparing for client installation on page 105.
Note: To push the client installation package to Mac clients in the Browse
Network tab, you must install the Bonjour service on the Symantec Endpoint
Protection Manager server. See the following article:
Installing the Bonjour Service for Symantec Endpoint Protection Manager 12.1.5
or later
Note: You cannot install the Linux client with Remote Push.
Getting Started with Symantec Endpoint Protection 60
Installing clients with Remote Push
Note: To uninstall existing security software on the Windows client, you must
configure custom Client Install Settings before you launch the Client Deployment
Wizard. You can also use an existing client install package that is configured
to enable this function.
See Configuring client packages to uninstall existing security software
on page 121.
You can set a timeout value to constrain the amount of time that the server
applies to a search.
6 Click > > to add the computers to the list, and authenticate with the domain or
workgroup if the wizard prompts you.
The remote push installation requires elevated privileges. If the client computer
is part of an Active Directory domain, you should use a domain administrator
account.
7 Click Next, and then click Send to push the client software to the selected
computers.
Once the Deployment Summary panel indicates a successful deployment,
the installation starts automatically on the client computers.
The installation takes several minutes to complete.
8 Click Next, and then click Finish.
9 Confirm the status of the installed clients on the Clients page.
For new Symantec Endpoint Protection installations, the client computers may
not appear within Symantec Endpoint Protection Manager until after they restart,
either automatically or by action you or the user takes.
See Restarting the client computers from Symantec Endpoint Protection
Manager on page 124.
See Running a report on the deployment status of clients on page 591.
See Preparing for client installation on page 105.
See Preparing Windows and Mac computers for remote deployment on page 108.
See Deciding which features to install on the client on page 116.
See Choosing a method to install the client using the Client Deployment Wizard
on page 115.
You choose from the options that appear for the configuration of Windows, Mac,
and Linux client installation packages. All client installation packages are stored
on the computer that runs Symantec Endpoint Protection Manager.
Email from Symantec Endpoint Protection Manager notifies the computer users
that they can download the client installation package.
You provide a list of users to receive an email message, which contains
instructions to download and install the client installation package. Users follow
the instructions to install the client software.
Note: The Mac and the Linux client install packages automatically export a .zip
archive file format. To correctly preserve the file permissions, you should expand
the archive file with a native archive program, such as the Mac Archive Utility
or the ditto command. You cannot use the Mac unzip command, a third-party
application, or any Windows application to expand the files for these operating
systems.
Before you use Web Link and Email, make sure that you correctly configure the
connection from the management server to the mail server.
See Establishing communication between the management server and email
servers on page 618.
To install clients with Web Link and Email
1 In the console, on the Home page, launch the Client Deployment Wizard.
Click Help > Getting Started Page and then under Required tasks, click
Install the client software on your computers.
2 In the Client Deployment Wizard, click New Package Deployment, and then
click Next. Web Link and Email only sends a new installation package.
3 Make selections from the available options, which vary depending on the
installation package type, and then click Next.
Note: To uninstall existing security software on the Windows client, you must
configure custom Client Install Settings before launching the Client Deployment
Wizard.
See Configuring client packages to uninstall existing security software
on page 121.
5 In the Email Recipients and Message panel, specify the email recipients and
the subject.
To specify multiple email recipients, type a comma after each email address.
A management console system administrator automatically receives a copy
of the message.
You can accept the default email subject and body, or edit the text. You can
also copy the URL and post it to a convenient and secure online location, like
an intranet page.
6 To create the package and deliver the link by email, click Next, and then click
Finish.
7 Confirm that the computer users received the email message and installed the
client software.
Client computers may not appear within Symantec Endpoint Protection Manager
until after they restart, either automatically or by action you or the user takes.
Mac clients automatically prompt a restart when installation completes. Linux
clients do not require a restart.
See Restarting the client computers from Symantec Endpoint Protection
Manager on page 124.
See Running a report on the deployment status of clients on page 591.
See Deciding which features to install on the client on page 116.
See Choosing a method to install the client using the Client Deployment Wizard
on page 115.
See Preparing for client installation on page 105.
Action Description
Modify the Virus and Spyware Change the following default scan settings:
Protection policy
If you create a group for servers, change the scheduled scan time to a time when
most users are offline.
See Setting up scheduled scans that run on Windows computers on page 419.
Enable Risk Tracer in Auto-Protect.
For more information, see the article: What is Risk Tracer?
Risk Tracer has the following prerequisites:
Network Threat Protection is enabled.
See Running commands on client computers from the console on page 244.
Windows File and Printer Sharing is enabled.
See Customizing Auto-Protect for Windows clients on page 455.
Modify the Firewall policy for Increase the security for remote computers by making sure that the following default
the remote computers group firewall rules for an off-site location are enabled:
and the servers group Block Local File Sharing to external computers
Block Remote Administration
Decrease the security for the servers group by making sure that the following firewall
rule is enabled: Allow Local File Sharing to local computers. This firewall rule
ensures that only local traffic is allowed.
Table 2-1 Tasks to perform two weeks after you install (continued)
Action Description
Exclude applications and files You can increase performance by configuring the client not to scan certain folders and
from being scanned files. For example, the client scans the mail server directory every time a scheduled
scan runs. You should exclude mail server program files and directories from being
scanned.
For more information, see the article: About the automatic exclusion of files and folders
for Microsoft Exchange server and Symantec products.
You can improve performance by excluding the folders and files that are known to
cause problems if they are scanned. For example, Symantec Endpoint Protection
should not scan the proprietary Microsoft SQL Server files. You should add an exception
that prevents scanning of the folders that contain the SQL Server database files. These
exceptions improve performance and avoid corruption or files being locked when SQL
Server must use them.
For more information, see the knowledge base article: How to exclude MS SQL files
and folders using Centralized Exceptions.
You can also exclude files by extension for Auto-Protect scans on Windows computers.
See Creating exceptions for Virus and Spyware scans on page 537.
Run a quick report and Run the quick reports and scheduled reports to see whether the client computers have
scheduled report after the the correct level of security.
scheduled scan
See About the types of reports on page 595.
Check to ensure that Review monitors, logs, and the status of client computers to make sure that you have
scheduled scans have been the correct level of protection for each group.
successful and clients operate
See Monitoring endpoint protection on page 584.
as expected
Getting Started with Symantec Endpoint Protection 66
What do I do after I install the management server?
Table 2-1 Tasks to perform two weeks after you install (continued)
Action Description
Assess your content storage As of 12.1.5, Symantec Endpoint Protection Manager no longer stores multiple full
and client communication content versions. Instead, only the latest full version plus incremental deltas are stored.
bandwidth requirements This approach means that clients almost always download deltas, not full packages.
Only in the rare case where a client is extremely out of date (more than three months),
is a full download of the latest content required.
If your environment must control network bandwidth precisely, you can also throttle
client communication. For more information, see the article: Symantec Endpoint
Protection Bandwidth Control for Client Communication
See How to update content and definitions on the clients on page 172.
For more information about calculating storage and bandwidth needs, see the Symantec
Endpoint Protection Sizing and Scalability Best Practices White Paper.
Configure notifications for a Create a notification for a Single risk event and modify the notification for Risk
single risk outbreak and when Outbreak.
a new risk is detected
For these notifications, Symantec recommends that you do the following actions:
1 Change the Risk severity to Category 1 (Very Low and above) to avoid receiving
emails about tracking cookies.
Notifications are critical to maintaining a secure environment and can also save you
time.
See Getting up and running on Symantec Endpoint Protection for the first time
on page 36.
See: Symantec Endpoint Protection Recommended Best Practices for Securing an
Enterprise Environment
Section 1
Installing Symantec Endpoint
Protection
Component Requirements
Web browser The following browsers are supported for web console access to Symantec Endpoint
Protection Manager and for viewing the Symantec Endpoint Protection Manager Help:
Microsoft Edge
Note: The 32-bit version Windows 10 does not support web console access on the
Edge browser.
Microsoft Internet Explorer 11
Mozilla Firefox 5.x through 50.x
Google Chrome 55.0.x
Planning the installation 70
System requirements for Symantec Endpoint Protection
Component Requirements
Database The Symantec Endpoint Protection Manager includes an embedded database. You may
instead choose to use a database from one of the following versions of Microsoft SQL
Server:
Component Requirements
Hard drive when installing With an embedded database or a local SQL Server database:
to the system drive
40 GB available minimum (200 GB recommended) for the management server and
database
With a remote SQL Server database:
Component Requirements
Hard drive when installing With an embedded database or a local SQL Server database:
to an alternate drive
The system drive requires 15 GB available minimum (100 GB recommended)
The installation drive requires 25 GB available minimum (100 GB recommended)
With a remote SQL Server database:
Note: If you use a SQL Server database, you may need to make more disk space
available. The amount and location of additional space depends on which drive
SQL Server uses, database maintenance requirements, and other database settings.
Component Requirements
See Symantec Endpoint Protection client for Windows Embedded system requirements
on page 74.
Planning the installation 72
System requirements for Symantec Endpoint Protection
Table 3-3 Symantec Endpoint Protection client for Windows software system
requirements (continued)
Component Requirements
Operating system (server) Windows Server 2008 (32-bit, 64-bit; R2, SP1, and SP2)
Windows Small Business Server 2008 (64-bit)
Windows Essential Business Server 2008 (64-bit)
Windows Small Business Server 2011 (64-bit)
Windows Server 2012
Windows Server 2012 R2
Windows Server 2012 R2 update for April 2014
Windows Server 2012 R2 update for August 2014
Windows Server 2016
Table 3-4 Symantec Endpoint Protection client for Windows hardware system
requirements
Component Requirements
Processor 32-bit processor: 1 GHz Intel Pentium III or equivalent minimum (Intel Pentium 4 or
equivalent recommended)
64-bit processor: 2 GHz Pentium 4 with x86-64 support or equivalent minimum
Note: Itanium processors are not supported.
Hard drive Disk space requirements depend on the type of client you install, which drive you install
to, and where the program data file resides. The program data folder is usually on the
system drive in the default location C:\ProgramData.
Available disk space is always required on the system drive, regardless of which installation
drive you choose.
Hard drive system requirements:
Table 3-5 describes the hard drive system requirements when Symantec Endpoint
Protection is installed to the system drive.
Table 3-6 describes the hard drive system requirements when Symantec Endpoint
Protection is installed to an alternate drive.
Note: Space requirements are based on NTFS file systems. Additional space is also
required for content updates and logs.
Planning the installation 73
System requirements for Symantec Endpoint Protection
Table 3-5 Symantec Endpoint Protection client for Windows available hard
drive system requirements when installed to the system drive
Standard With the program data folder located on the system drive:
395 MB*
With the program data folder located on an alternate drive:
Embedded / VDI With the program data folder located on the system drive:
245 MB*
With the program data folder located on an alternate drive:
Dark network With the program data folder located on the system drive:
545 MB*
With the program data folder located on an alternate drive:
Table 3-6 Symantec Endpoint Protection client for Windows available hard
drive system requirements when installed to an alternate drive
Standard With the program data folder located on the system drive:
System drive: 30 MB
Program data drive: 350 MB
Alternate installation drive: 150 MB
Planning the installation 74
System requirements for Symantec Endpoint Protection
Table 3-6 Symantec Endpoint Protection client for Windows available hard
drive system requirements when installed to an alternate drive
(continued)
Embedded / VDI With the program data folder located on the system drive:
System drive: 30 MB
Program data drive: 200 MB
Alternate installation drive: 150 MB
Dark network With the program data folder located on the system drive:
System drive: 30 MB
Program data drive: 500 MB
Alternate installation drive: 150 MB
Component Requirements
Table 3-7 Symantec Endpoint Protection client for Windows Embedded system
requirements (continued)
Component Requirements
Hard drive The Symantec Endpoint Protection Embedded / VDI client requires the following available
hard disk space:
These figures assume that the program data folder is on the system drive. For more
detailed information, or for the requirements of the other client types, see the Symantec
Endpoint Protection client for Windows system requirements.
See Symantec Endpoint Protection client for Windows system requirements on page 71.
The Enhanced Write Filter (EWF) and the Unified Write Filter (UWF) are not supported.
The recommended write filter is the File Based Write Filter (FBWF) installed along with
the Registry Filter.
Component Requirements
Hard drive 500 MB of available hard disk space for the installation
Component Requirements
For a list of supported operating system kernels, see Supported Linux kernels for Symantec
Endpoint Protection.
Graphical desktop You can use the following graphical desktop environments to view the Symantec Endpoint
environments Protection for Linux client:
KDE
Gnome
Unity
Planning the installation 77
System requirements for Symantec Endpoint Protection
Table 3-9 Symantec Endpoint Protection client for Linux system requirements
(continued)
Component Requirements
Internationalization requirements
Certain restrictions apply when you install Symantec Endpoint Protection Manager
in a non-English or mixed-language environment.
Component Requirements
Computer names, Non-English characters are supported with the following limitations:
server names, and
Network audit may not work for a host or user that uses a double-byte character set or a
workgroup names
high-ASCII character set.
Double-byte character set names or high-ASCII character set names may not appear
properly on the Symantec Endpoint Protection Manager console or on the client user
interface.
A long double-byte or high-ASCII character set host name cannot be longer than what
NetBIOS allows. If the host name is longer than what NetBIOS allows, the Home, Monitors,
and Reports pages do not appear on the Symantec Endpoint Protection Manager console.
Planning the installation 78
Product license requirements
Component Requirements
User Information client Do not use double-byte or high-ASCII characters when you provide feedback in the User
computer dialog box Information client computer dialog box after you install the exported package.
See Activating or importing your Symantec Endpoint Protection product license on page 51.
For the most current system requirements, see: Release notes, new fixes, and
system requirements for all versions of Endpoint Protection
Product Requirement
Paid license installation of Symantec Endpoint Protection accepts the license file
Symantec Endpoint Protection 12.1 from your previous Symantec virus protection software.
You must purchase a new license when the previous
license expires.
Serial number A license contains a serial number that uniquely identifies your
license and associates the license with your company. The serial
number can be used to activate your Symantec Endpoint Protection
license.
Deployed Deployed refers to the endpoint computers that are under the
protection of the Symantec Endpoint Protection client software. For
example, "We have 50 deployed seats" means that 50 endpoints
have client software installed on them.
Portable computers may not connect to the network on a regular schedule. You
may want to make sure that portable computers have a LiveUpdate policy that
enables a LiveUpdate schedule. Any portable computers that do not check in
regularly do not get other policy updates.
Computers that are located in secure areas
Computers that are located in secure areas may need different security settings
from the computers that are not located in secure areas.
You identify the computers on which you plan to install the client. Symantec
recommends that you install the client software on all unprotected computers,
including the computer that runs Symantec Endpoint Protection Manager.
See Getting up and running on Symantec Endpoint Protection for the first time
on page 36.
SQL Server database If you choose to use this option, you must install SQL Server
and SQL Server Native Client before you install Symantec
Endpoint Protection Manager. For optimal compatibility, you
install the version of SQL Server Native Client equal to your
version of SQL Server.
Site Name My Site (default) The name of the site as it appears in Symantec Endpoint
Protection Manager. Site name is the highest level container
Site local host name (custom)
under which all features are configured and run within
Symantec Endpoint Protection Manager.
Planning the installation 84
About basic management server settings
Server name local host name The name of the computer that runs Symantec Endpoint
Protection Manager.
Server data folder C:\Program Files The directory in which the Symantec Endpoint Protection
(x86)\Symantec\Symantec Manager places data files including backups, replicated
Endpoint Protection logs, and other files. The installer creates this directory if it
Manager\data (64-bit operating does not exist.
system)
User name admin The name of the default user that is used to log on to the
Symantec Endpoint Protection Manager console for the first
time. This value is not configurable.
Password None The password that is specified for the admin account during
server configuration.
Email address None System notifications are sent to the email address specified.
Planning the installation 85
Management server ports
Server port 8443 Symantec Endpoint Protection Manager listens on this port.
Web console port 9090 Remote HTTP console connections use this port.
Client communications 8014 The clients communicate with the management server on this port.
port
Remote management 8446 Remote Monitoring and Management (RMM) uses this port to send Web services
Web services port traffic over HTTPS.
Server control port 8765 The Tomcat Web service uses this port.
Reporting port 8445 The Apache Web service uses this port for reporting.
Process launcher port 8447 The process launcher service uses this port to start those processes that require
higher privileges on the management server.
Instance name Do not use the default instance name. Create a name such as
SEPM.
sa password Set this password when you set Mixed Mode authentication.
TCP/IP port numbers for Set TCP Dynamic Ports to blank, and specify a TCP port
IP1, IP2, and IPALL number. The default port is typically 1433. You specify this port
number when you create the database.
If your database is located on a remote server, you must also install SQL Server
client components on the computer that runs Symantec Endpoint Protection
Manager. SQL Server client components include BCP.EXE. The version number of
the SQL Server client components should be the same as the version number of
SQL Server that you use. Refer to your SQL Server documentation for installation
instructions.
During the Symantec Endpoint Protection Manager database configuration phase
of the installation, you select and enter various database values. Understand the
decisions you must make to correctly configure the database.
Table 3-16 displays the settings that you might need to know before you begin the
installation process.
Planning the installation 87
About SQL Server configuration settings
Server name local host name Name of the computer that runs Symantec Endpoint
Protection Manager.
Server data folder C:\Program Files Folder in which the Symantec Endpoint Protection Manager
(x86)\Symantec Endpoint places data files including backups, replication, and other
Protection Manager\data Symantec Endpoint Protection Manager files. The installer
creates this folder if it does not exist.
Database server local host name Name of the computer where SQL Server is installed, and
the optional instance name. If the database server was
installed with the default instance, which is no name, type
either host name or the host's IP address. If the database
server was installed with a named instance, type either host
name\instance_name or IP address\instance_name. The
use of host name only works with properly configured DNS.
SQL Server Port 1433 The port that is used to send and receive traffic to the SQL
Server.
Database user name sem5 Name of the database user account that is created. The
user account has a standard role with read and write access.
The name can be a combination of alphanumeric values
and the special characters ~ # % _ + = | : .. The
special characters ` ! @ ' $ ^ & * ( ) - { } [ ]
" \ / < ; > , ? are not allowed. The following names
are also not allowed: sysadmin, server admin, setupadmin,
securityadmin, processadmin, dbcreator, diskadmin,
bulkadmin.
Database password None The password that is associated with the database user
account. The name can be a combination of alphanumeric
values and the special characters ~ # % _ + = | : .
/. The special characters ! @ * ( ) { } [ ] ; , ?
are not allowed.
SQL Server client SQL Server 2008: Install Location of the local SQL Client Utility directory that contains
folder directory\100\Tools\Binn bcp.exe.
SQL Server 2012: Install The installation paths that are shown represent the default
directory\110\Tools\Binn paths for Microsoft SQL Server. Install directory represents
the installation drive and directory for Microsoft SQL Server.
SQL Server 2014 / 2016:
Install
directory\Client
SDK\ODBC\110\Tools\Binn
Server user name None Name of the database server administrator account, which
is typically sa.
Server password None The password that is associated with the database server
administrator account, which is typically sa.
Planning the installation 89
About SQL Server database authentication modes
Database data folder Automatically detected after you Location of the SQL Server data folder. If you install to a
click Default. remote server, the volume identifier must match the identifier
on the remote server.
SQL Server 2008: Install
directory\ The installation paths shown represent the default paths for
MSSQL10.MSSQLSERVER\ Microsoft SQL Server.
MSSQL\Data If you install to a named instance on SQL Server 2008,
SQL Server 2008 R2: Install the instance name is appended to MSSQL10. For
directory\ example, \MSSQL10.instance name\MSSQL\Data
MSSQL10_50.MSSQLSERVER\ If you install to a named instance on SQL Server 2008
MSSQL\Data R2, the instance name is appended to MSSQL10_50.
For example, \MSSQL10_50.instance
SQL Server 2012: Install
name\MSSQL\Data
directory\
If you install to a named instance on SQL Server 2012,
MSSQL11.MSSQLSERVER\
the instance name is appended to MSSQL11. For
MSSQL\Data example, \MSSQL11.instance name\MSSQL\Data
SQL Server 2014: Install If you install to a named instance on SQL Server 2014,
directory\ the instance name is appended to MSSQL12. For
MSSQL12.MSSQLSERVER\ example, \MSSQL12.instance name\MSSQL\Data
MSSQL\Data If you install to a named instance on SQL Server 2016,
the instance name is appended to MSSQL13. For
SQL Server 2016: Install
example, \MSSQL13.instance name\MSSQL\Data
directory\
MSSQL13.MSSQLSERVER\ Note: Clicking Default displays the correct installation folder
MSSQL\Data if you entered the database server and instance name
correctly. If you click Default and the correct installation
folder does not appear, your database creation fails.
mixed mode authentication. When SQL Server is set to use Windows Authentication
mode, Symantec Endpoint Protection Manager must also be configured to use
Windows Authentication mode.
For the remote database connections that use the Windows Authentication mode,
be aware of the following requirements:
For deployments in an Active Directory environment, Symantec Endpoint
Protection Manager and SQL Server must be located in the same Windows
domain.
For deployments in a Workgroup environment, the Windows account credentials
must be the same for the local computers and the remote computers.
See About SQL Server configuration settings on page 85.
Warning: Symantec Technical Support does not recommend using CleanWipe the
first time you have uninstallation trouble. You should only use CleanWipe as a last
resort when the usual uninstallation methods are unsuccessful.
Planning the installation 91
Uninstalling Symantec Endpoint Protection with the CleanWipe utility
You should always use the latest version of CleanWipe to remove Symantec
Endpoint Protection. CleanWipe can remove older installations of Symantec Endpoint
Protection. However, you should not use an older version of CleanWipe to remove
a newer version of Symantec Endpoint Protection. This action can have unexpected
results.
As of 14, you can also incorporate CleanWipe functionality directly into the Symantec
Endpoint Protection client package. You can enable this option with client installation
settings. For more information, see About the Symantec Endpoint Protection client
preinstall removal feature.
If you need help with CleanWipe, you can contact Technical Support directly.
To uninstall Symantec Endpoint Protection with the CleanWipe utility
1 Copy the folder that contains Cleanwipe.exe to the computer on which you
want to run it.
2 Double-click Cleanwipe.exe, and then click Next.
3 Accept the license agreement, and then click Next.
4 Select the Symantec products you want to remove, and then click Next twice.
5 When the tool finishes running, you may be prompted to restart the computer.
After the computer restarts, CleanWipe reopens and continues to run.
6 Click Next.
7 Click Finish.
The Symantec products you selected are now uninstalled.
For information on recommended uninstallation methods, see:
Uninstall Symantec Endpoint Protection
About Symantec Endpoint Protection client installation failures and Cleanwipe
Chapter 4
Managing product licenses
This chapter includes the following topics:
Purging obsolete clients from the database to make more licenses available
Task Description
Check the product license Understand the importance of the license requirements for the computers that you
requirements want to protect. A license lets you install the Symantec Endpoint Protection client on
a specified number of computers. A license lets you download virus and spyware
definitions and other security content from LiveUpdate.
Purchase a license and save it You need to purchase a license in the following situations:
to the management server
You want to purchase Symantec Endpoint Protection.
Your trial license expired.
Your paid license expired.
Your license is over-deployed.
After you purchase your license, you receive an email with a Symantec license file
(.slf) or a license serial number. You can use the serial number to activate the
installation. You can also use the serial number to download a copy of the .slf file
from the Licensing Portal. You do not need to manually download a license file.
Task Description
Activate your purchased license You use the License Activation Wizard in the Symantec Endpoint Protection Manager
console to import and activate your Symantec product license.
Before you activate the license, you must have one of the following items:
You receive one or the other of these when you purchase a license.
Back up your license files Back up your license files to preserve them in case the database or the computer's
hard disk becomes damaged.
Review the preconfigured Preconfigured license notifications alert administrators about expired licenses and
license notifications other license issues.
See What are the types of notifications and when are they sent? on page 612.
Keep track of when your Check the status for each license that you imported into the console to see whether
licenses expire, and renew your you need to renew a license or purchase more licenses.
licenses
See Checking the license status in Symantec Endpoint Protection Manager
on page 98.
See About renewing your Symantec Endpoint Protection license on page 98.
After the trial license expires, you must activate a paid license to retain full product
functionality. You do not have to uninstall the trial-licensed version to convert your
Symantec Endpoint Protection installation to a fully licensed installation.
The trial license expires 60 days after you install Symantec Endpoint Protection
Manager.
See About purchasing licenses on page 95.
Warning: To prevent corruption of the license file, do not open or alter the file
contents in any way. However, you may copy and store the license as desired.
Task Description
Task Description
Find out where to buy product You can purchase a Symantec product license from the following sources:
licenses
The Symantec online store:
http://store.symantec.com/
Your preferred Symantec reseller:
To find a reseller, use the Partner locator.
To find out more about Symantec partners, go to
http://www.symantec.com/partners/index.jsp
The Symantec sales team:
Visit the Symantec Ordering website for sales contact information.
Learn more about upgrading from See About the trial license on page 94.
the trial license that comes with
Symantec Endpoint Protection
Technical Contact Contact information for the person who is in charge of the
technical activities that are concerned with installing or
maintaining your endpoint security infrastructure. The
contact's name, email address, and phone number are
required.
Primary Contact Contact information for the person who represents your
company. The contact's name, email address, and phone
number are required.
Note: Click the check box to indicate when the Technical
Contact and Primary Contact are the same person.
Managing product licenses 97
About the Symantec Licensing Portal
Company Information Includes the company name, location, phone number, and
email address.
Note: If you have existing credentials for MySymantec, you can use those credentials
to access licensing information. If you do not have a MySymantec account, you
must create one before you can use the Licensing Portal. To create an account,
go to the Licensing Portal website and then click Register Now.
The Symantec Customer Care website has additional information about using the
Symantec Licensing Portal to manage licenses:
http://customersupport.symantec.com/
See Activating or importing your Symantec Endpoint Protection product license
on page 51.
See Licensing Symantec Endpoint Protection on page 92.
about licensing and product upgrades, see the section pertaining to on-premises
software upgrades on the Upgrading Products page.
Symantec Endpoint Protection Manager context-sensitive Help provides additional
assistance about the application of an upgrade license specific to the version of
Symantec Endpoint Protection that you use.
See Upgrading to a new release on page 135.
See Licensing Symantec Endpoint Protection on page 92.
Term of license The term of the license starts from the time and date of
activation until midnight of the last day of the licensing
term.
License coverage: platforms Licensing seats apply to clients running on any platform,
whether the platform is Windows, Mac, or Linux.
License coverage: products and License seats apply equally across product versions.
versions
To purge obsolete clients from the database to make more licenses available
1 In the console, on the Admin page, click Domains, right-click the domain, and
click Edit Domain Properties.
2 On the General tab, change the Delete clients that have not connected for
specified time setting from the default of 30 to 1.
You do not need to set the option to purge the non-persistent clients for licensing
purposes. The non-persistent clients that are offline do not count toward the
license total.
3 Click OK.
4 Wait 24 hours and then revert the settings to 30 days or to another interval that
suits your requirements.
See Purging obsolete non-persistent VDI clients to free up licenses on page 648.
See Licensing Symantec Endpoint Protection on page 92.
You can also include the .slf file as part of a third-party deployment package.
See Understanding server data collection and client submissions and their
importance to the security of your network on page 474.
Chapter 5
Managing the client
installation
This chapter includes the following topics:
Choosing a method to install the client using the Client Deployment Wizard
Action Description
Identify client computers Identify the computers on which you want to install the client software. Check that all
the computers run a supported operating system.
Note: Symantec recommends that you also install the client on the computer that hosts
Symantec Endpoint Protection Manager.
For the most current system requirements, see: Release notes, new fixes, and system
requirements for all versions of Endpoint Protection
Identify computer groups Identify the computer groups to which you want the clients to belong. For example,
(optional) you can group clients based on type of computer, to conform to your corporate
organization, or to the security level required. You can create these groups before or
after you install the client software.
You can also import an existing group structure such as an Active Directory structure.
See Importing existing groups and computers from an Active Directory or an LDAP
server on page 223.
Managing the client installation 106
Preparing for client installation
Action Description
Prepare client computers for If your users do not have administrative rights for their computers, then you should
deployment and installation remotely install the client software using Remote Push. The Remote Push installation
requires you to enter the credentials that have local administrative rights for the
computers.
Prepare the computers for remote client deployment and for successful communication
with Symantec Endpoint Protection Manager after installation.
Modify or disable any existing firewall settings to allow communication during Remote
Push deployment, and between Symantec Endpoint Protection components after
installation.
See About the communication ports that Symantec Endpoint Protection uses
on page 110.
Uninstall third-party security software on all operating systems. For Windows
operating systems, you can configure client packages to automatically uninstall
existing third-party security software when you prepare to deploy clients.
Some programs may have special uninstallation routines, or may need to have a
self-protection component disabled. See the documentation for the third-party
software.
As of 14, you can also uninstall an existing installation of the Symantec Endpoint
Protection client, before the installation of Symantec Endpoint Protection. You
should only use this option if the existing Symantec Endpoint Protection installation
is corrupted or malfunctioning.
See Configuring client packages to uninstall existing security software on page 121.
Uninstall any unsupported Symantec virus protection software, such as Symantec
AntiVirus or Symantec Client Security. You must also uninstall any
consumer-branded Symantec security products, such as Norton Internet Security.
Migration directly from these products is not supported.
See Preparing Windows and Mac computers for remote deployment on page 108.
Managing the client installation 107
Preparing for client installation
Action Description
Determine features and You deploy the client software using one of the available methods. You can also export
deploy client software a customized client package to deploy later or with a third-party tool.
Note: Symantec recommends that you do not perform third-party installations
simultaneous to the installation of Symantec Endpoint Protection. The installation of
any third-party programs that make network- or system-level changes may cause
undesirable results when you install Symantec Endpoint Protection. If possible, restart
the client computers before you install Symantec Endpoint Protection.
See Choosing a method to install the client using the Client Deployment Wizard
on page 115.
See Installing Windows client software using third-party tools on page 768.
You decide which features to install to the client computers. You configure custom
client feature sets and installation settings before you export or deploy an installation
package. Installation settings include the installation folder and the restart settings.
You can also use the default client install feature sets and installation settings.
See Deciding which features to install on the client on page 116.
See About the Windows client installation settings on page 119.
See Configuring Windows client installation feature sets on page 120.
For Windows clients, you can choose to automatically uninstall existing third-party
security software when you configure client installation settings.
See Configuring client packages to uninstall existing security software on page 121.
Verify installation status Confirm that the client installation succeeded and that clients communicate with
Symantec Endpoint Protection Manager. Managed clients may not appear in the console
until after they are restarted.
See Restarting the client computers from Symantec Endpoint Protection Manager
on page 124.
After installation, you can take additional steps to secure unmanaged computers
and optimize the performance of your Symantec Endpoint Protection installation.
See Getting up and running on Symantec Endpoint Protection for the first time
on page 36.
Managing the client installation 108
Preparing for client installation
Note: You cannot deploy the Symantec Endpoint Protection client to Linux computers
remotely from Symantec Endpoint Protection Manager.
Task Details
Have administrative rights to If the client computer is part of an Active Directory domain, you should use domain
your client computers administrator account credentials for a remote push installation. Otherwise, have the
administrator credentials available for each computer to which you deploy.
Disable or modify firewall Disable the firewall, or modify firewall settings to allow communication between
settings Symantec Endpoint Protection components.
See About the communication ports that Symantec Endpoint Protection uses
on page 110.
Uninstall existing third-party Uninstall any third-party security software currently in use. For Windows computers,
security software Symantec Endpoint Protection version 12.1 RU1 MP1 and later includes a tool to help
automatically uninstall select third-party security software. You must separately uninstall
any security software that this tool does not uninstall.
Note: Some programs may have special uninstallation routines, or may need to have
a self-protection component disabled. See the documentation for the third-party
software.
You configure this tool before you deploy, and the uninstallation occurs before Symantec
Endpoint Protection installs.
See Configuring client packages to uninstall existing security software on page 121.
Managing the client installation 109
Preparing for client installation
Table 5-2 Tasks to prepare all computers for remote deployment (continued)
Task Details
Uninstall Symantec Endpoint As of 14, you can uninstall an existing installation of the Symantec Endpoint Protection
Protection clients that do not client for Windows. You should only use this option if the existing Symantec Endpoint
uninstall normally Protection installation does not uninstall normally. You should not use this option as
part of a standard deployment.
You configure this tool before you deploy, and the uninstallation occurs before Symantec
Endpoint Protection installs.
See Configuring client packages to uninstall existing security software on page 121.
Uninstall unsupported or Uninstall any unsupported Symantec security software, such as Symantec AntiVirus
consumer Symantec security or Symantec Client Security. Migration directly from these products is not supported.
software
You must also uninstall any consumer-branded Symantec security products, such as
Norton Internet Security.
See the documentation for your Symantec software for information about uninstallation.
Prepare Windows Vista, Windows User Account Control blocks local administrative accounts from remotely
Windows 7, or Windows accessing remote administrative shares such as C$ and Admin$. You do not need to
Server 2008 / 2008 R2 fully disable User Account Control on the client computers during the remote deployment
computers if you disable the registry key LocalAccountTokenFilterPolicy.
http://support.microsoft.com/kb/951016
If the Windows client computer is part of an Active Directory domain, use domain
administrator account credentials with local administrator privileges for remote push.
Prepare Windows 8 / 8.1 or Before you deploy, perform the following tasks:
later, or Windows Server
Disable the registry key LocalAccountTokenFilterPolicy.
2012 / 2012 R2 or later
To disable UAC remote restrictions, see:
computers
http://support.microsoft.com/kb/951016
Enable and start the Remote Registry service.
Disable or remove Windows Defender.
Prepare the Mac computers Before you deploy, perform the following tasks on the Mac computers:
on any supported operating
Click System Preferences > Sharing > Remote Login and either allow access
system
for all users, or only for specific users, such as Administrators.
If you use the Mac firewall, disable stealth mode. With stealth mode enabled, the
remote push installation cannot discover the client through Search Network.
To disable stealth mode on the Mac, see the following article that applies to your
version of the Mac operating system.
OS X Mavericks: Prevent others from discovering your Mac (10.9)
OS X Yosemite: Prevent others from discovering your Mac (10.10)
OS X El Capitan: Prevent others from discovering your Mac (10.11)
macOS Sierra: Prevent others from discovering your Mac (10.12)
Ensure that the firewall does not block the port that Secure Shell (SSH) uses. By
default, this port is TCP port 22. This port allows the required communication for
remote logon.
See About the communication ports that Symantec Endpoint Protection uses
on page 110.
See Installing clients with Remote Push on page 59.
See Preparing for client installation on page 105.
Table 5-5 Ports for client and server installation and communication
TCP 139, 445 Push deployment from svchost.exe Initiated by Symantec Endpoint
Symantec Endpoint Protection Protection Manager (clientremote.exe)
UDP 137, 138
Manager to Windows Not configurable
computers
Also uses TCP ephemeral ports.
TCP 2967 Group Update Provider (GUP) ccSvcHst.exe Initiated by Symantec Endpoint
web-caching proxy functionality Protection clients
Configurable
Table 5-5 Ports for client and server installation and communication
(continued)
TCP 9090 Web console communication SemSvc.exe Initiated by the remote Web console
Configurable
TCP 8445 Used by the remote reporting httpd.exe (Apache) Initiated by the reporting console
console Configurable
Table 5-5 Ports for client and server installation and communication
(continued)
Windows Vista and later contain a firewall that is enabled by default. If the firewall
is enabled, you might not be able to install or deploy the client software remotely.
If you have problems deploying the client to computers running these operating
systems, configure their firewalls to allow the required traffic.
If you decide to use the Windows firewall after deployment, you must configure
it to allow file and printer sharing (port 445).
For more information about configuring Windows firewall settings, see the Windows
documentation.
See Preparing Windows and Mac computers for remote deployment on page 108.
See Enabling and disabling a firewall policy on page 329.
See Monitoring endpoint protection on page 584.
See Preparing for client installation on page 105.
Managing the client installation 114
Preparing for client installation
Standard client
Uses virus and spyware definitions in the cloud.
Installs only the latest virus and spyware definitions.
The standard client is approximately 80 percent to 90 percent smaller on disk
than dark network Windows clients because they download only the latest
definitions.
Handles AutoUpgrade with deltas rather than full installation.
Note: If you configure embedded images for Windows Embedded Standard 7 and
later with templates, all templates except for Minimum Configuration work well
with Symantec Endpoint Protection. The supported write filter is the File Based
Write Filter (FBWF) with the Registry Filter. If the write filter status is incompatible
with the installation, the Symantec Endpoint Protection installer alerts you to the
changes you need to make.
Options Description
You can install Windows, Mac, and Linux clients using this
option.
Options Description
Remote Push Remote push installation pushes the client software to the
computers that you specify. The installation begins
automatically on the client computers. Remote push
installation does not require the user to have local
administrator rights to their computers.
You can install Windows and Mac clients using this option.
Web Link and Email Users receive an email message that contains a link to
download and install the client software. The users then install
the client software, so they must have local administrator
rights to their computers.
You can install Windows, Mac, and Linux clients using this
option.
See Installing clients with Web Link and Email on page 61.
Before you run the Client Deployment Wizard, you review the installation options,
optionally customize them, and then select those options during installation.
Installation options include the protection technologies to install, the installation
destination folder, and the restart behavior after installation.
See Deciding which features to install on the client on page 116.
See About the Windows client installation settings on page 119.
See Preparing for client installation on page 105.
Full Protection for Clients Recommended for workstations, desktop, and laptop
computers.
The Mac client installation package installs Virus and Spyware Protection and
intrusion prevention. You cannot customize the features for the Mac client installation
package.
The Linux client installation package only installs Virus and Spyware Protection.
See How Symantec Endpoint Protection uses layers to protect computers
on page 29.
See Configuring Windows client installation feature sets on page 120.
See About enabling and disabling protection when you need to troubleshoot
problems on page 239.
See Choosing a method to install the client using the Client Deployment Wizard
on page 115.
See Preparing for client installation on page 105.
Managing the client installation 118
Exporting client installation packages
Note: If you export client installation packages from a remote console, the packages
are created on the computer from which you run the remote console. Furthermore,
if you use multiple domains, you must export the packages for each domain, or the
clients do not appear in the correct domain groups.
5 Set the other options according to your installation goals. The options vary
depending on the type of installation package you export.
For details about the export options in this dialog box, click Help.
6 Click OK.
See Importing client installation packages into Symantec Endpoint Protection
Manager on page 133.
See Installing clients with Save Package on page 53.
See Installing clients with Remote Push on page 59.
See Restoring client-server communications with Communication Update Package
Deployment on page 167.
See Preparing for client installation on page 105.
Note: Mac client restart and upgrade settings apply only to AutoUpgrade.
Protection packages you can select a feature set to only install Virus and Spyware
Protection and Network and Host Exploit Mitigation.
You can also create and name a custom feature set. You then select a default or
a custom client feature set when you export client software packages.
The Mac client installation package installs Virus and Spyware Protection, and
intrusion prevention. The Linux client installation package only installs Virus and
Spyware Protection. You cannot customize the features for the Mac or Linux client
installation package.
To configure a Windows client installation feature set
1 In the console, click Admin, and then click Install Packages.
2 Under Install Packages, click Client Install Feature Set.
3 Under Tasks, click Add Client Install Feature Set.
4 In the Add Client Install Feature Set dialog box, in the Name box, type a
name.
5 In the Description box, type a description of the client installation feature set.
For details about setting other options in this dialog box, click Help.
6 Click OK.
See Deciding which features to install on the client on page 116.
See How Symantec Endpoint Protection uses layers to protect computers
on page 29.
See Preparing for client installation on page 105.
4 Read the information about the option you chose, and then click OK.
You can also modify other options for this configuration. Click Help for more
information about these options.
5 Click OK to save the configuration.
Managing the client installation 123
Configuring client packages to uninstall existing security software
You can also restart the Mac and Windows client computers at any time by running
a restart command from the management server. You cannot restart the Linux client
with a restart command from the management server. You have the option to
schedule the Windows client computers to restart during a time that is convenient
for users. You can force an immediate restart, or give the users an option to delay.
When you send a restart command to a Mac client computer, it always performs a
hard restart.
To configure risk remediation and new client download restart options on Windows
client computers
1 In the console, click Clients.
2 On the Clients page, select a group, and then click Policies.
3 On the Policies tab, click General Settings.
4 In the General Settings dialog box, on the Restart Settings tab, select the
restart method and schedule.
Some restart options apply only to Windows clients. For details, see the
context-sensitive Help.
You can also add a notification that appears on the client computer before the
restart occurs. The default message tells the user that a security risk
remediation or a new content download requires a restart.
5 Click OK.
To restart a selected client computer
1 In the console, click Clients
2 On the Clients page, on the Clients tab, select a group.
3 On the Clients tab, select a client, right-click Run command on computers,
and then click Restart Client Computers.
4 Click Yes, specify the restart options that you require, and then click OK.
Some restart options apply only to Windows clients. For details, see the
context-sensitive Help.
To restart the client computers in a selected group
1 In the console, click Clients.
2 On the Clients page, on the Clients tab, select a group, click Run a command
on the group, and then click Restart Client Computers.
3 Click Yes, specify the restart options that you require, and then click OK.
Some restart options apply only to Windows clients. For details, see the
context-sensitive Help.
Managing the client installation 126
About managed and unmanaged clients
Type Description
Managed client You administer the clients from the console. Managed client
computers connect to your network. You use the console to
update the client software, security policies, and virus
definitions on the managed client computers.
Unmanaged client The primary computer user must administer the client
computer. An unmanaged client does not connect to
Symantec Endpoint Protection Manager and cannot be
administered from the console. In most cases, unmanaged
clients connect to your network intermittently or not at all.
The primary computer user must update the client software,
security policies, and virus definitions on the unmanaged
client computer.
See Why do I need to replace the client-server communications file on the client
computer? on page 164.
See How do I replace the client-server communications file on the client computer?
on page 165.
See Preparing for client installation on page 105.
If you purchased a physical disc and want to install an unmanaged client, insert
the disc. The installation should start automatically. If it does not start
automatically, double-click Setup.exe. Click Install an unmanaged client.
2 On the License Agreement Panel, click I accept the terms in the license
agreement, and then click Next.
3 The installer selects Unmanaged client by default. Click Next. If you click
Managed client, the installer advises you to install using a managed client
installation package, and then quits.
This panel appears when you install the client software for the first time on a
computer.
4 On the Setup Type panel, click one of the following options:
Click Typical for the most common options, and then click Next.
Click Custom to configure your installation, click Next, select the protection
types, and then click Next.
See Deciding which features to install on the client on page 116.
5 If the installation wizard prompts you, click Enable Auto-Protect and Run
LiveUpdate, and then click Next
6 On the File Reputation Data Submission panel, uncheck the box if you do
not want to provide anonymous file reputation data to Symantec, and then click
Next.
An unmanaged client does not submit reputation data without a paid license,
even if you leave the box checked.
See Licensing an unmanaged Windows client on page 103.
7 On the Ready to Install the Program panel, click Install.
8 On the Wizard Complete panel, click Finish.
See Installing the Symantec Endpoint Protection client for Mac on page 55.
See Installing the Symantec Endpoint Protection client for Linux on page 57.
See About the Windows client installation settings on page 119.
See About managed and unmanaged clients on page 126.
See Downloading an unmanaged client installation package on page 127.
See Preparing for client installation on page 105.
Managing the client installation 129
Uninstalling the Symantec Endpoint Protection client for Windows
Note: After you uninstall the Symantec Endpoint Protection client, you are prompted
to restart the client computer to complete the uninstallation. Make sure that you
save any unfinished work or close all open applications before you begin.
Note: You must have superuser privileges to uninstall the Symantec Endpoint
Protection client on the Linux computer. The procedure uses sudo to demonstrate
this elevation of privilege.
Managing the client installation 131
Managing client installation packages
Note: On some operating systems, if the only contents of the /opt folder are
the Symantec Endpoint Protection client files, the uninstaller script also deletes
/opt. To recreate this folder, enter the following command: sudo mkdir /opt
Task Description
Configure client installation You can select specific client protection technologies to install and you can specify
packages how the installation interacts with end users.
Export client installation You can export packages for managed clients or unmanaged clients.
packages
You can export the packages as a single executable file or as a series of files in a
directory. The method that you choose depends on your deployment method and
whether you want to upgrade client software in groups. Typically, if you use Active
Directory Group Policy Object, you do not choose to export to a single executable file.
Import client installation You can add updated client installation packages to the database to make them
package updates available for distribution from Symantec Endpoint Protection Manager. You can
optionally export the packages during this procedure to make the package available
for deployment to computers that do not have the client software.
See Importing client installation packages into Symantec Endpoint Protection Manager
on page 133.
Upgrade Windows and Mac You can install the exported packages to computers one at a time, or deploy the
clients in one or more groups exported files to multiple computers simultaneously.
When Symantec provides updates to client installation packages, you first add them
to Symantec Endpoint Protection Manager and make them available for exporting.
However, you do not have to reinstall them with client deployment tools. The easiest
way to update Windows and Mac clients with the latest software is to use AutoUpgrade.
You should first update a group with a small number of test computers.
You can also update clients with LiveUpdate if you permit clients to run LiveUpdate
and if the LiveUpdate Settings policy permits updates.
Delete client installation You can delete older client installation packages to save disk space. However,
packages AutoUpgrade sometimes uses the older Windows client installation packages to build
upgrade packages. The upgrade packages result in smaller downloads by clients.
Note: You can import an executable package such as .exe or .zip file packages
directly, but it is not recommended. The .info file contains the information that
describes the package and ensures proper migration to future builds of the Symantec
Endpoint Protection client through delta updates. On the other hand, the Symantec
Endpoint Protection Manager web console does not import the .info file format. In
the web console, you can only import or export packages in a single file, such as
in the .zip or .exe file format.
6 In the Select Folder dialog box, locate and select the product_name.info file
for the new package you copied in step 1, and then click Select.
7 When the Completed successfully prompt appears, click Close.
To export the installation files and make them available for deployment, click
Export this Package, and then complete this procedure.
See Exporting client installation packages on page 118.
After you successfully import the package, you can see a "Package is created"
event in the System > Administrative log. The event is described with text
similar to "Successfully imported the SEP 12.1 RU5 32-bit package by Symantec
Endpoint Protection Manager. This package is now available for deployment."
See Viewing logs on page 603.
See Preparing for client installation on page 105.
Chapter 6
Upgrading Symantec
Endpoint Protection
This chapter includes the following topics:
Task Description
Step 1: Back up the database Back up the database that Symantec Endpoint Protection Manager uses
to ensure the integrity of your client information.
Step 2: Break the replication relationship If the management server you want to update replicates with other
(optional) management servers, break the replication relationship. If the second
management server, or replication partner, launches replication during the
upgrade, it may have unpredictable results.
Note: Breaking the relationship between the management servers is not
the same as removing the replication partner. You do not want to delete
the replication partner entirely.
Step 3: Stop the Symantec Endpoint You must stop the management server service before you install a newer
Protection Manager service version.
See Stopping and starting the management server service on page 145.
Upgrading Symantec Endpoint Protection 137
Upgrading to a new release
Task Description
Step 4: Upgrade the Symantec Endpoint Install the new version of Symantec Endpoint Protection Manager on all
Protection Manager software sites in your network. The existing version is detected automatically, and
all settings are saved during the upgrade.
Step 5: Restore the replication relationship If the management server you updated replicates with other management
after upgrade (optional) servers, restore the replication relationship.
Step 6: Upgrade Symantec client software Prepare then upgrade your client software to the latest version. If you use
Group Update Providers, they must be upgraded first.
See Choosing which method to upgrade the client software on page 148.
See Logging on to the Symantec Endpoint Protection Manager console on page 48.
Upgrading Symantec Endpoint Protection 138
Upgrade resources for Symantec Endpoint Protection
Item Resource
Client installation package settings You can configure client installation packages with a variety of settings and
and features protection features.
Feature and policy descriptions See How Symantec Endpoint Protection uses layers to protect computers
on page 29.
Manage product licenses Symantec Endpoint Protection is licensed according to the number of clients that
are needed to protect the computers at your site.
Note: Symantec Endpoint Protection no longer ships with Small Business Edition,
which reached end of life (EOL) in May 2015. Small Business Edition 12.1.x
customers can upgrade to Symantec Endpoint Protection, or they can use a tool
to migrate to the cloud-based Symantec Endpoint Protection Small Business Edition.
See Migrating to Symantec Endpoint Protection Small Business Edition.
Mac client
The following versions of Symantec Endpoint Protection client for Mac can upgrade
directly to 14:
12.1.4013.4013 - Release Update 4 (RU4)
12.1.5337.5000 - Release Update 5 (RU5)
12.1.6168.6000 - Release Update 6 (RU6)
12.1.6465.6200 - Release Update 6, Maintenance Patch 2 (RU6 MP2)
Upgrading Symantec Endpoint Protection 140
Upgrade resources for Symantec Endpoint Protection
Note: The Symantec Endpoint Protection client for Mac was not updated for 12.1.3,
12.1.6 MP1 / MP1a, 12.1.6 MP3, and 12.1.6 MP5.
Linux client
The following versions of Symantec Endpoint Protection client for Linux can upgrade
directly to 14:
12.1.5337.5000 - Release Update 5 (RU5)
12.1.6168.6000 - Release Update 6 (RU6)
12.1.6608.6300 - Release Update 6, Maintenance Patch 3 (RU6 MP3)
12.1.6867.6400 - Release Update 6, Maintenance Patch 4 (RU6 MP4)
12.1.7004.6500 - Release Update 6, Maintenance Patch 5 (RU6 MP5)
12.1.7061.6600 -Release Update 6, Maintenance Patch 6 (RU6 MP6)
Symantec AntiVirus for Linux 1.0.14 is the only version that you can migrate directly
to Symantec Endpoint Protection. You must first uninstall all other versions of
Symantec AntiVirus for Linux. You cannot migrate a managed client to an
unmanaged client.
Downgrade paths are not supported. For example, if you want to migrate from
Symantec Endpoint Protection 14 to 12.1.6 MP7, you must first uninstall Symantec
Endpoint Protection 14.
Task Description
Change the LiveUpdate settings 1 Go to Admin > Servers and right-click Local Site. Select Edit Site
to reduce space requirements Properties.
3 On the LiveUpdate tab, reduce the number of content revisions to keep. For
an upgrade, you can lower the setting to 10. Allow time for Symantec Endpoint
Protection Manager to purge the extra revisions. However, for versions later
than 12.1.5, the reduction of revision numbers may trigger full update
downloads from the clients that check in. An increase in these full update
requests may negatively affect network performance.
Note: The default values and recommended values for content storage have
also changed as of version 12.1.5. To upgrade, however, you need to work
with the values that are appropriate for the version from which you upgrade.
Returning the revision setting to its previous value after the upgrade completes
is not necessary. Improvements to the way Symantec Endpoint Protection
Manager stores and manages content means that a larger number of revisions
takes up less disk space than in earlier versions.
See How to update content and definitions on the clients on page 172.
See Downloading content from LiveUpdate to the Symantec Endpoint Protection
Manager on page 179.
Make sure that unused virus 1 Go to Admin > Servers, right-click the database server, and then select Edit
definitions are deleted from the Database Properties.
Symantec Endpoint Protection
For the embedded database, right-click localhost. For a Microsoft SQL Server
Manager database
database, the database server name varies based on the location of your
database.
2 On the Log Settings tab, under Risk Log Settings, make sure that Delete
unused virus definitions is checked.
Upgrading Symantec Endpoint Protection 143
Upgrading a management server
Table 6-3 Tasks to increase disk space on the management server (continued)
Task Description
Relocate or remove co-existing If other programs are installed on the same computer with Symantec Endpoint
programs and files Protection Manager, consider relocating them to another server. You can remove
unused programs.
If storage-intensive programs are installed on the same computer with Symantec
Endpoint Protection Manager, consider dedicating a computer to support only
Symantec Endpoint Protection Manager.
Remove temporary Symantec Endpoint Protection Manager files.
For a list of temporary files that you can remove, see the article, Symantec
Endpoint Protection Manager directories contain many .TMP folders consuming
large amounts of disk space.
Note: Defragment the hard drive after removing programs and files.
Use an external database If the Symantec Endpoint Protection database resides on the same computer with
Symantec Endpoint Protection Manager, consider installing a Microsoft SQL Server
database on another computer. Significant disk space is saved and in most cases,
performance is improved.
Note: Make sure that the client computers also have enough disk space before an
upgrade. Check the system requirements and as needed, remove unnecessary
programs and files, and then defragment the client computer hard drive.
Low Disk Space issues encountered on systems running either the Symantec
Endpoint Protection client or the Symantec Endpoint Protection Manager
Low disk space on a Symantec Endpoint Protection client
For the most current system requirements, see: Release notes, new fixes, and
system requirements for all versions of Endpoint Protection
Warning: You must follow the scenario that applies to your type of installation, or
your upgrade can fail.
Upgrading Symantec Endpoint Protection 144
Upgrading a management server
Task Description
Upgrade the management server Review the system requirements and supported upgrade paths, upgrade the
management server, and then configure it with the Management Server
Configuration Wizard.
Windows Server 2003, all desktop operating systems, and 32-bit operating
systems are no longer supported.
SQL Server 2005 is no longer supported for the database. Support is also
dropped for SQL Server 2008 earlier than SP4, and SQL Server 2008 R2
earlier than SP3.
You must now enter SQL Server system administrator credentials during the
upgrade.
Note: You may need to edit the domain security policies to allow the virtual
service accounts to run correctly for Windows 7 / Server 2008 R2 or later.
See:
How to assign user rights to the Windows Security Policies for Symantec Endpoint
Protection Manager services
Log onto the management server When the Symantec Endpoint Protection Manager logon panel appears, you
can log on to the console by using your logon credentials.
Note: You are not required to restart the computer after the upgrade, but you may
notice performance improvements if you restart the computer and log on.
Warning: If you do not stop the Symantec Endpoint Protection Manager service
before you upgrade the server, you risk corrupting your existing Symantec Endpoint
Protection database.
Upgrading Symantec Endpoint Protection 146
Stopping and starting the management server service
Note: If you stop the management server service, the clients can no longer connect
to it. If clients are required to communicate with the management server to connect
to the network, they are denied access until this service is restarted.
For example, a client must communicate with the management server to pass a
Host Integrity check.
Note: To start the Symantec Endpoint Protection Manager service, follow this
procedure again, but click Start instead of Stop.
To stop the Symantec Endpoint Protection Manager service using the command
line
From a command prompt, type:
To start the Symantec Endpoint Protection Manager service using the command
line
From a command prompt, type:
Warning: Disabling replication is not the same as permanently deleting the replication
partnership. If you delete the relationship and then reinstall the management server,
the management servers perform a full replication instead of an incremental
replication. See Deleting sites on page 703.
Disabling replication
You must log on to Symantec Endpoint Protection Manager and disable replication
at a minimum of two sites.
To disable replication
1 In the console, click Admin > Servers.
2 Under Local Site > Servers, expand Replication Partners and select the
management server.
3 Right-click the management server, and then click Delete Replication Partner.
4 Click Yes.
5 Repeat this procedure at all sites that replicate data.
8 Click Finish.
9 Repeat this procedure for all computers that replicate data with this computer.
See How to install a second site for replication on page 700.
Best practices for upgrading to the latest version of Endpoint Protection
See Upgrading to a new release on page 135.
Some methods can take up to 30 minutes. Therefore, you may want to upgrade
client software when most users are not logged on to their computers.
AutoUpgrade When you have a smaller number of clients, When you have a larger number
(Recommended for such as 5,000 clients or fewer. of clients. This method does not
smaller environments) When you need to schedule the upgrade to scale well.
occur when the upgrade does not interrupt the When you have a lot of groups,
users' work. because it is time-consuming to
When you use Symantec Endpoint Protection click each group individually in the
Manager and not a third-party application to wizard.
deploy the client installation package. When you have a complicated
When you need to upgrade either Windows or upgrade schedule where you need
Mac clients, but not Linux clients. a lot of granularity.
When you want a simple upgrade method. When you need to upgrade Linux
clients.
See Upgrading client software with AutoUpgrade
How to deploy the Symantec
on page 150.
Endpoint Protection Linux client as
part of a cloned drive image
Export a client installation When you deploy the client installation package When you normally use Symantec
package (Recommended manually instead of with Symantec Endpoint Endpoint Protection Manager to
for larger environments) Protection Manager. update the clients.
When you deploy the client installation package
with an existing third-party deployment
application instead of with Symantec Endpoint
Protection Manager. To use this method, you
should have this infrastructure already in place.
When you need to upgrade Windows clients,
Mac clients, and Linux clients.
Client Deployment Wizard When you have a smaller number of clients, When you have a large network
such as fewer than 250 clients. environment, as this method does
When you deploy the client using Symantec not scale well.
Endpoint Protection Manager and not a
third-party application.
When you want a simpler upgrade method.
Download client When you want to upgrade a few clients at a If you upgrade the client on computers
installation files from time in a few specific cases. For example: with existing managed clients, the
FileConnect If an issue occurs on a few computers with clients stay managed. However, if you
an older version of the client, and the newer deploy to new computers without an
version fixes the issue. existing client, this method installs an
If you have a smaller number of clients to unmanaged client only. You must
upgrade and do not want to upgrade the convert the client to a managed client
management server. later to connect to the management
When you need to upgrade Windows, Mac, and server.
Linux clients. See How do I replace the
When you must deploy the client directly on client-server communications file on
the computer or by using a third-party the client computer? on page 165.
deployment application instead of Symantec
See Exporting the client-server
Endpoint Protection Manager.
communications file (Sylink.xml)
You download the standalone All Clients manually on page 168.
installation file from: FileConnect
installation package. These clients do not maintain a copy of the installer in the
installer cache. Mac clients always receive the full installation package.
Use the following best practices for using AutoUpgrade:
Test the AutoUpgrade process before you attempt to upgrade a large number
of clients in your production network. If you do not have a test network, you can
create a test group within your production network. For this kind of test, you add
a few non-critical clients to the test group and then upgrade them by using
AutoUpgrade.
To reduce bandwidth during peak hours, schedule AutoUpgrade for after hours
in the Upgrade Clients with Package wizard, especially for client groups with
reduced-size clients. For wide area networks, you should also set up the remote
clients to receive the upgrade package from a remote web server.
Since AutoUpgrade was first included in the Mac client with Symantec Endpoint
Protection 14, you cannot upgrade with AutoUpgrade from a version earlier than
14.
See Choosing which method to upgrade the client software on page 148.
To upgrade client software with AutoUpgrade
1 In the console, click Admin > Install Packages.
2 Under Tasks, click Upgrade Clients with Package.
3 In the Upgrade Clients Wizard panel, click Next, select the appropriate client
installation package, and then click Next.
4 Select the group or groups that contain the client computers that you want to
upgrade, and then click Next.
5 Select from where the client should download the package from the following
options:
To download from the Symantec Endpoint Protection Manager server, click
Download from the management server.
To download from a web server that is local to the computers that need to
update, click Download from the following URL (http or https). Enter
the URL of the client installation package into the provided field.
For Mac, use the drop-down menu to select options for Install Settings.
For either Windows or Mac, Content Selection lets you include content in
the installation package. If you include content, the package is larger, but
the client has up-to-date content immediately after installation. If you do
not include content, the package is smaller, but the client must get content
updates after installation.
You can also add an optional upgrade schedule. Without a schedule, the
AutoUpgrade process begins after the wizard completes.
8 On the Notification tab, customize the user notification settings.
You can customize the message that is displayed on the client computer during
the upgrade. You can also allow the user to postpone the upgrade.
9 Click OK, and then click Next.
10 In the Upgrade Clients Wizard Complete panel, click Finish.
To confirm the version number of the client software
After the upgrade completes, you can check the version to confirm a successful
upgrade in one of the following ways:
In the console, click Clients > Clients, select the appropriate group, and
change the view to Client Status.
On the Windows client, in the Symantec Endpoint Protection client interface,
click Help > About.
On the Mac client, open the Symantec Endpoint Protection client interface.
In the menu bar, click Symantec Endpoint Protection > About Symantec
Endpoint Protection.
The client computer must restart after the upgrade. By default, the clients restart
after installation. You can configure the restart options in the group's general settings
to control how the clients in a group restart after AutoUpgrade. You can also restart
the clients at any time by running a restart command from the management server.
See Restarting the client computers from Symantec Endpoint Protection Manager
on page 124.
See Applying upgrade settings to other groups on page 153.
Upgrading Symantec Endpoint Protection 153
Upgrading Group Update Providers
2 In the Copy Deployment Settings dialog box, click the new groups, click OK,
and then click Yes.
See Upgrading client software with AutoUpgrade on page 150.
Configuring push mode or pull mode to update client policies and content
Table 7-1 Tasks to manage connections between the management server and
the clients
Action Description
Check whether the client is You can check the client status icon in the client and in the management console.
connected to the management The status icon shows whether the client and the server communicate.
server
See Checking whether the client is connected to the management server and is
protected on page 158.
A computer may have the client software installed, but does not have the correct
communications file.
See Why do I need to replace the client-server communications file on the client
computer? on page 164.
See How do I replace the client-server communications file on the client computer?
on page 165.
Check that the client gets policy Check that the client computers get the most current policy updates by checking
updates the policy serial number in the client and in the management console. The policy
serial number should match if the client can communicate with the server and
receives regular policy updates.
You can perform a manual policy update and then check the policy serial numbers
against each other.
Change which method you use to You can configure the management server to push down policies to the client or
download policies and content to for the clients to pull the policies from the management server.
the clients
See Configuring push mode or pull mode to update client policies and content
on page 162.
Decide whether to use the default You can work with an alternative list of management servers for failover and load
management server list balancing. The management server list provides a list of multiple management
servers that clients can connect to.
See Configuring a management server list for load balancing on page 688.
Configure communication settings You can configure separate communication settings for locations and for groups.
for a location
See Configuring communication settings for a location on page 266.
Managing client-server communication 158
Checking whether the client is connected to the management server and is protected
Table 7-1 Tasks to manage connections between the management server and
the clients (continued)
Action Description
Troubleshoot management server If the management server and the client do not connect, you can troubleshoot
connectivity problems connection problems.
For more information on the ports that Symantec Endpoint Protection uses, see
the following article: Which Communications Ports does Symantec Endpoint
Protection use?
Open the client and look on the Status screen, which states that Your
computer is protected and displays a green check mark.
Table 7-2 displays what the following icons in the Name column mean.
14 12.1.x Description
The client can communicate with Symantec Endpoint Protection Manager. The
health state is Online.
The client is in computer mode.
14 12.1.x Description
Icon Description
The client runs with no problems. It is connected to and communicates with the
server. All components of the security policy protect the computer.
The client has a minor problem. For example, the virus definitions may be out of
date.
The client does not run, has a major problem, has an expired license, or has at
least one protection technology disabled. For example, Network Threat Protection
may be disabled.
Managing client-server communication 161
How the client computer and the management server communicate
You can also check the management server to view the connection status of the
computers.
See Checking whether the client is connected to the management server and is
protected on page 158.
See Running a report on the deployment status of clients on page 591.
See Managing the client-server connection on page 157.
Pull mode The client computer connects to the management server periodically,
depending on the frequency of the heartbeat setting. The client computer
checks the status of the management server when the client connects.
Push mode The client computer establishes a constant HTTP connection to the
management server. Whenever a change occurs in the management
server status, it notifies the client computer immediately.
In either mode, the client computer takes the corresponding action, based on the
change in the status of the management server. Because it requires a constant
connection, push mode requires a large amount of network bandwidth. Client
computers that are configured to use pull mode require less bandwidth.
See Configuring push mode or pull mode to update client policies and content
on page 162.
The heartbeat protocol defines the frequency at which client computers upload data
such as log entries and download policies. The first heartbeat occurs immediately
after the client starts. The next heartbeat occurs at the heartbeat frequency that
you set.
The heartbeat frequency is a key factor in the number of clients that each Symantec
Endpoint Protection Manager can support. If you set a heartbeat frequency to 30
minutes or less, it limits the total number of clients that Symantec Endpoint Protection
Manager can support. For deployments of 1,000 clients or more, Symantec
recommends that you set the heartbeat frequency to the maximum length of time
possible. Symantec recommends that you use the longest interval that still meets
your companys security requirements. For example, if you want to update policies
and gather logs on a daily basis, then you might set the heartbeat frequency to 24
Managing client-server communication 162
Configuring push mode or pull mode to update client policies and content
Note: Windows XP supports a limited number of concurrent users if the clients are
in push mode. It is a best practice to use pull mode when you deploy policies to up
to 100 clients.
8 Click OK.
To specify push mode or pull mode for a location
1 In the console, click Clients.
2 Under Clients, select the group for which you want to specify whether to push
or pull policies.
3 Click Policies.
4 Uncheck Inherit policies and setting from the parent group "group name".
5 Under Location-specific Policies and Settings, under Location-specific
Policies for the location you want to modify, expand Location-specific
Settings.
6 Under Location-specific Settings, to the right of Communications Settings,
click Tasks and uncheck Use Group Communications Settings.
7 To the right of Communications Settings, click Local - Push or (Local - Pull).
8 Do one of the following tasks:
Click Push mode.
Click Pull mode and under Heartbeat Interval, set the number of minutes
or hours.
9 Click OK.
See Performing the tasks that are common to all policies on page 302.
See How the client computer and the management server communicate
on page 161.
To view the policy serial number in the console
1 In the console, click Clients.
2 Under Clients, select the relevant group.
The policy serial number and policy date appear in the upper right corner of
the program window.
Note: The policy serial number and the policy date also appear at the bottom
of the details list on the Details tab.
package downloads the new Sylink.xml file only after the client computer
connects to the management server.
See Restoring client-server communication settings by using the SylinkDrop
tool on page 724.
Export the Sylink.xml file to the client computer and import it on the client
computer manually. Symantec recommends this method if you want to use a
software management tool. With a software management tool, the job is queued
up and completed whenever the users turn on their computer. With the other
methods, the client computer must be online.
Table 7-4 displays the process for exporting and importing the Sylink.xml file
into the client computer.
Table 7-4 Steps for exporting and importing the communications file
Step Description
Step 1: Export a file that includes all the The default file name is group name_sylink.xml.
communication settings for the group
See Exporting the client-server communications file (Sylink.xml) manually
that you want the client to be in.
on page 168.
Step 2: Deploy the file to the client You can either save the file to a network location or send it to an individual
computer. user on the client computer.
Step 3: Import the file on the client Either you or the user can import the file on the client computer.
computer.
See Importing client-server communication settings into the Windows client
on page 169.
Step 4: Verify client and server The client immediately connects to the management server. The management
communication on the client. server places the client in the group that is specified in the communication
file. The client is updated with the group's policies and settings. After the
client and the management server communicate, the notification area icon
with the green dot appears in the client computer's taskbar.
See Why do I need to replace the client-server communications file on the client
computer? on page 164.
5 After the communication update package is applied, confirm that the computers
successfully communicate with Symantec Endpoint Protection Manager.
See Checking whether the client is connected to the management server and
is protected on page 158.
See Running a report on the deployment status of clients on page 591.
Managing client-server communication 168
Exporting the client-server communications file (Sylink.xml) manually
Note: You must have superuser privileges to perform this procedure. The procedure
uses sudo to demonstrate this elevation of privilege as required.
To import the client-server communication settings file into the Linux client
1 You or the Symantec Endpoint Protection Manager administrator must first
export the communication settings file from Symantec Endpoint Protection
Manager and copy it to the Linux computer. Ensure that the file name is
sylink.xml.
3 A successful import returns OK. To further verify the managed status, enter
the followed command, which displays the policy serial number for a successful
import:
./sav manage -p
See Installing the Symantec Endpoint Protection client for Linux on page 57.
Chapter 8
Updating content on the
clients
This chapter includes the following topics:
Making sure that Symantec Endpoint Protection Manager has the latest content
Choosing which content and which content revision to update on client computers
Configuring Windows client updates to run when client computers are idle
Updating content on the clients 172
How to update content and definitions on the clients
Configuring Windows client updates to run when definitions are old or the
computer has been disconnected
Table 8-1 Steps to update content on the Symantec Endpoint Protection clients
Task Description
Make sure that the By default, LiveUpdate runs as part of the Symantec Endpoint Protection Manager installation.
management server You may need to run LiveUpdate manually in the following situations:
has the latest content
You skipped LiveUpdate during installation.
from LiveUpdate
You must run LiveUpdate to download the Host Integrity templates and intrusion prevention
(Recommended)
signatures.
You want to run LiveUpdate before the next scheduled update.
See Making sure that Symantec Endpoint Protection Manager has the latest content
on page 184.
Change how client By default, Windows client computers get content updates from the management server.
computers get updates You may need to change the delivery method to support different client platforms, large
(Optional) numbers of clients, or network limitations.
See Choose a distribution method to update content on clients based on the platform
on page 178.
Updating content on the clients 173
How to update content and definitions on the clients
Table 8-1 Steps to update content on the Symantec Endpoint Protection clients
(continued)
Task Description
Change the LiveUpdate You can customize the frequency of LiveUpdate sessions, the protection components that
settings for the are downloaded, and more.
management server
See Downloading content from LiveUpdate to the Symantec Endpoint Protection Manager
(Optional)
on page 179.
Reduce network If the management server receives too many concurrent requests for full definition packages
overloads from the clients, the network may become overloaded. You can mitigate the risk of these
(Recommended) overloads, and stop clients from downloading full definitions.
See Mitigating network overloads for client update requests on page 184.
Improve performance To help mitigate the effect of downloads on network bandwidth, download content randomly
(Recommended) so that not all clients get updates at the same time.
See Randomizing content downloads from the default management server or a Group Update
Provider on page 192.
To mitigate the effect of downloads on client computers' performance, you can have the client
computers download content updates when the client computers are idle.
See Configuring Windows client updates to run when client computers are idle on page 194.
Let your endpoint users By default, users on the client computer can run LiveUpdate at any time. You can decide
manage their own how much control to give your users over their content updates.
updates (Optional)
See Configuring the amount of control that users have over LiveUpdate on page 191.
Symantec Endpoint The default management server Symantec recommends that you use this
Protection Manager to automatically updates the client computers method unless network constraints or your
client computers (default) that it manages. company's policies require an alternative.
(Windows, Mac, Linux) You do not define the schedule for the If you have a large number of clients or
updates from the management server to the bandwidth issues, you might use this method,
clients. The clients download content from along with Group Update Providers.
the management server based on the
For Mac or Linux computers to receive
communication mode and heartbeat
content updates from the management
frequency.
server, you must configure the Apache web
See Configuring clients to download content server.
from the Symantec Endpoint Protection
Enabling Mac and Linux clients to download
Manager on page 196.
LiveUpdate content using the Apache Web
See Configuring push mode or pull mode to server as a reverse proxy
update client policies and content
See Downloading content from LiveUpdate
on page 162.
to the Symantec Endpoint Protection
Manager on page 179.
Group Update Provider A Group Update Provider is a client computer A Group Update Provider lets you reduce the
to client computers that receives updates from a management load on the management server, and is
server. The Group Update Provider then easier to configure than an internal
(Windows only)
forwards the updates to the other client LiveUpdate server.
computers in the group. A Group Update
Use a Group Update Provider for groups at
Provider can update multiple groups.
remote locations with minimal bandwidth.
Group Update Providers can distribute all
See Using Group Update Providers to
types of LiveUpdate content except client
distribute content to clients on page 201.
software updates. Group Update Providers
also cannot be used to update policies. See Deciding whether or not to set up
multiple sites and replication on page 696.
Updating content on the clients 175
How to update content and definitions on the clients
Table 8-2 Content distribution methods and when to use them (continued)
Internal LiveUpdate Client computers can download updates An internal LiveUpdate server lets you reduce
server to client computers directly from an internal LiveUpdate server the load on the management server in very
that receives its updates from a Symantec large networks. In smaller networks, consider
(Windows, Mac, Linux)
LiveUpdate server. whether Group Update Providers would meet
your organization's needs.
If necessary, you can set up several internal
LiveUpdate servers and distribute the list to Consider using an internal LiveUpdate server
client computers. in the following situations:
You can change the download schedule from If you manage a large network (more than
the LiveUpdate server to the management 10,000 clients)
server. If you manage Mac or Linux clients that
should not connect to an external
See Configuring the LiveUpdate download
LiveUpdate server
schedule to Windows client computers
on page 189. If your organization deploys multiple
Symantec products that also use
For more information about setting up an LiveUpdate to distribute content to client
internal LiveUpdate server, see the computers
LiveUpdate Administrator User's Guide at:
Note: You should not install the management
Downloading LiveUpdate Administrator server and an internal LiveUpdate server on
the same physical hardware or virtual
machine. Installation on the same computer
can result in significant server performance
problems.
Table 8-2 Content distribution methods and when to use them (continued)
External Symantec Client computers can receive updates directly Use an external Symantec LiveUpdate server
LiveUpdate server to from a Symantec LiveUpdate server. if you need to schedule when clients update
client computers over the content or if the available bandwidth between
Internet the Symantec Endpoint Protection Manager
and the clients is limited.
(Windows, Mac, Linux)
Symantec Endpoint Protection Manager and
scheduled updates are enabled by default.
With the default settings, clients always get
updates from the management server unless
management server is unresponsive for a
long period of time.
Note: Do not configure large numbers of
managed, networked clients to pull updates
from an external Symantec LiveUpdate
server. This configuration consumes
unnecessary bandwidth.
Third-party tool Third-party tools like Microsoft SMS let you This method lets you test update files before
distribution distribute specific update files to clients. you distribute them. It may also make sense
if you have a third-party tool distribution
(Windows only)
infrastructure in place.
Intelligent Updater Intelligent Updater files contain the virus and You can use Intelligent Updater files if
security risk content and intrusion prevention LiveUpdate is not available.
(Windows only)
content that you can use to manually update
See Using Intelligent Updater files to update
clients.
content on Windows computers on page 209.
You can download the Intelligent Updater
To update other kinds of content, you must
self-extracting files from the Symantec Web
set up and configure a management server
site.
to download and to stage the update files.
Symantec LiveUpdate
Group Update
Provider (Client)
Client groups
Clients
Client group
Symantec LiveUpdate
Internal Internal
LiveUpdate server LiveUpdate server
Management server
Client groups
Client groups
Table 8-3 Content distribution method based on Windows, Mac, and Linux
clients
Platform Method
Windows By default, the Windows client gets content from the management server.
Windows clients can also get updates from the following sources:
For Windows clients, you can also customize the following settings:
Endpoint Protection Manager, you download the content for all the management
servers in the site.
Decision Description
What LiveUpdate server You can specify either an external Symantec LiveUpdate server (recommended), or
should serve the content to one or more internal LiveUpdate servers that have previously been installed and
the site? configured.
You should not install Symantec Endpoint Protection Manager and an internal
LiveUpdate server on the same physical hardware or virtual machine. Installation on
the same computer can result in significant server performance problems.
If you decide to use one or more internal LiveUpdate servers, you may want to add
the Symantec public LiveUpdate server as the last entry. If your clients cannot reach
any server on the list, then they are still able to update from the Symantec LiveUpdate
server.
Note: Symantec Endpoint Protection Manager no longer includes legacy support for
LiveUpdate Administrator 1.x. To continue using an internal LiveUpdate server, you
should upgrade to the latest version of LiveUpdate Administrator.
Decision Description
How many content revisions LiveUpdate content revisions are stored differently on the management server than in
should the site store? Symantec Endpoint Protection Manager versions earlier than 12.1.5. Earlier releases
stored full content for every revision. Now, the server stores only the most recent full
content package, plus incremental deltas for as many revisions as you specify here.
This approach reduces the disk space that is required to store multiple content revisions
on the server.
The number of clients you select during the Symantec Endpoint Protection Manager
installation defines the number of revisions the server stores.
For each LiveUpdate content type, the default values are as follows:
For 14:
If you do not check Management server will manage fewer than 500 clients,
Symantec Endpoint Protection Manager stores 21 revisions.
If you check Management server will manage fewer than 500 clients, Symantec
Endpoint Protection Manager stores 90 revisions.
For versions earlier than 14 but later than 12.1.5, or for upgrades from versions earlier
than 14:
If you select fewer than 100 clients, Symantec Endpoint Protection Manager stores
12 revisions.
If you select 100 to 500 clients, Symantec Endpoint Protection Manager stores 21
revisions.
If you select 500 to 1,000 clients, Symantec Endpoint Protection Manager stores
42 revisions.
If you select more than 1,000 clients, then Symantec Endpoint Protection Manager
stores 90 revisions.
In most instances during an upgrade, the installation increases the number of revisions
to match these new defaults. This increase occurs if the number of revisions you had
before the upgrade is less than the new minimum default, based on the above criteria.
See Choosing which content and which content revision to update on client computers
on page 187.
How often should my site The default schedule of having Symantec Endpoint Protection Manager run LiveUpdate
check for LiveUpdate content every four hours is a best practice.
updates?
What operating systems am LiveUpdate only downloads the content for the specified operating systems.
I downloading content to?
Updating content on the clients 182
Downloading content from LiveUpdate to the Symantec Endpoint Protection Manager
Decision Description
What content types should I Make sure that the site downloads all content updates that are specified in your client
download to the site and to LiveUpdate Content policies.
the clients?
See Choosing which content and which content revision to update on client computers
on page 187.
What languages should be This setting applies to product updates only; the content updates are downloaded
downloaded for product automatically for all languages.
updates?
What content size should be Version 14 standard and embedded/VDI clients use a reduced-size set of definitions
downloaded for definitions? (only the latest) that is cloud-enabled. Scans on these clients automatically use the
extended definitions set in the cloud.
14 also includes a dark network client that downloads the entire set of definitions.
12.1.x standard clients require legacy standard-size content, which includes the entire
set of definitions.
Note: If you use a UNC server, then LiveUpdate requires that you use the
domain or workgroup as part of the user name.
If the computer is in a domain, use the format domain_name\user_name.
If the computer is in a workgroup, use the format computer_name\user_name.
Warning: You must download content for the client types in your network. If
you do not download the content that your installed clients require, the clients
cannot get updates from the management server.
To modify the setting, click Change Selection, modify the selection, and then
click OK.
Updating content on the clients 184
Making sure that Symantec Endpoint Protection Manager has the latest content
To help prevent overloads on your network, the management server provides the
following features:
A notification when the management server receives a specified number of
requests for a full set of definitions within a specified period of time.
You set the conditions for this notification based on what constitutes an overload
for your environment. To configure the notification, add a Network load:
requests for virus and spyware full definitions notification condition.
See Setting up administrator notifications on page 620.
The ability to let clients get deltas for virus and spyware definitions from a
LiveUpdate server if the management server can provide only a full set. In a
LiveUpdate Settings policy, click Advanced Settings > Download smaller
client installation packages from a LiveUpdate server.
The ability to block clients from downloading a full set of virus and spyware
definitions from the management server.
If you receive a notification of a network overload, you can block any further
downloads of full packages from the management server. You cannot, however,
stop any downloads that are already in progress. Configure this option by clicking
Admin > Servers > server_name > Edit the server properties > Full
Definitions Download > Prevent clients from downloading full definition
packages.
Note: You configure proxy settings for other client communications separately.
Updating content on the clients 187
Choosing which content and which content revision to update on client computers
In some cases, the revision that is specified in the policy does not match the
revisions that are stored on the Symantec Endpoint Protection Manager. For
example, you might import a policy that references a revision that does not exist
on the server. Or, you might replicate policies but not LiveUpdate content from
another site. In both cases, the policy shows that the revision is not available. Even
though the revision is not available on the server, the clients that use the policy are
still protected. The clients use the latest revision of the content.
You do not need to restart the client computer to install the content.
Note: Use this feature very carefully. Unchecking a content type means that the
feature is not kept up-to-date on the client. This can potentially put your clients at
greater risk.
Note: If you have Mac clients, they can install only updates to virus and spyware
definitions and intrusion prevention signatures. These options, under Mac
Settings, Security Definitions, are enabled by default.
4 For the type of content that you want to roll back, click Select a revision >
Edit, and choose the revision number.
5 Click OK.
6 To download security patches to client computers, open a LiveUpdate Settings
policy.
7 Under Windows Settings, click Advanced Settings, and make sure that
Download security patches to fix the vulnerabilities in the latest version
of the Symantec Endpoint Protection client is checked.
If you have not already assigned this policy to groups and locations, then you must
assign the policy to have it take effect.
See Downloading content from LiveUpdate to the Symantec Endpoint Protection
Manager on page 179.
See How to update content and definitions on the clients on page 172.
Updating content on the clients 189
Configuring the LiveUpdate download schedule to Windows client computers
Note: To make sure that any client computers that connect to your network
infrequently get the latest updates, let these computers get updates from a Symantec
LiveUpdate server. These servers are public, and the client therefore does not
depend on a connection to your network to get updates.
7 Set any additional options, if required. Symantec recommends that you keep
the default values for running LiveUpdate if the definitions are out of date, or
if the client has not connected recently to the management server.
8 Click OK.
See Randomizing content downloads from a LiveUpdate server on page 193.
To configure the schedule for LiveUpdate downloads to Mac client computers
1 Click Policies and then click LiveUpdate.
2 On the LiveUpdate Settings Policy tab, right-click the policy that you want,
and then click Edit.
3 Under Mac Settings, click Schedule.
4 Specify the frequency.
If you select Daily, also set the time of day to run. If you select Weekly, also
set the time of day to run and the day of the week to run.
5 Click OK when finished.
To configure the schedule for LiveUpdate downloads to Linux client computers
1 On the LiveUpdate Settings Policy tab, right-click the policy that you want,
and then click Edit.
2 Under Linux Settings, click Schedule.
3 Check Enable LiveUpdate Scheduling. This option is enabled by default.
Note: You should not uncheck this box. If you disable LiveUpdate Scheduling,
Linux clients do not get the latest updates.
You can enable or disable the randomization function. The default setting is enabled.
You can also configure a randomization window. The management server uses the
randomization window to stagger the timing of the content downloads. Typically,
you should not need to change the default randomization settings.
In some cases, however, you might want to increase the randomization window
value. For example, you might run the Symantec Endpoint Protection client on
multiple virtual machines on the same physical computer that runs the management
server. The higher randomization value improves the performance of the server
but delays content updates to the virtual machines.
You also might want to increase the randomization window when you have many
physical client computers that connect to a single server that runs the management
server. In general, the higher the client-to-server ratio, the higher you might want
to set the randomization window. The higher randomization value decreases the
peak load on the server but delays content updates to the client computers.
In a scenario where you have very few clients and want rapid content delivery, you
can set the randomization window to a lower value. The lower randomization value
increases the peak load on the server but provides faster content delivery to the
clients.
For downloads from the default management server or a Group Update Provider,
you configure the randomization settings in the Communication Settings dialog
box for the selected group. The settings are not part of the LiveUpdate Settings
policy.
For downloads from a LiveUpdate server to your clients, you configure the
randomization setting as part of the LiveUpdate Settings policy.
See Randomizing content downloads from the default management server or a
Group Update Provider on page 192.
See Randomizing content downloads from a LiveUpdate server on page 193.
See Configuring clients to download content from an internal LiveUpdate server
on page 197.
client computer attempts to download content at a random time that occurs within
that window.
Note: The communication settings do not control the randomization settings for the
client computers that download content from a LiveUpdate server. You can change
the randomization settings for those computers in the LiveUpdate Settings policy.
See Randomizing content downloads from a LiveUpdate server on page 193.
Note: The schedule settings in the LiveUpdate Settings policy do not control
randomization for the client computers that download content from the default
management server or from a Group Update provider. You can change the
randomization settings for those computers in the Communication Settings dialog
box for the group to which they belong.
See Randomizing content downloads from the default management server or a
Group Update Provider on page 192.
Note: If you check both available options, the client computer must meet both
conditions.
Updating content on the clients 196
Configuring clients to download content from the Symantec Endpoint Protection Manager
To configure Windows client updates when definitions are old or the computers is
disconnected from the manager
1 Click Policies.
2 Under Policies, click LiveUpdate.
3 On the LiveUpdate Settings tab, right-click the policy that you want to edit,
and then click Edit.
4 Under Windows Settings, click Schedule.
5 Check LiveUpdate runs only if Virus and Spyware definitions are older
than: and then set the number of hours or days.
6 Check LiveUpdate runs only if the client is disconnected from Symantec
Endpoint Protection Manager for more than: and then set the number of
minutes or hours.
7 Click OK.
See Configuring the LiveUpdate download schedule to Windows client computers
on page 189.
See Configuring Windows client updates to run when client computers are idle
on page 194.
Note: You may also want to establish communication between a proxy server and
Symantec Endpoint Protection Manager so that it can connect with Symantec
subscription services. A proxy server can provide an additional level of protection
between your site and an external Symantec LiveUpdate server.
See Configuring Symantec Endpoint Protection Manager to connect to a proxy
server to access the Internet and download content from Symantec LiveUpdate
on page 186.
If you manage a large number of clients, you may want to use Group Update
Providers (GUPs) for Windows clients. GUPs reduce the load on the management
server and are easier to set up than an internal LiveUpdate server.
See Using Group Update Providers to distribute content to clients on page 201.
If you don't want to use the default management server or Group Update Providers
for client updates, you can:
Set up an internal LiveUpdate server.
Use a Symantec LiveUpdate server that is external to your network.
To use an internal LiveUpdate server, you must perform the following tasks:
Install the internal LiveUpdate server.
For more information about using an internal LiveUpdate server, refer to the
LiveUpdate Administrator's Guide.
Use the LiveUpdate Settings policy to configure your clients to use that internal
LiveUpdate server.
Note: You can specify proxy settings for the clients that connect to an internal
LiveUpdate server for updates. The proxy settings are for updates only. They do
not apply to other types of external communication that clients use. You configure
the proxy for other types of client external communication separately.
See Specifying a proxy server that clients use to communicate to Symantec
LiveUpdate or an internal LiveUpdate server on page 186.
6 In the Add LiveUpdate Server dialog box, type the information that you need
to identify and communicate with the server that you want to use.
For example, for the URL:
If you use the FTP method (recommended), type the FTP address for the
server. For example: ftp://myliveupdateserver.com
If you use the HTTP method, type the URL for the server. For example:
Domain name: http://myliveupdateserver.com
IPv4 address: http://192.168.133.11/Export/Home/LUDepot
If you use the LAN method, type the server UNC path name. For example,
\\myliveupdateserver\LUDepot
Note: If you use a UNC server, then LiveUpdate requires that you use the
domain or workgroup in addition to the user name. If the computer is part of a
domain, use the format domain_name\user_name
If the computer is part of a workgroup, use the format
computer_name\user_name.
6 If required, type in a user name and password for the server and then click
OK.
7 If your server uses FTP, click Advanced Server Settings.
8 Click the FTP mode that the server uses, either Active or Passive, and then
click OK.
9 Under Mac Settings, click Advanced Settings.
If you want to let client computers get product update settings through
LiveUpdate, click Download Symantec Endpoint Protection product updates
using a LiveUpdate server.
10 Click OK.
To configure Linux clients to use an internal LiveUpdate server
1 Under Policies, click LiveUpdate.
2 On the LiveUpdate Settings tab, right-click the policy that you want and then
click Edit.
3 Under Linux Settings, click Server Settings.
4 Click Use a specified internal LiveUpdate server, and then click Add.
5 In the Add LiveUpdate Server dialog box, type the information that you need
to identify and communicate with the server that you want to use.
For example, for the URL:
If you use the FTP method (recommended), type the FTP address for the
server. For example: ftp://myliveupdateserver.com.
If you use the HTTP method, type the URL for the server. For example:
Domain name: http://myliveupdateserver.com
IPv4 address: http://192.168.133.11/Export/Home/LUDepot
Updating content on the clients 201
Using Group Update Providers to distribute content to clients
Step Description
Step 1: Understand the differences You can set up single, multiple, or cross-subnet Group Update Providers.
between the types of Group Update The type of Group Update Provider that you set up depends on your network
Providers that you can configure and the clients on that network. The types of Group Update Provider are not
mutually exclusive. You can configure one or more types of Group Update
Provider per policy.
See About the effects of configuring more than one type of Group Update
Provider in your network on page 207.
Updating content on the clients 202
Using Group Update Providers to distribute content to clients
Step Description
Step 2: Verify client communication Before you configure Group Update Providers, verify that the client computers
can receive content updates from the server. Resolve any client-server
communication problems.
You can view client-server activity in the System logs on the Logs tab of the
Monitors page.
Step 3: Configure Group Update You configure Group Update Providers in the LiveUpdate Settings policy.
Providers in one or more LiveUpdate
See Configuring clients to download content from Group Update Providers
Settings policies
on page 205.
Step 4: Assign the LiveUpdate Settings You assign the LiveUpdate Settings policy to the groups that use the Group
policy to groups Update Providers. You also assign the policy to the group in which the Group
Update Provider resides.
For a single Group Update Provider, you assign one LiveUpdate Settings
policy per group per site.
For multiple Group Update Providers and explicit lists of Group Update
Providers, you assign one LiveUpdate Settings policy to multiple groups
across subnets.
Step 5: Verify that clients are designated To view the client computers that are designated as Group Update Providers,
as Group Update Providers do one of the following tasks:
Click Clients > Clients tab > right-click the client, and then click Edit
Properties. The Group Update Provider field is True or False.
See Searching for the clients that act as Group Update Providers
on page 207.
Single A single Group Update Provider is a dedicated client computer that provides content for one
or more groups of clients. Configuring a single Group Update Provider turns a single client
into a Group Update Provider. A single Group Update Provider can be a client computer in
any group.
Use a single Group Update Provider when you want to use the same Group Update Provider
for all your client computers.
You use a single LiveUpdate Settings policy to specify a static IP address or host name for
a single Group Update Provider. However, if the client that serves as a single Group Update
Provider changes location, you must change the IP address in the policy.
If you want to use different single Group Update Providers in different groups, you must
create a separate LiveUpdate Settings policy for each group.
Multiple Multiple Group Update Providers use a set of rules, or criteria, to elect themselves to serve
groups of clients in their own subnets. All client computers are on the same subnet.
You specify the criteria that client computers must meet to qualify as a Group Update
Provider. If a client computer meets the criteria, the management server adds the client to
a global list of Group Update Providers. The management server then makes the global list
available to all the clients in the network. Clients check the list and choose the Group Update
Providers that are located in their own subnet.
Configuring multiple Group Update Providers turns multiple clients into Group Update
Providers.
Use multiple Group Update Providers for any of the following scenarios:
You have multiple groups and want to use different Group Update Providers for each
group.
You can use one policy that specifies rules for the election of multiple Group Update
Providers. If clients change locations, you do not have to update the LiveUpdate Settings
policy. The Symantec Endpoint Protection Manager combines multiple Group Update
Providers across sites and domains. It makes the list available to all clients in all groups
in your network.
Multiple Group Update Providers can function as a failover mechanism. The use of
Multiple Group Update Providers ensures a higher probability that at least one Group
Update Provider is available in each subnet.
Updating content on the clients 204
Using Group Update Providers to distribute content to clients
Table 8-6 When to use a particular type of Group Update Provider (continued)
Explicit list Use an explicit list of Group Update Providers when you want clients to be able to connect
to Group Update Providers that are on subnets other than the client's subnet. Clients that
change location can roam to the closest Group Update Provider on the list.
An explicit Group Update Providers list does not turn clients into Group Update Providers.
When you configure an explicit list, you can specify that the clients with IP addresses that
fall on a particular subnet should use a particular Group Update Provider. A client may have
multiple IP addresses, and the management server considers all of the client's IP addresses
when it matches which Group Update Provider to use. So, the IP address that the policy
matches to is not necessarily bound to the interface that the client uses to communicate
with the Group Update Provider.
For example, suppose that a client has IP address A, which it uses to communicate with
the management server and with the Group Update Provider. This same client also has IP
address B, which is the one that matches the Explicit Group Update Provider that you have
configured in the LiveUpdate Settings policy for this client. The client can choose to use a
Group Update Provider based on the address B, even though that is not the address that it
uses to communicate with the Group Update Provider.
9 Under Group Update Provider Settings, configure the options to control how
content is downloaded and stored on the Group Update Provider computer.
Click Help for information about content downloads.
10 Click OK.
Updating content on the clients 206
Using Group Update Providers to distribute content to clients
4 Select the Type of mapping you want to set up: based on the IP address, the
host name, or the Group Update Provider's network address.
Type in the necessary settings for the type of mapping you selected.
5 Click OK.
See Choose a distribution method to update content on clients on page 173.
See Using Group Update Providers to distribute content to clients on page 201.
Note: You can also check a client's properties. The properties include a field that
indicates whether or not the client is a Group Update Provider.
About the effects of configuring more than one type of Group Update
Provider in your network
When you configure single or multiple Group Update Providers in policies, then
Symantec Endpoint Protection Manager constructs a global list of all the providers
that have checked in. By default, this file is:
Updating content on the clients 208
Using Group Update Providers to distribute content to clients
Symantec Endpoint Protection Manager provides this global list to any client that
asks for it so that the client can determine which Group Update Provider it should
use. Because of this process, clients that have policies with only multiple or explicit
Group Update Providers configured can also use single Group Update Providers,
if the single provider meets the explicit mapping criterion. This phenomenon can
occur because single providers are a part of the global list of providers that the
clients get from their Symantec Endpoint Protection Manager.
So, all of the Group Update Providers that are configured in any of the policies on
a Symantec Endpoint Protection Manager are potentially available for clients' use.
If you apply a policy that contains only an explicit Group Update Provider list to the
clients in a group, all of the clients in the group attempt to use the Group Update
Providers that are in the Symantec Endpoint Protection Manager global Group
Update Provider list that meet the explicit mapping criteria.
If all types of Group Update Providers are configured in the policies on a Symantec
Endpoint Protection Manager, then clients try to connect to Group Update Providers
in the global list in the following order:
Providers on the Multiple Group Update Providers list, in order
Providers on the Explicit Group Update Providers list, in order
The Provider that is configured as a Single Group Update Provider
You can configure the following types of explicit mapping criteria:
IP address: Clients in subnet A should use the Group Update Provider that has
the IP address x.x.x.x.
Host name: Clients in subnet A should use the Group Update Provider that has
the host name xxxx.
Subnet network address: Clients in subnet A should use any Group Update
Provider that resides on subnet B.
Updating content on the clients 209
Using Intelligent Updater files to update content on Windows computers
Multiple mapping criteria can be used in an explicit Group Update Provider list in a
single policy. Symantec recommends that you be very careful how you configure
multiple mapping criteria to avoid unintended consequences. For example, you can
strand your clients without a means of obtaining updates if you misconfigure an
explicit mapping.
Consider a scenario with the following multiple explicit mapping criteria configured
in a single policy:
If a client is in subnet 10.1.2.0, use the Group Update Provider that has IP
address 10.2.2.24
If a client is in subnet 10.1.2.0, use the Group Update Provider that has IP
address 10.2.2.25
If a client is in subnet 10.1.2.0, use the Group Update Provider that has host
name SomeMachine
If a client is in subnet 10.1.2.0, use any Group Update Provider on subnet
10.5.12.0
If a client is in subnet 10.6.1.0, use any Group Update Provider on subnet
10.10.10.0
With this explicit Group Update Provider policy, if a client is in subnet 10.1.2.0, the
first four rules apply; the fifth rule does not. If the client is in a subnet for which no
mapping is specified, such as 10.15.1.0, then none of the rules apply to that client.
That client's policy says to use an explicit Group Update Provider list, but there is
no mapping that the client can use based on these rules. If you also disabled that
client's ability to download updates from Symantec Endpoint Protection Manager
and the Symantec LiveUpdate server, then that client has no usable update method.
See About the types of Group Update Providers on page 202.
See Configuring clients to download content from Group Update Providers
on page 205.
An Intelligent Updater file is a self-executing file that contains virus and spyware
definitions, SONAR definitions, and intrusion prevention signatures.
An Intelligent Updater file does not provide updates for any other type of content.
After you download the file, you can use your preferred distribution method to
distribute the updates to your clients.
Note: Intelligent Updater does not support the Extended file attributes and signatures,
the Auto-Protect portal list, Power Eraser definitions, or reduced-size definitions.
Table 8-7 Tasks to set up the use of third-party distribution tools for updates
Task Description
Configure Symantec Endpoint You can configure the management server either to receive content updates
Protection Manager to receive automatically or manually.
content updates.
See Downloading content from LiveUpdate to the Symantec Endpoint Protection
Manager on page 179.
See How to update content and definitions on the clients on page 172.
Configure the group's If you want to use third-party distribution tools to update managed clients, you must
LiveUpdate Settings policy to configure the group's LiveUpdate Settings policy to allow it.
allow third-party content
See Configuring a LiveUpdate Settings policy to allow third-party content distribution
update distribution.
to managed clients on page 211.
Prepare unmanaged clients If you want to use third-party distribution tools to update unmanaged clients, you must
to receive updates from first create a registry key on each unmanaged client.
third-party distribution tools.
See Preparing unmanaged clients to receive updates from third-party distribution tools
on page 212.
Locate, copy, and distribute Each Symantec Endpoint Protection Manager client group has an index2.dax file that
the content. is located on the computer that runs Symantec Endpoint Protection Manager. These
files are located by default in subfolders under the C:\Program Files
(x86)\Symantec\Symantec Endpoint Protection Manager\data\outbox\agent folder. To
update clients, you need to use the index2.dax files.
2 Set the value type of the registry key to DWORD (32-bit) or QWORD (64-bit)
and the value to hexadecimal 80 as follows:
0x00000080 (128)
3 Save the registry key, and then exit the registry editing tool.
See Using third-party distribution tools to update client computers on page 210.
See Distributing the content using third-party distribution tools on page 213.
Note: Content monikers typically change with each major release. At times, they
may also change for a minor release. Symantec does not typically change the
monikers for Release Updates or Maintenance Patches.
Updating content on the clients 214
Using third-party distribution tools to update client computers
You can see a mapping of the moniker to its content type by opening the
ContentInfo.txt file. By default, the ContentInfo.txt file is located in C:\Program Files
(x86)\Symantec\Symantec Endpoint Protection Manager\Inetpub\content\.
For example, you might see the following entry:
Each Symantec Endpoint Protection Manager client group has its own index2 file.
The index2 file for each client group is found in a folder for that group. By default,
the folders for client groups are found in C:\Program Files (x86)\Symantec\Symantec
Endpoint Protection Manager\data\outbox\agent\. The folder name for a client group
corresponds to the group policy serial number. You can find the serial number in
the Group Properties dialog box or on the Clients page Details tab. The first four
hexadecimal values of each group policy serial number match the first four
hexadecimal values of that group's folder.
The index2.dax file that managed clients use is encrypted. To look at the contents
of the file, open the index2.xml file that is available in the same folder. The
index2.xml file provides a list of the content monikers and their sequence (revision)
numbers. For example, you might see the following entry:
The LiveUpdate Content policy for a group specifies either a particular revision of
content or the latest content. The sequence number in the index2 file must match
the sequence number that corresponds to the content specification in the group's
LiveUpdate Content policy. For example, if the policy is configured to Use latest
available for all content types, then the sequence number for each type is the latest
available content. In this example, the distribution only works if the index2 file calls
out the sequence numbers (revisions) that correspond to the latest content revision.
The distribution fails if the sequence numbers correspond to any other revisions.
Note: You must use the Copy command to place files into the client's \inbox folder.
Using the Move command does not trigger update processing, and the update fails.
If you compress content into a single archive for distribution, you should not unzip
it directly into the \inbox folder.
Updating content on the clients 215
Using third-party distribution tools to update client computers
3 Write down the first four hexadecimal values of the Policy Serial Number,
such as 7B86.
4 Navigate to one of the following folders:
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection
Manager\data\outbox\agent (64-bit operating systems)
C:\Program Files\Symantec\Symantec Endpoint Protection
Manager\data\outbox\agent (32-bit operating systems)
5 Locate the folder that contains the first four hexadecimal values that match the
Policy Serial Number.
6 Open that folder, and then copy the index2.dax file to your working folder.
7 Navigate to one of the following folders:
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection
Manager\Inetpub\content (64-bit operating systems)
C:\Program Files\Symantec\Symantec Endpoint Protection
Manager\Inetpub\content (32-bit operating systems)
8 Open and read ContentInfo.txt to discover the content that each target
moniker folder contains.
The contents of each directory is target moniker\sequence number\full.zip|full.
9 Copy the contents of each \target moniker folder to your working folder such
as \Work_Dir.
Updating content on the clients 216
Downloading Endpoint Protection security patches to Windows clients
10 Delete all files and folders from each \target moniker so that only the following
folder structure and file remain in your working folder:
\\Work_Dir\target moniker\latest sequence number\full.zip
Your working folder now contains the folder structure and files to distribute to
your clients.
11 Use your third-party distribution tools to distribute the content of your working
folder to the \\Symantec Endpoint Protection\inbox\ folder on each of the clients.
The end result must look like the following:
\\Symantec Endpoint Protection\inbox\index2.dax
\\Symantec Endpoint Protection\inbox\target moniker\latest sequence
number\full.zip
Files that are processed successfully are then deleted. Files that are not
processed successfully are moved to a subfolder named Invalid. If you see
files in an Invalid folder under the inbox folder, then you must try again with
those files.
See Using third-party distribution tools to update client computers on page 210.
See Preparing unmanaged clients to receive updates from third-party distribution
tools on page 212.
Note: In versions earlier than 14, security patches are only available as part of a
new release, and only as part of a client deployment package using AutoUpgrade.
In 14, you can use AutoUpgrade to install the security patches on the clients when
both Symantec Endpoint Protection Manager and the clients have the same version
installed.
Updating content on the clients 217
Downloading Endpoint Protection security patches to Windows clients
Table 8-8 Examples of which client versions download which security patches
14 14 Yes
14 RU1 14 No
14 14 RU1 No
Security patches are not available for 12.1.x clients. In addition, the language for
the client must match the management server. For example, a French management
server that manages French, German, and simplified Chinese clients provides
security patches to the French clients only.
or you must run the restart command from the management server. The
management server sends you a notification that indicates which clients require a
restart.
To install security patches on Windows clients
1 In the console, verify that LiveUpdate is configured to download the security
patches to the management server.
In the Content Types to Download dialog box, make sure that Client security
patches is checked.
See Downloading content from LiveUpdate to the Symantec Endpoint
Protection Manager on page 179.
2 To run a report to find out which release is installed on the client computers,
run a Protection Content Versions report.
See Generating a list of the Symantec Endpoint Protection versions installed
in your network on page 593.
3 Verify that the LiveUpdate Settings policy is configured to download the patches
to the clients.
In a LiveUpdate Settings policy, under Windows Settings, click Advanced
Settings. Make sure Download security patches to fix the vulnerabilities
in the latest version of the Symantec Endpoint Protection client is checked.
See Choosing which content and which content revision to update on client
computers on page 187.
4 When notified, restart the client computers.
See Restarting the client computers from Symantec Endpoint Protection
Manager on page 124.
Section 3
Managing groups, clients,
and administrators
Adding a group
Manager, unless they belong to a predefined group. You cannot create subgroups
under the Default Group.
Task Description
Add groups See How you can structure groups on page 222.
Import existing groups If your organization already has an existing group structure,
you can import the groups as organizational units.
Note: You cannot manage imported organizational units in
the same ways that you can manage the groups that you
create in Symantec Endpoint Protection Manager.
Disable inheritance for The subgroups inherit the same security settings from the
subgroups parent group by default. You can disable inheritance.
Create locations within You can set up the clients to switch automatically to a different
groups security policy if the physical location of the client changes.
See Managing locations for remote clients on page 256.
Manage security policies for You can create security policies based on the needs of each
groups group. You can then assign different policies to different
groups or locations.
Task Description
Perform group maintenance You can move groups for easier management and move
clients between groups. You can also block clients from being
added to a particular group.
Criterion Description
Function You can create groups based on the types of computers to be managed, such
as laptops, desktops, and servers. Alternatively, you can create multiple
groups that are based on usage type. For example, you can create a remote
group for the client computers that travel and a local group for the client
computers that remain in the office.
Role You can create groups for department roles, such sales, engineering, finance,
and marketing.
Geography You can create groups based on the offices, cities, states, regions, or countries
where the computers are located.
Combination You can create groups based on a combination of criteria. For example, you
can use the function and the role.
You can add a parent group by role and add child subgroups by function, as
in the following scenario:
After you organize the client computers into groups, you can apply the appropriate
amount of security to that group.
For example, suppose that a company has telemarketing and accounting
departments. These departments have staff in the company's New York, London,
Managing groups of client computers 223
Adding a group
and Frankfurt offices. All computers in both departments are assigned to the same
group so that they receive virus and security risk definitions updates from the same
source. However, IT reports indicate that the telemarketing department is more
vulnerable to risks than the accounting department. As a result, the system
administrator creates separate telemarketing and accounting groups. Telemarketing
clients share configuration settings that strictly limit how users can interact with
their virus and security risk protection.
Best Practices for Creating Group Structure
See Performing the tasks that are common to all policies on page 302.
See Managing groups of clients on page 220.
Adding a group
You can add groups after you define the group structure for your organization.
Group descriptions may be up to 1024 characters long. Group names may contain
any character except the following characters: [ / \ * ? < > | :] Group descriptions
are not restricted.
Table 9-3 lists the tasks you should perform to import the group structure before
you can manage them.
Step Description
Step 1: Connect Symantec Endpoint You can connect Symantec Endpoint Protection Manager to either Active
Protection Manager to your company's Directory or an LDAP-compatible server. When you add the server, you
directory server should enable synchronization.
Step 2: Import either entire You can either import the existing group structure, or import individual
organizational units or specific computer computer accounts or user accounts into the Symantec Endpoint Protection
accounts or user accounts Manager groups that you create.
See Searching for and importing specific accounts from a directory server
on page 229.
Step 3: Either keep imported computer After you import organizational units, you can do either of the following
or user accounts in their own group or actions:
copy imported accounts to existing
Keep the imported organizational units or accounts in their own groups.
groups
After you import organizational units or individual accounts, you assign
policies to the organizational unit or group.
Copy the imported accounts to existing Symantec Endpoint Protection
Manager groups. The copied accounts follow the policy of the Symantec
Endpoint Protection Manager group and not the imported organizational
unit.
See Adding a group on page 223.
Step Description
Step 4: Change the authentication For the administrator accounts that you added in Symantec Endpoint
method for administrator accounts Protection Manager, change the authentication method to use directory
(optional) server authentication instead of the default Symantec Endpoint Protection
Manager authentication. You can use the administrator accounts to
authenticate the accounts that you imported. When an administrator logs on
to Symantec Endpoint Protection Manager, the management server retrieves
the user name from the database and the password from the directory server.
You can also import selected users to a Symantec Endpoint Protection Manager
group rather than importing the entire organizational unit.
See Connecting Symantec Endpoint Protection Manager to a directory server
on page 226.
See Importing existing groups and computers from an Active Directory or an LDAP
server on page 223.
See Importing organizational units from a directory server on page 228.
See Searching for and importing specific accounts from a directory server
on page 229.
Note: Before you import organizational units into Symantec Endpoint Protection
Manager, you must convert some of the special characters that precede a computer
name or user name. You perform this task in the directory server. If you do not
convert special characters, the management server does not import these accounts.
Searching for the clients that do not have the client software installed
About enabling and disabling protection when you need to troubleshoot problems
What are the commands that you can run on client computers?
Task Description
Check that the client You can display the computers in each group that do not have the client software
software is installed on your installed yet.
computers See Searching for the clients that do not have the client software installed
on page 237.
You can configure a client computer to detect that other devices do not have the
client software installed. Some of these devices might be unprotected computers.
You can then install the client software on these computers.
See Configuring a client to detect unmanaged devices on page 247.
You can add a client to a group and install the client software later.
See Choosing a method to install the client using the Client Deployment Wizard
on page 115.
Check whether the client is You can check the client status icons in the management console and in the client. The
connected to the status icon shows whether the client and the server communicate.
management server
See Checking whether the client is connected to the management server and is
protected on page 158.
A computer may have the client software installed, but is an unmanaged client. You
cannot manage an unmanaged client. Instead, you can convert the unmanaged client
to a managed client.
See Why do I need to replace the client-server communications file on the client
computer? on page 164.
Configure the connection After you install the client software client computers automatically connect to the
between the client and the management server at the next heartbeat. You can change how the server
server communicates with the client computer.
Task Description
Check that client computers You can view the status of each protection technology on your client computers.
have the right level of See Viewing the protection status of client computers on page 236.
protection See Checking whether the client is connected to the management server and is
protected on page 158.
You can run reports or view logs to see whether you need to increase protection or
improve performance. For example, the scans may cause false positives. You can
also identify the client computers that need protection.
See Monitoring endpoint protection on page 584.
You can modify protection based on specific attributes of the client software or the
client computers.
See Searching for information about client computers on page 238.
Adjust the protection on If you decide that clients do not have the right level of protection, you can adjust the
client computers protection settings.
You can increase or decrease each type of protection based on the results in the
reports and logs.
See The types of security policies on page 305.
See How Symantec Endpoint Protection uses layers to protect computers
on page 29.
You can temporarily disable protection on the client computers if you need to
diagnose a problem or improve performance.
See About enabling and disabling protection when you need to troubleshoot
problems on page 239.
See Running commands on client computers from the console on page 244.
You can require a password on the client.
See Password-protecting the client on page 253.
Move endpoints from one To change a client computer's level of protection, you can move it to a group that
group to another to modify provides more protection or less protection.
protection (optional)
See Moving a client computer to another group on page 231.
When you deploy a client installation package, you specify which group the client goes
in. You can move the client to a different group. But if the client gets deleted or
disconnected and then gets added again and reconnected, the client returns to the
original group. To keep the client with the group it was last moved to, configure the
reconnection preferences. You configure these settings in the Communications
Settings dialog box on the Clients > Policies tab.
Managing clients 236
Viewing the protection status of client computers
Task Description
Let users control computer You can specify the kind of control that users have over the protection on client
protection (optional) computers.
For Virus and Spyware Protection and Proactive Threat Protection, you can lock or
unlock a check box to specify whether users can change individual settings.
See Locking and unlocking Virus and Spyware Protection policy settings
on page 317.
For the Firewall policy and the IPS policy and for some client user interface settings,
you can change the user control level more generally.
See Preventing users from disabling protection on client computers on page 248.
If users need full control of the client, you can install an unmanaged client.
See Why do I need to replace the client-server communications file on the client
computer? on page 164.
Remove the Symantec If you decommissioned a client computer and you want to use the license for a different
Endpoint Protection client computer, you can uninstall the Symantec Endpoint Protection client software. For the
software from managed clients that do not connect, Symantec Endpoint Protection Manager deletes
decommissioned computers clients from the database after 30 days by default.
(optional)
You can change the period of time after which Symantec Endpoint Protection Manager
deletes the client from the database. By deleting a client, you also save space in the
database.
See Uninstalling the Symantec Endpoint Protection client for Windows on page 129.
See Uninstalling the Symantec Endpoint Protection client for Mac on page 130.
See Uninstalling the Symantec Endpoint Protection client for Linux on page 130.
See Purging obsolete clients from the database to make more licenses available
on page 101.
The group's policy serial number and the client's version number.
The information about the client computer's network components, such as the
MAC address of the network card that the computer uses.
The system information about the client computer, such as the amount of
available disk space and the operating system version number.
After you know the status of a particular client, you can resolve any security issues
on the client computers. You can resolve many issues by running commands on
groups. For example, you can update content, or enable Auto-Protect.
Note: If you manage any clients that run an earlier version of Symantec Endpoint
Protection, some newer protection technologies may be listed as not reporting.
This behavior is expected. It does not mean that you need to take action on these
clients.
See Checking whether the client is connected to the management server and is
protected on page 158.
See Running commands on client computers from the console on page 244.
See Searching for the clients that do not have the client software installed
on page 237.
To view the protection status of client computers
1 In the console, click Clients.
2 On the Clients page, under Clients, locate the group that contains the clients
that you want information about.
3 On the Clients tab, click the View drop-down list. Then, select a category.
You can go directly to a particular page by typing the page number in the text
box at the bottom right-hand corner.
Note: To search for most of the information about the users, you must collect user
information either during the client software installation or later. This user information
is also displayed on the General tab and the User Info tab in the client's Edit
Properties dialog box.
5 Under Search Criteria, click in the Search Field to see the drop-down list,
and then select the criteria by which you want to search.
To find embedded clients, you can search for the type of write filters in use.
Click Enhanced Write Filter, File Based Write Filter, or Unified Write Filter
to search for whether they are installed, enabled, or both. You can also search
for the reduced-size client. Click Install Type to search for a value of Reduced
Size.
6 Click the Comparison Operator drop-down list, and then select a comparison
operator.
You can use standard Boolean operators in your search criteria. Click Help
for more information on the options.
7 In the Value cell, type the search string.
8 Click Search.
You can export the results into a text file.
9 Click Close.
You can export the data that is contained in the query into a text file.
See Viewing the protection status of client computers on page 236.
Warning: Be sure to enable again any of the protections when you have completed
your troubleshooting task to ensure that the computer remains protected.
Managing clients 240
About enabling and disabling protection when you need to troubleshoot problems
Virus and Spyware If you disable this protection, you disable Auto-Protect only.
Protection
If you disable Auto-Protect, you also disable Download Insight, even if Download Insight
is enabled. SONAR also cannot detect heuristic threats. SONAR detection of host file
and system changes continues to function.
The scheduled or startup scans still run if you or the user has configured them to do so.
You might disable Auto-Protect for the following reasons:
Auto-Protect might block you from opening a document. For example, if you open a
Microsoft Word that has a macro, Auto-Protect may not let you open it. If you know
that the document is safe, you can disable Auto-Protect.
Auto-Protect may warn you about a virus-like activity that you know is not the work
of a virus. For example, you might get a warning when you install new computer
applications. If you plan to install more applications and you want to avoid the warning,
you can temporarily disable Auto-Protect.
Auto-Protect may interfere with Windows driver replacement.
Auto-Protect might slow down the client computer.
See Running commands on client computers from the console on page 244.
See Creating exceptions for Virus and Spyware scans on page 537.
Proactive Threat Protection You might want to disable Proactive Threat Protection for the following reasons:
You see too many warnings about the threats that you know are not threats.
Proactive Threat Protection might slow down the client computer.
Network Threat Protection You might want to disable Network Threat Protection for the following reasons:
You install an application that might cause the firewall to block it.
The firewall or the intrusion prevention system causes network connectivity-related
issues.
The firewall might slow down the client computer.
You cannot open an application.
If you are not sure that Network Threat Protection causes the problem, you might need
to disable all the protection technologies.
You can configure Network Threat Protection so that users cannot enable or disable it.
You can also set the following limits for when and how long the protection is disabled:
Whether the client allows either all traffic or all outbound traffic only.
The length of time the protection is disabled.
How many times you can disable protection before you restart the client.
See Enabling network intrusion prevention or browser intrusion prevention on page 373.
See Preventing and allowing users to change the client's user interface on page 250.
Generic Exploit Mitigation Typically, you should keep Generic Exploit Mitigation enabled.
You might want to disable Generic Exploit Mitigation if some of your applications become
unstable.
You might want to disable Tamper Protection temporarily if you get an extensive number
of false positive detections. For example, some third-party applications might make the
changes that inadvertently try to modify Symantec settings or processes. If you are sure
that an application is safe, you can create a Tamper Protection exception for the
application.
See Running commands on client computers from the console on page 244.
Commands Description
If you run a scan command, and select a Custom scan, the scan uses the command scan
settings that you configured on the Administrator-defined Scans page. The command uses
the settings that are in the Virus and Spyware Protection policy that is applied to the selected
client computers.
Update Content Updates content on clients by initiating a LiveUpdate session on the client computers. The
clients receive the latest content from Symantec LiveUpdate.
See Downloading content from LiveUpdate to the Symantec Endpoint Protection Manager
on page 179.
Update Content and Updates content by initiating a LiveUpdate session and runs an on-demand scan on client
Scan computers.
Start Power Eraser Runs a Power Eraser analysis on the selected computers. You should typically run Power
Analysis Eraser only on a single computer or a small number of computers. You should only run Power
Eraser when computers exhibit instability or have persistent problems. Unlike other scans,
Power Eraser does not automatically remediate any potential threats. You must review the
detections in the logs and specify which risks you want to remove or leave alone.
Note: Mac and Linux client computers do not process this command.
See Starting Power Eraser analysis from Symantec Endpoint Protection Manager
on page 743.
See Restarting the client computers from Symantec Endpoint Protection Manager
on page 124.
Note: You can ensure that a Windows client does not restart. You can add a registry key on
the client that keeps it from restarting even if an administrator issues a restart command.
Table 10-3 Commands that you can run on client computers (continued)
Commands Description
Enable Auto-Protect Enables Auto-Protect for the file system on the client computers.
By default, Auto-Protect for the file system is enabled. You might need to enable Auto-Protect
from the console if you have allowed users to change the setting or if you disable Auto-Protect.
You can lock the setting so that users on client computers cannot disable Auto-Protect.
If you want to enable or disable Auto-Protect for email, you must include the setting in the
Virus and Spyware Protection policy.
Enable Network Enables or disables the firewall and enables intrusion prevention on the client computers.
Threat Protection and
Note: Linux client computers do not process this command.
Disable Network
Threat Protection See Managing firewall protection on page 323.
Collect file fingerprint Generates a non-editable file fingerprint list from the selected clients. The collected fingerprint
list list appears on the Policies tab under Policy Components > File Fingerprint Lists. Typically,
you run this command on a single computer or small group of computers. If you select multiple
computers, the command collects a separate list for each computer.
Note: Mac and Linux client computers do not process this command.
For the commands that enable or disable a protection, you disable the protection
to troubleshoot problems on the client computer.
See About enabling and disabling protection when you need to troubleshoot
problems on page 239.
You can configure a limited administrator to have rights to some or none of these
commands.
See Adding an administrator account on page 276.
See Management features based on platform on page 752.
Managing clients 244
Running commands on client computers from the console
Note: You can also cancel a scan in progress by clicking the Cancel Scan icon
in the Command column of the scan command.
DisableRebootCommand REG_DWORD 1
When you add a client, it defaults to computer mode, which takes precedence over
user mode. Symantec recommends that you use computer mode. Linux clients are
only installed in computer mode.
Mode Description
Computer mode The client computer gets the policies from the group of which the
computer is a member. The client protects the computer with the same
policies, regardless of which user is logged on to the computer. The
policy follows the group that the computer is in. Computer mode is the
default setting. Many organizations configure a majority of clients in
computer mode. Based on your network environment, you might want
to configure a few clients with special requirements as users.
You cannot switch from user mode to computer mode if the computer
name is already in another group. Switching to computer mode deletes
the user name of the client from the group and adds the computer name
of the client into the group.
User mode The client computer gets the policies from the group of which the user
is a member. The policies change, depending on which user is logged
on to the client. The policy follows the user.
You cannot switch from computer mode to user mode if the user's logon
name and the computer name are already contained in any group.
Switching to user mode deletes the computer name of the client from
the group. It then adds the user name of the client into the group.
When you deploy a client installation package, you specify which group the client
goes in. You can later specify the client to be in user mode or computer mode. If
the client later gets deleted or disconnected and then gets added again and
reconnected, the client returns to the original group. However, you can configure
the client to stay with the group it was last moved to in user mode or computer
mode. For example, a new user might log on to a client that is configured in user
mode. The client then stays in the group that the previous user was in.
You configure these settings by clicking Clients > Policies, and then
Communications Settings.
Managing clients 247
Configuring a client to detect unmanaged devices
7 Click OK.
8 Click OK.
To display the list of unauthorized devices that the client detects
1 In the console, click Home.
2 On the Home page, in the Security Status section, click More Details.
3 In the Security Status Details dialog box, scroll to the Unknown Device
Failures table.
4 Close the dialog box.
For the Windows client, you can configure all the options. For the Mac client, only
the notification area icon and some IPS options are available in server control and
client control.
What are the user control levels?
Changing the user control level
See Preventing and allowing users to change the client's user interface on page 250.
Server control Gives the users the least control over the client. Server control locks the managed
settings so that users cannot configure them. In Server control, changes can be made
to unlocked settings, but they are overwritten when the next policy is applied.
Client control Gives the users the most control over the client. Client control unlocks the managed
settings so that users can configure them. Client-modified settings take precedence
over server settings. They are not overwritten when the new policy is applied, unless
the setting has been locked in the new policy.
Client control is useful for employees who work in a remote location or a home location.
Note: The end user must be in a Windows administrators group to change any of the
settings in client mode or mixed mode.
Mixed control Gives the user a mixture of control over the client. You determine which options you
let users configure by setting the option to server control or to client control. In client
control, only the user can enable or disable the setting. In server control, only you can
enable or disable the setting.
Clients that run in client control or mixed control switch to server control when the
server applies a Quarantine policy.
3 Under Location-specific Policies and Settings, under the location you want
to modify, expand Location-specific Settings.
4 To the right of Client User Interface Control Settings, click Tasks > Edit
Settings.
5 In the Client User Interface Control Settings dialog box, do one of the
following options:
Click Server control, and then click Customize.
Configure any of the settings, and then click OK.
Click Client control.
Click Mixed control, and then click Customize.
Configure any of the settings, and then click OK.
6 Click OK.
Note: Most of these settings apply to the Windows client only. You can configure
a few options on the Mac client in server control only.
4 For some of the options that you set to Server, click the Client User Interface
Settings tab to configure them:
For information on where in the console you configure the remaining options
that you set to Server, click Help. For example, to enable firewall settings,
configure them in the Firewall policy.
See Enabling communications for network services instead of adding a rule
on page 329.
See Detecting potential attacks and spoofing attempts on page 332.
See Enabling network intrusion prevention or browser intrusion prevention
on page 373.
5 On the Client User Interface Settings tab, check the option's check box so
that the option is available on the client.
6 Click OK.
7 Click OK.
Managing clients 252
Collecting user information
Note: After you enable the message to appear on the client computer for the first
time, and the user responds with the requested information, the message does not
appear again. Even if you edit any of the fields or disable and enable the message
again, the client does not display a new message. However, the user can edit the
information at any time, and the management server retrieves that information.
7 Under Select the fields that will be displayed for the user to provide input,
choose the type of information to collect, and then click Add.
You can select one or more fields simultaneously by pressing the Shift key or
the Control key.
8 In the Optional column, check the check box next to any fields that you want
to define as optional for the user to complete.
9 Click OK.
your network. Some employees may connect to your network using their own
personal computers, and you may need to manage these clients differently.
In all these cases, you must deal with greater security risk. Connections may be
less secure, or the client computers may be less secure, and you may have less
control over some clients. To minimize these risks to your overall network security,
you should assess the different kinds of remote access that clients have to your
network. You can then apply more stringent security policies based on your
assessment.
To manage the clients that connect to your network differently because of the
security risks that they pose, you can work with Symantec Endpoint Protection's
location awareness.
You apply different policies to clients that pose a greater risk to your network based
on their location. A location in Symantec Endpoint Protection is defined as the type
of connection that a client computer uses to connect to your network. A location
can also include information about whether the connection is located inside or
outside your corporate network.
You define locations for a group of clients. You then assign different policies to
each location. Some security settings can be assigned to the entire group regardless
of location. Some settings are different depending on location.
Task Description
Set up locations for groups of See Managing locations for remote clients on page 256.
remote clients
Strengthen your security policies See About strengthening your security policies for remote
clients on page 267.
Turn on client notifications See About turning on notifications for remote clients
on page 269.
Managing remote clients 256
Managing locations for remote clients
Task Description
Customize client log management Customize the log settings for remote clients, especially
settings if clients are offline for several days. To reduce bandwidth
and the load on your management servers, make the
following changes:
Monitor remote clients See About monitoring remote clients on page 269.
Some of the configuration options that you may want to customize for your remote
clients are location-independent. These options are either inherited from the parent
group or set independently. If you create a single group to contain all remote clients,
then the location-independent settings are the same for the clients in the group.
The following settings are location-independent:
Custom intrusion prevention signatures
System Lockdown settings
Network application monitoring settings
LiveUpdate content policy settings
Client log settings
Client-server communications settings
General security-related settings, including location awareness and Tamper
Protection
To customize any of these location-independent settings, such as how client logs
are handled, you need to create separate groups.
Some settings are specific to locations.
As a best practice, you should not allow users to turn off the following protections:
Auto-Protect
SONAR
Tamper Protection
The firewall rules that you have created
Managing remote clients 258
Managing locations for remote clients
Tasks Description
Plan locations You should consider the different types of security policies that
you need in your environment to determine the locations that you
should use. You can then determine the criteria to use to define
each location. It is a best practice to plan groups and locations
at the same time.
Enable location To control the policies that are assigned to clients contingent on
awareness the location from which the clients connect, you can enable
location awareness.
Assign default locations All groups must have a default location. When you install the
console, there is only one location, called Default. When you
create a new group, its default location is always Default. You
can change the default location later after you add other locations.
The default location is used if one of the following cases occurs:
See the article Best Practices for Symantec Endpoint Protection Location Awareness.
See Configuring communication settings for a location on page 266.
Managing remote clients 259
Enabling location awareness for a client
Note: If you turn off My Company group inheritance and then you add groups, the
added groups do not inherit the locations that you set up for the My Company group.
The following suggestions represent the best practices for Scenario One.
To set up the office location for the clients located in the office
1 On the Clients page, select the group that you want to add a location for.
2 On the Policies tab, under Tasks, click Add Location.
3 In the Add Location Wizard, click Next.
4 Type a name for the location and optionally, add a description of it, and then
click Next.
5 In the list box, click Client can connect to management server from the list,
and then click Next.
6 Click Finish, and then click OK.
7 Under Tasks, click Manage Locations, and then select the location you
created.
8 Click Add, and then click Criteria with AND relationship.
9 In the Specify Location Criteria dialog box, from the Type list, click Network
Connection Type.
Managing remote clients 263
Setting up Scenario One location awareness conditions
10 Click If the client computer does not use the network connection type
specified below.
11 In the bottom list box, select the name of the VPN client that your organization
uses, and then click OK.
12 Click OK to exit the Manage Locations dialog box.
To set up the remote location for the clients logging in over a VPN
1 On the Clients page, select the group that you want to add a location for.
2 On the Policies tab, under Tasks, click Add Location.
3 In the Add Location Wizard, click Next.
4 Type a name for the location and optionally, add a description of it, and then
click Next.
5 In the list box, click Network connection type.
6 In the Connection Type list box, select the name of the VPN client that your
organization uses, and then click Next.
7 Click Finish.
8 Click OK.
To set up the remote location for the clients not logging on over a VPN
1 On the Clients page, select the group that you want to add a location for.
2 On the Policies tab, under Tasks, click Add Location.
3 In the Add Location Wizard, click Next.
4 Type a name for the location, optionally add a description of it, and then click
Next.
5 In the list box, leave No specific condition, and then click Next.
By using these settings, this location's policies, which should be the strictest
and most secure, are used as the default location policies.
6 Click Finish, and then click OK.
See Setting up Scenario Two location awareness conditions on page 264.
See Managing remote clients on page 254.
Managing remote clients 264
Setting up Scenario Two location awareness conditions
Note: You may have some clients that use Ethernet connections in the office while
other clients in the office use wireless connections. For this reason, you set the last
condition in the procedure for wireless clients in the office. This condition lets you
create an Ethernet location Firewall policy rule to block all wireless traffic when both
kinds of connections are used simultaneously.
To set up the office location for the clients that are logged on over Ethernet
1 On the Clients page, select the group that you want to add a location for.
2 Under Tasks, click Add Location.
3 In the Add Location Wizard, click Next.
4 Type a name for the location, optionally add a description of it, and then click
Next.
5 In the list box, select Client can connect to management server, and then
click Next.
6 Click Finish.
7 Click OK.
Managing remote clients 265
Setting up Scenario Two location awareness conditions
8 Under Tasks, click Manage Locations, and then select the location you
created.
9 Beside Switch to this location when, click Add, and then select Criteria with
AND relationship.
10 In the Specify Location Criteria dialog box, from the Type list, click Network
Connection Type.
11 Click If the client computer does not use the network connection type
specified below.
12 In the bottom list box, select the name of the VPN client that your organization
uses, and then click OK.
13 Click Add and then click Criteria with AND relationship.
14 In the Specify Location Criteria dialog box, from the Type list, click Network
Connection Type.
15 Click If the client computer uses the network connection type specified
below.
16 In the bottom list box, select Ethernet, and then click OK.
17 Click OK to exit the Manage Locations dialog box.
To set up the office location for the clients that are logged on over a wireless
connection
1 On the Clients page, select the group that you want to add a location for.
2 Under Tasks, click Add Location.
3 In the Add Location Wizard, click Next.
4 Type a name for the location, optionally add a description of it, and then click
Next.
5 In the list box, click Client can connect to management server, and then
click Next.
6 Click Finish.
7 Click OK.
8 Under Tasks, click Manage Locations, and then select the location that you
created.
9 Beside Switch to this location when, click Add, and then click Criteria with
AND relationship.
10 In the Specify Location Criteria dialog box, from the Type list, click Network
Connection Type.
Managing remote clients 266
Configuring communication settings for a location
11 Click If the client computer does not use the network connection type
specified below.
12 In the bottom list box, select the name of the VPN client that your organization
uses, and then click OK.
13 Click Add, and then click Criteria with AND relationship.
14 In the Specify Location Criteria dialog box, from the Type list, click Network
Connection Type.
15 Click If the client computer does not use the network connection type
specified below.
16 In the bottom list box, click Ethernet, and then click OK.
17 Click Add, and then click Criteria with AND relationship.
18 In the Specify Location Criteria dialog box, from the Type list, click Network
Connection Type.
19 Click If the client computer uses the network connection type specified
below.
20 In the bottom list box, click Wireless, and then click OK.
21 Click OK to exit the Manage Locations dialog box.
See Setting up Scenario One location awareness conditions on page 262.
See Managing remote clients on page 254.
Whether the management server randomizes content downloads from the default
management server or a Group Update Provider.
Note: Only some of these settings can be configured for Mac clients.
Scenario Recommendation
Remote location where users Assign the strictest security policies to clients that log on remotely without using
log on without a VPN a VPN.
Enable NetBIOS protection.
Note: Do not enable NetBIOS protection for the location where a remote client is
logged on to the corporate network through a VPN. This rule is appropriate only
when remote clients are connected to the Internet, not to the corporate network.
Block all local TCP traffic on the NetBIOS ports 135, 139, and 445 to increase
security.
Remote location where users Leave as-is all the rules that block traffic on all adapters. Do not change those
log on through a VPN rules.
Leave as-is the rule that allows VPN traffic on all adapters. Do not change that
rule.
Change the Adapter column from All Adapters to the name of the VPN adapter
that you use for all rules that use the action Allow.
Enable the rule that blocks all other traffic.
Note: You need to make all of these changes if you want to avoid the possibility of
split tunneling through the VPN.
Office locations where users Use your default Firewall policy. For the wireless connection, ensure that the rule to
log on through Ethernet or allow wireless EAPOL is enabled. 802.1x uses the Extensible Authentication Protocol
wireless connections over LAN (EAPOL) for connection authentication.
Display Description
Home > Endpoint Status Displays whether the content is up to date or to see if any of the protections
are turned off.
You can check the following status conditions:
You can click Details to see the status for each client.
Home > Security Status Displays the system security overview. View the Virus and Risks Activity
Summary to see if your network is under attack.
You can click Details to see the status for each security protection
technology.
Home > Virus and Risks Activity Displays the detected virus and risk activity, and the actions taken, such as
Summary cleaned, blocked, or quarantined.
Monitors > Summary Type > Network Displays the information about attack types and sources.
Threat Protection
Changing the password for an administrator account and the embedded database
Task Description
Add administrator Add accounts for administrators who need access to the Symantec Endpoint Protection
accounts Manager console.
Task Description
Unlock or lock an By default, Symantec Endpoint Protection Manager locks out an administrator after a user
administrator account tries to log on to Symantec Endpoint Protection Manager using the administrator account too
many times. You can configure these settings to increase the number of tries or time the
administrator is locked out.
If an administrator is locked out of their account, they must wait the specified time before
logging on again. You cannot unlock an account during the lockout interval.
See Unlocking an administrator's account after too many logon attempts on page 294.
Change and reset lost Change the password for your account or another administrator's account.
passwords See Changing the password for an administrator account and the embedded database
on page 286.
Reset a lost password using the Forgot your password? link that appears on the
management server logon screen. The administrator receives an email that contains a
link to activate a temporary password.
See Resetting a forgotten Symantec Endpoint Protection Manager password on page 287.
See Displaying the Forgot your password? link so that administrators can reset lost
passwords on page 289.
Allow administrators to save their user name and password on the management server
logon screen.
See Displaying the Remember my user name and Remember my password check boxes
on the logon screen on page 291.
Force the administrator's logon password to expire after a certain number of days.
See Displaying the Remember my user name and Remember my password check boxes
on the logon screen on page 291.
Configure logon You can configure the following logon options for each type of administrator:
options for Symantec
Display a message for administrators to read before they log on.
Endpoint Protection
See Displaying a message for administrators to see before logging on to the Symantec
Manager
Endpoint Protection Manager console on page 291.
Allow or block log on access to the management console, so that certain administrators
can, or cannot, log on remotely.
See Granting or blocking access to remote Symantec Endpoint Protection Manager
consoles on page 292.
Changing how long an administrator can stay logged on to the management server.
See Changing the time period for staying logged on to the console on page 295.
See Logging on to the Symantec Endpoint Protection Manager console on page 48.
Managing administrator accounts and passwords 274
About administrator accounts and access rights
System administrator System administrators can log on to the Symantec Endpoint Protection Manager console
with complete, unrestricted access to all features and tasks.
A system administrator can create and manage other system administrator accounts, domain
administrator accounts, and limited administrator accounts.
A system administrator can perform the following tasks:
Administrator Administrators are domain administrators who can view and manage a single domain. A
domain administrator has the same privileges as a system administrator, but for a single
domain only.
By default, the domain administrator has full system administrator rights to manage a domain,
but not a site. You must explicitly grant site rights within a single domain. Domain
administrators can modify the site rights of other administrators and limited administrators,
though they cannot modify the site rights for themselves.
Create and manage administrator accounts and limited administrator accounts within a
single domain.
Domain administrators cannot modify their own site rights. System administrators must
perform this function.
Run reports, manage sites, and reset passwords. You must explicitly configure reporting
rights to groups that are migrated from Symantec AntiVirus 10.x.
Cannot administer licenses. Only system administrators can administer licenses.
Limited administrator Limited administrators can log on to the Symantec Endpoint Protection Manager console
with restricted access. Limited administrators do not have access rights by default. A system
administrator role must explicitly grant access rights to allow a limited administrator to perform
tasks.
Parts of the management server user interface are not available to limited administrators
when you restrict access rights. For example:
Limited administrators without reporting rights cannot view the Home, Monitors, or
Reports pages.
Limited administrators without policy rights cannot view or modify the policy. In addition,
they cannot apply, replace, or withdraw a policy.
RSA SecurID authentication Authenticates the administrators by using RSA SecurID token
(not software RSA tokens), RSA SecurID card, or RSA
keypad card (not RSA smart cards).
You can check whether the directory server authenticates the account name
by clicking Check Account.
See Connecting Symantec Endpoint Protection Manager to a directory
server on page 226.
See Checking the authentication to a directory server on page 282.
3 Click OK.
4 In the Confirm Change dialog box, type the password that you use to log on
to Symantec Endpoint Protection Manager, and then click OK.
When you switch between authentication methods, you must type the
administrator account's password.
4 Ensure that the sdconf.rec file on the RSA Authentication Manager server is
accessible on the network.
5 Assign a synchronized SecurID card or key fob to a management server
account; activate the logon name on the RSA Authentication Manager server.
6 Ensure that the administrator has the RSA PIN or password available.
Symantec supports the following types of RSA logons:
RSA SecurID token (not software RSA tokens)
RSA SecurID card
RSA keypad card (not RSA smart cards)
To log on to the management server with the RSA SecurID, an administrator needs
a logon name, the token (hardware), and a PIN.
To configure the Symantec Endpoint Protection Manager server to use RSA SecurID
authentication
1 Log on to the Symantec Endpoint Protection Manager console, and then click
Admin > Servers.
2 Under Servers, under Local Site, click the management server.
3 Under Tasks, click Configure SecurID authentication.
4 In the Welcome to the Configure SecurID Authentication Wizard panel,
click Next.
Managing administrator accounts and passwords 281
Changing the authentication method for administrator accounts
Step 1 Add multiple directory To make testing easier for anonymous access, add at least two directory
server connections server entries. Use one entry to test the authentication, and the second entry
to test anonymous access. These entries all use the same directory server
with different configurations.
Use the following information to set up the directory servers for this example:
CN=John Smith
OU=test
DC=<sampledomain>
DC=local
The example uses the default Active Directory LDAP (389) but can also use
Secure LDAP (636).
Step 2 Add multiple You add multiple system administrator accounts. The account for anonymous
administrator accounts access does not have a user name or password.
See To add the administrator accounts using the directory server entries
on page 284.
To add the directory server connections to check Active Directory and LDAP server
authentication
1 On the console, click Admin > Servers, select the default server, and click
Edit the server properties.
2 On the Directory Servers tab, click Add.
3 On the General tab, add the following directory server configurations, and then
click OK.
Directory server 1:
Name: <sampledomain> Active Directory
Server Type: Active Directory
Server IP Address or Name: server01.<sampledomain>.local
User Name: <sampledomain>\administrator
Password: <directory server password>
Managing administrator accounts and passwords 284
Checking the authentication to a directory server
Directory server 2:
Name: <sampledomain> LDAP with User Name
Server Type: LDAP
Server IP Address or Name: server01.<sampledomain>.local
LDAP Port: 389
LDAP BaseDN: DC=<sampledomain>, DC=local
User Name: <sampledomain>\administrator
Password: <directory server password>
Directory server 3 (for anonymous authentication):
Name: <sampledomain> LDAP without User Name
Server Type: LDAP
Server IP Address or Name: server01.<sampledomain>.local
LDAP Port: 389
LDAP BaseDN: <empty>
Leave this field empty when you use anonymous access.
User Name: <empty>
Password: <empty>
After you click OK, a warning appears. But the directory server is valid.
When you try to add a BaseDN without a user name and password, the
warning appears.
Note: When you configure the management server and select the embedded
database, the password you enter for the default administrator account, admin, also
becomes the database password. If you change the default administrator's password,
the database password does not change automatically. As of 14, you can change
the database password by rerunning the Management Server Configuration Wizard
and reconfiguring Symantec Endpoint Protection Manager.
See Reinstalling or reconfiguring Symantec Endpoint Protection Manager
on page 708.
If you change the password to fix an administrator account lockout, the administrator
must still wait for the lockout period to expire.
See Unlocking an administrator's account after too many logon attempts
on page 294.
To change the password for an administrator account
1 In the console, click Admin > Administrators.
2 Under Administrators, select the administrator account, and then click Change
password.
Press F1 to see the password restrictions.
3 Type both your password and the administrator's new password.
4 Click Change.
See Resetting a forgotten Symantec Endpoint Protection Manager password
on page 287.
See Displaying the Forgot your password? link so that administrators can reset
lost passwords on page 289.
In versions 12.1 RU1 (12.1.1) and earlier, you can use the ResetPass.bat script,
found in the \Symantec Endpoint Protection Manager\Tools installation folder.
This script forcefully resets the default administrator account password to admin if
it is not linked to an Active Directory account.
Symantec no longer supports the script. In versions 12.1 RU1 MP1 (12.1.1.1) and
later, the script has not been tested and may cause damage to Symantec Endpoint
Protection Manager or the database.
For 12.1.5 and later, you can display an option for administrators to use a password
that never expires. This option is disabled by default to increase security, so you
must enable it first. After you enable the option, the option appears on the
Authentication tab for an administrator account.
To enable Symantec Endpoint Protection Manager logon passwords to never expire
1 In the console, click Admin.
2 On the Admin page, click Domains.
3 Under Domains, select the domain for which to allow administrators to save
logon credentials.
4 Click Edit Domain Properties.
5 On the Passwords tab, click Allow never expiring passwords for
administrators.
6 Click OK.
7 Click Admin > Administrators, and open the administrator account.
8 On the Authentication tab, click Password never expires, and then click OK.
See Resetting a forgotten Symantec Endpoint Protection Manager password
on page 287.
See Unlocking an administrator's account after too many logon attempts
on page 294.
To display the Remember my user name and Remember my password check boxes
on the logon screen
1 In the console, click Admin.
2 On the Admin page, click Domains.
3 Under Domains, select the domain for which to allow administrators to save
logon credentials.
4 Click Edit Domain Properties.
5 On the Passwords tab, check Allow users to save credentials when logging
on.
6 Click OK.
See Resetting a forgotten Symantec Endpoint Protection Manager password
on page 287.
For example, you may want to grant access in all areas that you manage. However,
you may want to deny access to a console that is located in a public area.
To grant or deny access to a remote console
1 In the console, click Admin, and then click Servers.
2 Under Servers, select the server for which you want to change the remote
console access permission.
3 Under Tasks, click Edit the server properties.
4 On the General tab, click Granted Access or Denied Access.
5 If you want to specify IP addresses of the computers that are exempt from this
console access permission, click Add.
Computers that you add become exceptions. If you click Granted Access, the
computers that you specify are denied access. If you click Denied Access,
the computers that you specify are granted access. You can create an exception
for a single computer or a group of computers.
6 In the Deny Console Access dialog box, click one of the following options:
Single Computer
For one computer, type the IP address.
Group of Computers
For several computers, type both the IP address and the subnet mask for
the group.
7 Click OK.
The computers now appear in the exceptions list. For each IP address and
mask, its permission status appears.
If you change Granted Access to Denied Access or vice versa, all exceptions
change as well. If you have created exceptions to deny access, they now have
access.
8 Click Edit All to change the IP addresses or host names of those computers
that appear on the exceptions list.
The IP Address Editor appears. The IP Address Editor is a text editor that
lets you edit IP addresses and subnet masks.
9 Click OK.
10 When you finish adding exceptions to the list or editing the list, click OK.
See Adding an administrator account on page 276.
See Logging on to the Symantec Endpoint Protection Manager console on page 48.
Managing administrator accounts and passwords 294
Unlocking an administrator's account after too many logon attempts
About domains
Adding a domain
About domains
When you install a management server, the Symantec Endpoint Protection Manager
console includes one domain, which is called Default. A domain is a structural
container in the console that you use to organize a hierarchy of groups, clients,
computers, and policies. You set up additional domains to manage your network
resources.
Note: The domains in Symantec Endpoint Protection Manager are not equivalent
to Windows domains or other network domains.
Each domain that you add shares the same management server and database,
and it provides an additional instance of the console. All data in each domain is
completely separate. This separation prevents administrators in one domain from
viewing data in other domains. You can add an administrator account so that each
domain has its own administrator. These administrators can view and manage only
the contents of their own domain.
If your company is large, with sites in multiple regions, you may need to have a
single view of management information. You can delegate administrative authority,
physically separate security data, or have greater flexibility in how users, computers,
and policies are organized. If you are a managed service provider (MSP), you may
need to manage multiple independent companies, as well as Internet service
Managing domains 297
About domains
providers. To meet these needs, you can create multiple domains. For example,
you can create a separate domain for each country, region, or company.
Customer B
Customer C
SEPM database
(segregated by domain
https https https and customer)
When you add a domain, the domain is empty. You must set the domain to be the
current domain. You then add administrators, groups, clients, computers, and
policies to this domain.
You can copy policies from one domain to another. To copy policies between
domains, you export the policy from the originating domain and you import the policy
into the destination domain.
You can also move clients from one domain to another. To move clients between
domains, the administrator of the old domain must delete the client from the client
group. You then replace the Communication Settings file on the client with one from
the new domain.
You can disable a domain if you no longer need it. Ensure that it is not set as the
current domain when you attempt to disable it.
See Adding a domain on page 298.
See Managing administrator accounts on page 272.
See Switching to the current domain on page 298.
See Restoring client-server communication settings by using the SylinkDrop tool
on page 724.
Managing domains 298
Adding a domain
Adding a domain
You create a domain to organize a hierarchy of groups, users, clients, and policies
in your organization. For example, you may want to add domains to organize users
by division.
Note: You can use a domain ID for disaster recovery. If all the management servers
in your organization fail, you need to rebuild the management server by using the
same ID as the old server. You can get the old domain ID from the sylink.xml file
on any client.
To add a domain
1 In the console, click Admin.
2 On the Admin page, click Domains.
3 Under Tasks, click Add Domain.
4 In the Add Domain dialog box, type a domain name, an optional company
name, and optional contact information.
5 If you want to add a domain ID, click Advanced and then type the value in the
text box.
6 Click OK.
See About domains on page 296.
Chapter 19. Managing the information that the management server and clients
send to Symantec
Chapter 21. Managing application control, device control, and system lockdown
Adding a policy
Editing a policy
Replacing a policy
Searching for information about the applications that the computers run
Using policies to manage security 302
Manually updating policies on the client
Task Description
Add a policy If you do not want to use one of the default policies, you can add
a new policy.
Task Description
Lock and unlock policy You can lock and unlock some Virus and Spyware Protection
settings policy settings. Computer users cannot change locked policy
settings. A padlock icon appears next to a lockable policy setting.
Edit a policy If you want to change the settings in an existing policy, you can
edit it. You can increase or decrease the protection on your
computers by modifying its security policies. You do not have to
reassign a modified policy unless you change the group
assignment.
Assign a policy To put a policy into use, you must assign it to one or more groups
or locations.
Test a policy Symantec recommends that you always test a new policy before
you use it in a production environment.
Update the policies on Based on the available bandwidth, you can configure a client to
clients use push mode or pull mode as its policy update method.
Replace a policy You can replace a shared policy with another shared policy. You
can replace the shared policy in either all locations or for one
location.
Task Description
Copy and paste a policy Instead of adding a new policy, you may want to copy an existing
policy to use as the basis for the new policy.
You can copy and paste policies on either the Policies page or
the Policies tab on the Clients page.
Note: You can also copy all the policies in a group and paste
them into another group, from the Policies tab on the Clients
page.
Convert a shared policy You can copy the content of a shared policy and create a
to a non-shared policy non-shared policy from that content.
Export and import a You can export an existing policy if you want to use it at a different
policy site or management server. You can then import the policy and
apply it to a group or to a specific location.
You can withdraw any type of policy except a Virus and Spyware
Protection policy and a LiveUpdate Settings policy.
Task Description
Delete a policy If a policy is assigned to one or more groups and locations, you
cannot delete it until you have unassigned it from all the groups
and locations. You can also replace the policy with another policy
Check that the client has You can check whether the client has the latest policy. If not, you
the latest policy can manually update the policy on the client.
Virus and Spyware The Virus and Spyware Protection policy provides the
Protection policy following protection:
Intrusion Prevention policy The Intrusion Prevention policy automatically detects and
blocks network attacks and attacks on browsers as well as
protects applications from vulnerabilities.
Application and Device The Application and Device Control policy protects a
Control system's resources from applications and manages the
peripheral devices that can attach to computers.
Host Integrity The Host Integrity policy provides the ability to define,
enforce, and restore the security of client computers to keep
enterprise networks and data secure. You use this policy to
verify that the clients that access your network run the
antivirus software, patches, and other application criteria that
you define.
Adding a policy
Symantec Endpoint Protection Manager comes with a default policy for each type
of protection. If you need to customize a policy, you add one and edit it. You can
create multiple versions of each type of policy.
Symantec recommends that you test all new policies before you use them in a
production environment.
To add a new policy
1 In the console, click Policies.
2 On the Policies page, select a policy type, and then click the link to add a new
policy.
3 Modify the policy settings to increase or decrease protection.
4 Click OK to save the policy.
5 Optionally assign the new policy to a group.
You can assign a new policy to a group during or after policy creation. The
new policy replaces the currently assigned policy of the same protection type.
See Assigning a policy to a group or location on page 310.
See Performing the tasks that are common to all policies on page 302.
Editing a policy
You can edit shared and non-shared policies on the Policies tab on the Clients
page as well as on the Policies page.
Locations as well as groups can share the same policy. You must assign a shared
policy after you edit it.
See Assigning a policy to a group or location on page 310.
Using policies to manage security 308
Copying and pasting a policy on the Policies page
8 You can click a link for the type of policy that you want to edit.
3 In the policy type Policies pane, click the specific policy that you want to copy.
4 On the Policies page, under Tasks, click Copy the Policy.
5 In the Copy Policy dialog box, check Do not show this message again if
you no longer want to be notified about this process.
To redisplay the Do not show this message again check box, click Admin
> Administrators, select your administrator account, and click Reset Copy
Policy Reminder.
6 Click OK.
To paste a policy in the Policies page
1 In the console, click Policies.
2 On the Policies page, under Policies, click the type of policy that you want to
paste.
3 In the policy type Policies pane, click the specific policy that you want to
paste.
4 On the Policies page, under Tasks, click Paste a Policy.
See Copying and pasting a policy on the Clients page on page 309.
Icon Description
A location that inherits from a parent group and has no policy that is assigned
to it.
A location that inherits from a parent group and has a policy that is assigned
to it
Replacing a policy
You may want to replace one shared policy with another shared policy. You can
replace the shared policy in either all locations or for individual locations.
When you replace a policy for all locations, the management server replaces the
policy only for the locations that have it. For example, suppose the Sales group
uses the Sales policy for three of its four locations. If you replace the Sales policy
with the Marketing policy, only those three locations receive the Marketing policy.
You may want a group of clients to use the same settings no matter what location
they are in. In this case, you can replace a non-shared policy with a shared policy.
You replace a non-shared policy with a shared policy for each location individually.
Using policies to manage security 312
Exporting and importing individual policies
See Performing the tasks that are common to all policies on page 302.
To replace a shared policy for all locations
1 In the console, click Policies.
2 On the Policies page, under Policies, click the type of policy that you want to
replace.
3 In the policy type Policies pane, click the policy.
4 In the Policies page, under Tasks, click Replace the Policy.
5 In the Replace policy type Policy dialog box, in the New policy type Policy
list box, select the shared policy that replaces the old one.
6 Select the groups and locations for which you want to replace the existing
policy.
7 Click Replace.
8 When you are prompted to confirm the replacement of the policy for the groups
and locations, click Yes.
To replace a shared policy or non-shared policy for one location
1 In the console, click Clients.
2 In the Clients page, under Clients, select the group for which you want to
replace a policy.
3 On the Policies tab, uncheck Inherit policies and settings from parent
group "group name".
You must disable inheritance for this group. If you do not uncheck inheritance,
you cannot replace a policy.
4 Under Location-specific Policies and Settings, scroll to find the location that
contains the policy.
5 Next to the policy that you want to replace, click Tasks, and then click Replace
Policy.
6 In the Replace Policy dialog box, in the New policy list box, select the
replacement policy.
7 Click OK.
You update the management server from an older release to a newer release.
You want to update the new management server with the policies that you
previously customized.
You want to export a policy for use at a different site.
You export and import each policy one at a time. Once you export a file, you import
it and apply it to a group or only to a location. You can export a shared or non-shared
policy for a specific location in the Clients page.
See Performing the tasks that are common to all policies on page 302.
To export a single policy from the Policies page
1 In the console, click Policies.
2 On the Policies page, under Policies, click the type of policy that you want to
export.
3 In the policy type Policies pane, click the specific policy that you want to
export.
4 In the Policies page, under Tasks, click Export the Policy.
5 In the Export Policy dialog box, locate the folder where you want to export
the policy file to, and then click Export.
To export a shared or non-shared policy from the Clients page
1 In the console, click Clients.
2 Under Clients, select the group for which you want to export a policy.
3 On the Policies tab, uncheck Inherit policies and settings from parent
group "group name".
You must disable inheritance for this group. If you do not uncheck inheritance,
you cannot export a policy.
4 Under Location-specific Policies and Settings, scroll to find the name of the
location whose policy you want to export.
5 Locate the specific policy for the location that you want to export.
6 To the right of the policy, click Tasks, and then click Export Policy.
7 In the Export Policy dialog box, browse to the folder into which you want to
export the policy.
8 In the Export Policy dialog box, click Export.
Using policies to manage security 314
About shared and non-shared policies
a policy in the Clients page, you can add a new policy by using any of the following
methods:
Add a new policy.
See Adding a policy on page 307.
Copy an existing policy to base the new policy on.
See Copying and pasting a policy on the Policies page on page 308.
See Copying and pasting a policy on the Clients page on page 309.
Import a policy that was previously exported from another site.
See Exporting and importing individual policies on page 312.
See Performing the tasks that are common to all policies on page 302.
See Converting a shared policy to a non-shared policy on page 315.
7 In the Overview dialog box, edit the name and description of the policy.
8 Modify the other policy settings as desired.
9 Click OK.
See Performing the tasks that are common to all policies on page 302.
Note: You must withdraw a policy or replace a policy from all groups and locations
before you can delete it.
You can withdraw all policies in the Policies page from a location or group except
for the following policies:
Virus and Spyware Protection
LiveUpdate Settings
You can only replace them with another Virus and Spyware Protection policy or
LiveUpdate policy.
See Replacing a policy on page 311.
See Assigning a policy to a group or location on page 310.
To unassign a shared policy in the Policies page
1 In the console, click Policies.
2 On the Policies page, under Policies, click the type of policy that you want to
withdraw.
3 In the policy type Policies pane, click the specific policy that you want to
withdraw.
4 On the Policies page, under Tasks, click Withdraw the Policy.
5 In the Withdraw Policy dialog box, check the groups and locations from which
you want to withdraw the policy.
Using policies to manage security 317
Locking and unlocking Virus and Spyware Protection policy settings
6 Click Withdraw.
7 When you are prompted to confirm the withdrawal of the policy from the groups
and locations, click Yes.
To unassign a shared or non-shared policy in the Clients page
1 In the console, click Clients.
2 On the Clients page, under Clients, select the group for which you want to
withdraw a policy.
3 On the Policies tab, uncheck Inherit policies and settings from parent
group "group name".
You must disable inheritance for this group. If you do not uncheck inheritance,
you cannot withdraw a policy.
4 Under Location-specific Policies and Settings, scroll to find the name of the
location for which you want to withdraw a policy.
5 Locate the policy for the location that you want to withdraw.
6 Click Tasks, and then click Withdraw Policy.
7 In the Withdraw Policy dialog box, click Yes.
See Performing the tasks that are common to all policies on page 302.
Note: The Mac and Linux clients do not monitor the applications and the services
that run on those computers.
You can perform several tasks to set up and use learned applications.
Steps Description
Search for applications You can use a query tool to search for the list of applications that
the client computers run. You can search on application-based
criteria or computer-based criteria. For example, you can find out
the version of Internet Explorer that each client computer uses.
Note: In some countries, it may not be permissible under local law to use the learned
applications tool under certain circumstances, such as to gain application use
information from a laptop when the employee logs on to your office network from
home using a company laptop. Before your use of this tool, please confirm that use
is permitted for your purposes in your jurisdiction. If it is not permitted, please follow
instructions for disabling the tool.
Note: The Mac and Linux clients do not monitor the applications and the services
that run on those computers.
You can set up a notification to be sent to your email address when each client in
a group or location runs an application.
See Setting up administrator notifications on page 620.
Note: You can modify this setting only for the subgroups that do not inherit their
policies and settings from a parent group.
To send the learned applications list to the management server for a group
1 In the console, click Clients.
2 Under View Clients, select a group.
3 On the Policies tab, click Communications Settings.
4 In the Communications Settings for group name dialog box, make sure
Learn applications that run on the client computers is checked.
5 Click OK.
To send learned applications to the management server for a location
1 In the console, click Clients.
2 Under View Clients, select a group.
3 Under Location-specific Policies and Settings, select the location, and then
expand Location-specific Settings.
Using policies to manage security 320
Searching for information about the applications that the computers run
Note: The Mac client does not monitor the applications and the services that run
on Mac computers.
Note: The information in the Search box is not collected until you enable the feature
that keeps track of all the applications that clients run. You can go to the Clients
page, Communications Settings dialog box for each group or location to enable
this feature.
To search for information about the applications that the computers run
1 In the console, click Policies.
2 On the Policies page, under Tasks, click Search for Applications.
3 In the Search for Applications dialog box, to the right of the Search for
applications in field, click Browse.
4 In the Select Group or Location dialog box, select a group of clients for which
you want to view the applications, and then click OK.
You can specify only one group at a time.
5 Make sure that Search subgroups is checked.
6 Do one of the following actions:
To search by user or computer information, click Based on client/computer
information.
To search by application, click Based on applications.
7 Click the empty cell under Search Field, and then select the search criterion
from the list.
The Search Field cell displays the criteria for the option that you selected. For
details about these criteria, click Help.
8 Click the empty cell under Comparison Operator, and then select one of the
operators.
9 Click the empty cell under Value, and then select or type a value.
The Value cell may provide a format or a value from the drop-down list,
depending on the criterion you selected in the Search Field cell.
10 To add an additional search criterion, click the second row, and then enter
information in the Search Field, Comparison Operator, and Value cells.
If you enter more than one row of search criteria, the query tries to match all
conditions.
11 Click Search.
12 In the Query Results table, do any of the following tasks:
Click the scroll arrows to view additional rows and columns.
Using policies to manage security 322
Searching for information about the applications that the computers run
Task Description
Read about firewall protection Before you configure your firewall protection, you should familiarize yourself with
the firewall.
See How a firewall works on page 324.
Task Description
Create a firewall policy Symantec Endpoint Protection installs with a default firewall policy. You can modify
the default policy or create new ones.
You must create a policy first before you configure firewall rules and firewall
protection settings for that policy.
Create and customize firewall Firewall rules are the policy components that control how the firewall protects client
rules computers from malicious attacks.
The default firewall policy contains default firewall rules. And when you create a
new policy, Symantec Endpoint Protection provides default firewall rules. However,
you can modify the default rules or create new ones.
Enable firewall protection settings After the firewall has completed certain operations, control is passed to a number
of components. Each component is designed to perform a different type of packet
analysis.
Monitor firewall protection Regularly monitor the firewall protection status on your computers.
See Running commands on client computers from the console on page 244.
See Configuring firewall settings for mixed control on page 330.
Prevents any unauthorized users from accessing the computers and networks
in your organization that connect to the Internet
Monitors the communication between your computers and other computers on
the Internet
Creates a shield that allows or blocks attempts to access the information on
your computer
Warns you of connection attempts from other computers
Warns you of connection attempts by the applications on your computer that
connect to other computers
The firewall reviews the packets of data that travel across the Internet. A packet is
a discrete unit of data that is part of the information flow between two computers.
Packets are reassembled at their destination to appear as an unbroken data stream.
Packets include the following information about the data:
The originating computer
The intended recipient or recipients
How the packet data is processed
Ports that receive the packets
Ports are the channels that divide the stream of data that comes from the Internet.
Applications that run on a computer listen to the ports. The applications accept
the data that is sent to the ports.
Network attacks exploit weaknesses in vulnerable applications. Attackers use these
weaknesses to send the packets that contain malicious programming code to ports.
When vulnerable applications listen to the ports, the malicious code lets the attackers
gain access to the computer.
See About the Symantec Endpoint Protection firewall on page 325.
See Managing firewall protection on page 323.
the inbound and the outbound packets against these rules. The firewall then allows
or blocks the packets based on the information that is specified in rules. When a
computer tries to connect to another computer, the firewall compares the type of
connection with its list of firewall rules. The firewall also uses stateful inspection of
all network traffic.
When you install the console for the first time, it adds a default Firewall policy to
each group automatically.
Every time you add a new location, the console copies a Firewall policy to the default
location automatically.
You determine the level of interaction that you want users to have with the client
by permitting or blocking their ability to configure firewall rules and firewall settings.
Users can interact with the client only when it notifies them of new network
connections and possible problems. Or they can have full access to the user
interface.
You can enable or disable the firewall protection as needed.
You can install the client with default firewall settings. In most cases you do not
have to change the settings. However, if you have a detailed understanding of
networks, you can make many changes in the client firewall to fine-tune the client
computer's protection.
See Managing firewall protection on page 323.
See How a firewall works on page 324.
See How the firewall uses stateful inspection on page 341.
See The types of security policies on page 305.
When you enable firewall protection, the policy allows all inbound IP-based network
traffic and all outbound IP-based network traffic, with the following exceptions:
The default firewall protection blocks inbound and outbound IPv6 traffic with all
remote systems.
Note: IPv6 is a network layer protocol that is used on the Internet. If you install
the client on the computers that run Microsoft Vista, the Rules list includes
several default rules that block the Ethernet protocol type of IPv6. If you remove
the default rules, you must create a rule that blocks IPv6.
The default firewall protection restricts the inbound connections for a few
protocols that are often used in attacks (for example, Windows file sharing).
Internal network connections are allowed and external networks are blocked.
Table 15-2 describes the tasks that you can perform to configure a new firewall
policy. You must add a firewall policy first, but thereafter, the remaining tasks are
optional and you can complete them in any order.
Task Description
Add a firewall policy When you create a new policy, you give it a name and a description. You also
specify the groups to which the policy is applied.
A firewall policy is automatically enabled when you create it. But you can disable if
you need to.
Create firewall rules Firewall rules are the policy components that control how the firewall protects client
computers from malicious incoming traffic and applications. The firewall automatically
checks all incoming packets and outgoing packets against these rules. It allows or
blocks the packets based on the information that is specified in rules. You can modify
the default rules, create new rules, or disable the default rules.
When you create a new Firewall policy, Symantec Endpoint Protection provides
default firewall rules.
Enable and customize You can send users a notification that an application that they want to access is
notifications to users that access blocked.
to an application is blocked
These settings are disabled by default.
See Notifying the users that access to an application is blocked on page 346.
Managing firewall protection 328
Creating a firewall policy
Task Description
Enable automatic firewall rules You can enable the options that automatically permit communication between certain
network services. These options eliminate the need to create the rules that explicitly
allow those services. You can also enable traffic settings to detect and block the
traffic that communicates through NetBIOS and token rings.
Configure protection and stealth You can enable settings to detect and log potential attacks on the client and block
settings spoofing attempts.
You can enable the settings that prevent outside attacks from detecting information
about your clients.
All of the protection options and stealth options are disabled by default.
Integrate the Symantec Endpoint You can specify the conditions in which Symantec Endpoint Protection disables the
Protection firewall with the Windows firewall. When Symantec Endpoint Protection is uninstalled, Symantec
Windows firewall Endpoint Protection restores the Windows firewall setting to the state it was in before
Symantec Endpoint Protection was installed.
The default setting is to disable the Windows firewall once only and to disable the
Windows firewall disabled message.
Configure peer-to-peer You can use peer-to-peer authentication to allow a remote client computer (peer)
authentication to connect to another client computer (authenticator) within the same corporate
network. The authenticator temporarily blocks inbound TCP and UDP traffic from
the remote computer until the remote computer passes the Host Integrity check.
You can allow outbound requests and inbound replies for the network connections
that are configured to use DHCP, DNS, and WINS traffic.
The filters allow DHCP, DNS, or WINS clients to receive an IP address from a
server. It also protects the clients against attacks from the network with the following
conditions:
If the client sends a request The client waits for five seconds to allow an inbound
to the server response.
If the client does not send a Each filter does not allow the packet.
request to the server
When you enable these options, Symantec Endpoint Protection permits the packet
if a request was made; it does not block packets. You must create a firewall rule to
block packets.
Note: To configure these settings in mixed control, you must also enable these
settings in the Client User Interface Mixed Control Settings dialog box.
Server control The user cannot create any firewall rules or enable firewall
settings.
Managing firewall protection 331
Creating a firewall policy
Client control The user can create firewall rules and enable all firewall
settings.
Mixed control The user can create firewall rules. You decide which firewall
settings the user can enable.
7 Click OK.
8 Click OK.
9 For each firewall setting that you set to Server, enable or disable the setting
in the Firewall policy.
See Managing firewall protection on page 323.
See Enabling communications for network services instead of adding a rule
on page 329.
See Detecting potential attacks and spoofing attempts on page 332.
See Running commands on client computers from the console on page 244.
The attackers IP address is recorded in the Security log. You can unblock an attack
by canceling a specific IP address or canceling all Active Response.
If you set the client to mixed control, you can specify whether the setting is available
on the client for the user to enable. If it is not available, you must enable it in the
Client User Interface Mixed Control Settings dialog box.
Updated IPS signatures, updated denial-of-service signatures, port scans, and MAC
spoofing also trigger an Active Response.
To automatically block connections to an attacking computer
1 In the console, open a Firewall policy.
2 On the Firewall Policy page in the left pane, click Protection and Stealth.
3 Under Protection Settings, check Automatically block an attacker's IP
address.
4 In the Number of seconds during which to block IP address ... seconds
text box, specify the number of seconds to block potential attackers.
You can enter a value from 1 to 999,999.
5 Click OK.
See Creating a firewall policy on page 326.
See Configuring firewall settings for mixed control on page 330.
See Editing a policy on page 307.
Enable port scan detection When this setting is enabled, Symantec Endpoint Protection
monitors all incoming packets that any security rule blocks.
If a rule blocks several different packets on different ports in
a short period of time, Symantec Endpoint Protection creates
a Security log entry.
Port scan detection does not block any packets. You must
create a security policy to block traffic when a port scan
occurs.
Managing firewall protection 333
Creating a firewall policy
Note: To configure these settings in mixed control, you must also enable these
settings in the Client User Interface Mixed Control Settings dialog box.
Note: To configure these settings in mixed control, you must also enable these
settings in the Client User Interface Mixed Control Settings dialog box.
4 Click OK.
5 If you are prompted, assign the policy to a location.
See Creating a firewall policy on page 326.
See Preventing users from disabling protection on client computers on page 248.
See Editing a policy on page 307.
Note: Symantec Endpoint Protection does not modify any existing Windows Firewall
policy rules or exclusions.
Task Description
Learn how firewall rules work and Before you modify the firewall rules, you should understand the following
what makes up a firewall rule information about how firewall rules work:
The relationship between the client's user control level and the user's
interaction with the firewall rules. The relationship between server rules and
client rules. See About firewall server rules and client rules on page 337.
How to order rules to ensure that the most restrictive rules are evaluated first
and the most general rules are evaluated last
See About the firewall rule, firewall setting, and intrusion prevention
processing order on page 338.
The implications of inheriting rules from a parent group and how inherited
rules are processed
See About inherited firewall rules on page 339.
That the client uses stateful inspection, which keeps track of the state of the
network connections
See How the firewall uses stateful inspection on page 341.
The firewall components that make up the firewall rule
When you understand about these triggers and how you can best use them,
you can customize your firewall rules to protect your clients and servers.
See About firewall rule application triggers on page 342.
See About firewall rule host triggers on page 347.
See About firewall rule network services triggers on page 350.
See About firewall rule network adapter triggers on page 352.
Add a new firewall rule You can perform the following tasks to manage firewall rules:
Add new firewall rules through the console using several methods
One method lets you add a blank rule that has default settings. The other
method offers a wizard that guides you through creating a new rule.
See Adding a new firewall rule on page 354.
Customize a rule by changing any of the firewall rule criteria
Export and import firewall rules from another firewall policy
See Importing and exporting firewall rules on page 355.
Copy and paste firewall rules
You can save time creating a new firewall rule by copying an existing rule
that is similar to the rule that you want to create. Then you can modify the
copied rule to meet your needs.
Enable or disable a firewall rule Firewall rules are automatically enabled. However, you may need to temporarily
disable a firewall rule to test the rule. The firewall does not inspect disabled rules.
Managing firewall protection 337
Managing firewall rules
Task Description
Customize a firewall rule After you create a new rule, or if you want to customize a default rule, you can
modify any of the firewall rule criteria.
Server control The client receives server rules but the user cannot view them.
The user cannot create client rules.
Mixed control The client receives server rules. The user can create client rules,
which are merged with server rules and client security settings.
Client control The client does not receive server rules. The user can create
client rules. You cannot view client rules.
See Preventing users from disabling protection on client computers on page 248.
Table 15-5 lists the order that the firewall processes server rules, client rules, and
client settings.
First Server rules with high priority levels (rules above the blue line in
the Rules list)
Table 15-5 Server rules and client rules processing priority (continued)
Third Server rules with lower priority levels (rules under the blue line
in the Rules list)
On the client, server rules under the blue line are processed after
client rules.
On the client, users can modify a client rule or security setting, but users cannot
modify a server rule.
Warning: If the client is in mixed control, users can create a client rule that allows
all traffic. This rule overrides all server rules under the blue line.
Table 15-6 shows the order in which the firewall processes the rules, firewall settings,
and intrusion prevention settings.
Priority Setting
Above the blue dividing line The rules that the policy inherits take precedence over the
rules that you create.
Managing firewall protection 340
Managing firewall rules
Below the blue dividing line The rules that you create take precedence over the rules that
the policy inherits.
Figure 15-1 shows how the Rules list orders rules when a subgroup inherits rules
from a parent group. In this example, the Sales group is the parent group. The
Europe Sales group inherits from the Sales group.
Figure 15-1 An example of how firewall rules inherit from each other
Rule 1 Rule 3
Rule 3
Rule 2
Note: If the group inherits all of its policies from a parent group, this option is
unavailable.
3 On the Rules tab, check Inherit Firewall Rules from Parent Group.
To remove the inherited rules, uncheck Inherit Firewall Rules from Parent
Group.
4 Click OK.
See Editing a policy on page 307.
See About inherited firewall rules on page 339.
See Managing firewall rules on page 335.
Note: For better protection, place the most restrictive rules first and the least
restrictive rules last.
See About the firewall rule, firewall setting, and intrusion prevention processing
order on page 338.
To change the order of firewall rules
1 In the console, open a Firewall policy.
2 In the Firewall Policy page, click Rules, and then select the rule that you want
to move.
3 Do one of the following tasks:
To process this rule before the previous rule, click Move Up.
To process this rule after the rule below it, click Move Down.
4 Click OK.
See Editing a policy on page 307.
See Managing firewall rules on page 335.
other connection information. Before the client inspects the firewall rules, it makes
the traffic flow decisions that are based on the connection information.
For example, if a firewall rule allows a computer to connect to a Web server, the
firewall logs the connection information. When the server replies, the firewall
discovers that a response from the Web server to the computer is expected. It
permits the Web server traffic to flow to the initiating computer without inspecting
the rule base. A rule must permit the initial outbound traffic before the firewall logs
the connection.
Stateful inspection eliminates the need to create new rules. For the traffic that is
initiated in one direction, you do not have to create the rules that permit the traffic
in both directions. The client traffic that is initiated in one direction includes Telnet
(port 23), HTTP (port 80), and HTTPS (port 443). The client computers initiate this
outbound traffic; you create a rule that permits the outbound traffic for these
protocols. Stateful inspection automatically permits the return traffic that responds
to the outbound traffic. Because the firewall is stateful in nature, you only need to
create the rules that initiate a connection, not the characteristics of a particular
packet. All packets that belong to an allowed connection are implicitly allowed as
being an integral part of that same connection.
Stateful inspection supports all rules that direct TCP traffic.
Stateful inspection does not support the rules that filter ICMP traffic. For ICMP
traffic, you must create the rules that permit the traffic in both directions. For
example, for the clients to use the ping command and receive replies, you must
create a rule that permits ICMP traffic in both directions.
The state table that maintains the connection information may be periodically cleared.
For example, it is cleared when a Firewall policy update is processed or if Symantec
Endpoint Protection services are restarted.
See How a firewall works on page 324.
See Managing firewall rules on page 335.
attacked the application and the client computer is not safe. If an application's
content is modified on an infrequent basis, it is likely that a patch was installed and
the client computer is safe. You can use this information to create a firewall rule
that allows or blocks an application.
You can configure the client to detect and monitor any application that runs on the
client computer and that is networked. Network applications send and receive traffic.
The client detects whether an application's content changes.
If you suspect that a Trojan horse has attacked an application, you can use network
application monitoring to configure the client to block the application. You can also
configure the client to ask users whether to allow or block the application.
An application's content changes for the following reasons:
A Trojan horse attacked the application.
The application was updated with a new version or an update.
You can add applications to a list so that the client does not monitor them. You may
want to exclude the applications that you think are safe from a Trojan horse attack,
but that have frequent and automatic patch updates.
You may want to disable network application monitoring if you are confident that
the client computers receive adequate protection from antivirus and antispyware
protection. You may also want to minimize the number of notifications that ask users
to allow or block a network application.
To block networked applications that might be under attack
1 In the console, click Clients.
2 Under Clients, select a group, and then click Policies.
3 On the Policies tab, under Location-independent Policies and Settings,
click Network Application Monitoring.
4 In the Network Application Monitoring for group name dialog box, click
Enable Network Application Monitoring.
5 In the When an application change is detected drop-down list, select the
action that the firewall takes on the application that runs on the client as follows:
Allow and Log Allows the application to run and records the information
in the security log.
To define an application Click Add, fill out one or more fields, and then click OK.
manually
9 Check the box beside the application to enable it; uncheck it to disable it.
10 Click OK.
See Managing firewall rules on page 335.
See Notifying the users that access to an application is blocked on page 346.
See About firewall rule application triggers on page 342.
See Searching for information about the applications that the computers run
on page 320.
See Configuring the management server to collect information about the applications
that the client computers run on page 319.
Note: Enabling too many notifications can not only overwhelm your users, but can
also alarm them. Use caution when enabling notifications.
3 On the Notifications tab, check the following options that you want to apply:
Add additional text to Click Set Additional Text and customize the
notification notification.
4 Click OK.
See Managing firewall protection on page 323.
See Enabling and disabling a firewall policy on page 329.
See Managing firewall rules on page 335.
See About firewall rule application triggers on page 342.
See Blocking networked applications that might be under attack on page 344.
Source and destination The source host and destination host is dependent on the
direction of traffic. In one case the local client computer might be
the source, whereas in another case the remote computer might
be the source.
Local and remote The local host is always the local client computer, and the remote
host is always a remote computer that is positioned elsewhere
on the network. This expression of the host relationship is
independent of the direction of traffic.
You can define multiple source hosts and multiple destination hosts.
Managing firewall protection 348
Managing firewall rules
Figure 15-2 illustrates the source relationship and destination relationship with
respect to the direction of traffic.
Source Destination
` HTTP
Symantec.com
SEP client
Destination Source
` RDP
`
SEP client
Other client
Figure 15-3 illustrates the local host and remote host relationship with respect to
the direction of traffic.
Local Remote
` HTTP
Symantec.com
SEP client
Local Remote
` RDP
`
SEP client
Other client
The hosts that you define on either side of the connection OR statement
(between the source and the destination)
For example, consider a rule that defines a single local host and multiple remote
hosts. As the firewall examines the packets, the local host must match the relevant
IP address. However, the opposing sides of the address may be matched to any
remote host. For example, you can define a rule to allow HTTP communication
between the local host and either Symantec.com, Yahoo.com, or Google.com. The
single rule is the same as three rules.
See Adding host groups on page 349.
See Blocking traffic to or from a specific server on page 360.
See Managing firewall rules on page 335.
Caution: Use caution when you configure this setting to a very low value. You run
the possibility of bringing down your DNS server if all of your systems access the
server every 5 seconds, for example.
the TCP protocol. You can create a firewall rule that allows or blocks network
services. A network service trigger identifies one or more network protocols that
are significant in relation to the described network traffic.
When you define TCP-based or UDP-based service triggers, you identify the ports
on both sides of the described network connection. Traditionally, ports are referred
to as being either the source or the destination of a network connection.
See Adding network services to the default network services list on page 351.
See Permitting clients to browse for files and printers in the network on page 362.
See Managing firewall rules on page 335.
Note: IPv4 and IPv6 are the two network layer protocols that are used on the Internet.
The firewall blocks the attacks that travel through IPv4, but not through IPv6. If you
install the client on the computers that run Windows Vista, the Rules list includes
several default rules that block the Ethernet protocol type of IPv6. If you remove
the default rules, you must create a rule that blocks IPv6.
Note: You can add a custom network service through a firewall rule. However, that
network service is not added to the default list. You cannot access the custom
network service from any other rule.
Note: You can add a custom network adapter through a firewall rule. However, that
network adapter is not added to the default list. You cannot access the custom
network adapter from any other rule.
Note: You can add a custom network adapter through a firewall rule. However, that
network adapter is not added to the default list. You cannot access the custom
network adapter from any other rule.
6 Click OK.
See Managing firewall rules on page 335.
See About firewall rule network adapter triggers on page 352.
See Controlling the traffic that passes through a network adapter on page 365.
Step Description
Step 1: Add a new firewall rule You can add new firewall rules through the console using several methods.
One method lets you add a blank rule that has default settings. The other
method offers a wizard that guides you through creating a new rule.
Another way that you can add a firewall rule is to export existing firewall rules
from another Firewall policy. You can then import the firewall rules and
settings so that you do not have to re-create them.
You can save time creating a new firewall rule by copying an existing rule
that is similar to the rule that you want to create. Then you can modify the
copied rule to meet your needs.
Step 2: Customize the firewall rule After you create a new rule, or if you want to customize a default rule, you
criteria (Optional) can modify any of the firewall rule criteria.
Add Firewall Rule If you add rules with the Add Firewall Rule wizard, ensure that you
wizard configure the rule. The wizard does not configure new rules with
multiple criteria.
You should specify both the inbound and the outbound traffic in the rule whenever
possible. You do not need to create inbound rules for traffic such as HTTP. The
Symantec Endpoint Protection client uses stateful inspection for TCP traffic.
Therefore, it does not need a rule to filter the return traffic that the clients initiate.
When you create a new firewall rule, it is automatically enabled. You can disable
a firewall rule if you need to allow specific access to a computer or application. The
rule is disabled for all inherited policies.
Managing firewall protection 355
Setting up firewall rules
The rule is also disabled for the all locations if it is a shared policy and only one
location if it is a location-specific policy.
rule set from one policy into another. To import rules, you first have to export the
rules to a .dat file and have access to the file.
The rules are added in the same order that they are listed in the parent policy with
respect to the blue line. You can then change their processing order.
To export firewall rules
1 In the console, open a Firewall policy.
2 On the Firewall Policy page, click Rules.
3 In the Rules list, select the rules you want to export, right-click, and then click
Export.
4 In the Export Policy dialog box, locate a directory to save the .dat file, type a
file name, and then click Export.
To import firewall rules
1 In the console, open a Firewall policy.
2 On the Firewall Policy page, click Rules.
3 Right-click the Rules list, and then click Import.
4 In the Import Policy dialog box, locate the .dat file that contains the firewall
rules to import, and then click Import.
5 In the Input dialog box, type a new name for the policy, and then click OK.
6 Click OK.
See Setting up firewall rules on page 353.
See Customizing firewall rules on page 356.
See About the firewall rule, firewall setting, and intrusion prevention processing
order on page 338.
See Editing a policy on page 307.
Actions The action parameters specify what actions the firewall takes when it
successfully matches a rule. If the rule matches and is selected in response
to a received packet, the firewall performs all actions. The firewall either
allows or blocks the packet and logs or does not log the packet. If the firewall
allows traffic, it lets the traffic that the rule specifies access the network. If
the firewall blocks traffic, it blocks the traffic that the rule specifies so that
it does not access the network.
The actions are as follows:
Allow
The firewall allows the network connection.
Block
The firewall blocks the network connection.
Managing firewall protection 358
Setting up firewall rules
Triggers When the firewall evaluates the rule, all the triggers must be true for a
positive match to occur. If any one trigger is not true in relation to the current
packet, the firewall cannot apply the rule. You can combine the trigger
definitions to form more complex rules, such as to identify a particular
protocol in relation to a specific destination address.
The triggers are as follows:
Application
When the application is the only trigger you define in an allow-traffic
rule, the firewall allows the application to perform any network operation.
The application is the significant value, not the network operations that
the application performs. You can define additional triggers to describe
the particular network protocols and hosts with which communication is
allowed.
See About firewall rule application triggers on page 342.
Host
When you define host triggers, you specify the host on both sides of the
described network connection.
Traditionally, the way to express the relationship between hosts is
referred to as being either the source or destination of a network
connection.
See About firewall rule host triggers on page 347.
Network services
A network services trigger identifies one or more network protocols that
are significant in relation to the described traffic.
The local host computer always owns the local port, and the remote
computer always owns the remote port. This expression of the port
relationship is independent of the direction of traffic.
See About firewall rule network services triggers on page 350.
Network adapter
If you define a network adapter trigger, the rule is relevant only to the
traffic that is transmitted or received by using the specified type of
adapter. You can specify either any adapter or the one that is currently
associated with the client computer.
See About firewall rule network adapter triggers on page 352.
Conditions Rule conditions consist of the rule schedule and screen saver state.
The conditional parameters do not describe an aspect of a network
connection. Instead, the conditional parameters determine the active state
of a rule. You may define a schedule or identify a screen saver state that
dictates when a rule is considered to be active or inactive. The conditional
parameters are optional and if not defined, not significant. The firewall does
not evaluate inactive rules.
Managing firewall protection 359
Setting up firewall rules
Notifications The Log settings let you specify whether the server creates a log entry or
sends an email message when a traffic event matches the criteria that are
set for this rule.
The Severity setting lets you specify the severity level of the rule violation.
14 Right-click the Screen Saver field and specify the state that the client
computer's screen saver must be in for the rule to be active.
The Created At field is not editable. If the policy is shared, the term Shared
appears. If the policy is not shared, the field shows the name of the group to
which that the non-shared policy is assigned.
15 Right-click the Description field, click Edit, type an optional description for the
rule, and then click OK.
16 If you are done with the configuration of the rule, click OK.
See Setting up firewall rules on page 353.
See Managing firewall rules on page 335.
To select a host In the Host List dialog box, do one of the following actions:
group
Click Source/Destination.
Click Local/Remote.
Then in the Host List dialog box, check the box in the Enabled
column for any host group that you want to add to the rule.
firewall rule so that the client can share its files. You create a second firewall rule
so that the client can browse for other files and printers.
The settings work differently based on the type of control that you specify for your
client, as follows:
Client control or mixed Users on the client can enable these settings automatically by
control configuring them in Network and Host Exploit Mitigation.
Mixed control A server firewall rule that specifies this type of traffic can override
these settings.
To permit clients to In the Remote port drop-down list, type 88, 135, 139, 445.
browse for files and
printers in the
network
To enable other In the Local Port drop-down list, type 88, 135, 139, 445.
computers to browse
files on the client
7 Click OK.
8 In the Service List dialog box, click Add.
9 In the Protocol dialog box, in the Protocol drop-down list, click UDP.
Managing firewall protection 364
Setting up firewall rules
To permit clients to In the Local Port drop-down list, type 137, 138.
browse for files and
In the Remote Port drop-down list, type 88.
printers in the
network
To enable other In the Local Port drop-down list, type 88, 137, 138.
computers to browse
files on the client
11 Click OK.
12 In the Service List dialog box, make sure that the two services are enabled,
and then click OK.
13 On the Rules tab, make sure the Action field is set to Allow.
14 If you are done with the configuration of the policy, click OK.
15 If you are prompted, assign the policy to a location.
See Setting up firewall rules on page 353.
See Customizing firewall rules on page 356.
See Editing a policy on page 307.
To generate a log event when Check both Write to Traffic Log and Write to Packet
a firewall rule is triggered Log.
Managing firewall protection 365
Setting up firewall rules
4 When you are done with the configuration of this policy, click OK.
5 Configure a security alert.
6 Configure a mail server.
7 Click OK.
See Setting up firewall rules on page 353.
See Customizing firewall rules on page 356.
See Setting up administrator notifications on page 620.
To trigger the rule for any adapter (even if Click Apply the rule to all adapters, and
it is not listed) then go to step 7.
To trigger the rule for selected adapters Click Apply the rule to the following
adapters.
5 To add a custom adapter for the selected rule only, do the following tasks:
Click Add.
In the Network Adapter dialog box, select the adapter type and type the
adapter's brand name in the Adapter Identification text field.
6 Click OK.
Managing firewall protection 366
Setting up firewall rules
7 Click OK.
8 Click OK.
See Setting up firewall rules on page 353.
See Customizing firewall rules on page 356.
See Editing a policy on page 307.
See About firewall rule network adapter triggers on page 352.
To keep the rule active during Uncheck the box in the Any Time Except column.
this time
To make the rule inactive Check the box in the Any Time Except column.
during this time
10 Click OK.
See Setting up firewall rules on page 353.
See Customizing firewall rules on page 356.
See Editing a policy on page 307.
Chapter 16
Managing intrusion
prevention and Generic
Exploit Mitigation
This chapter includes the following topics:
Task Description
Learn about intrusion prevention Learn how intrusion prevention detects and blocks network and browser
attacks.
Enable intrusion prevention To keep your client computers secure, you should keep intrusion prevention
enabled.
You can enable the following types of intrusion prevention:
You can also enable or disable both types of intrusion prevention, as well
as the firewall, when you run the Enable Network Threat Protection or
Disable Network Threat Protection command. You might want to disable
intrusion prevention for troubleshooting purposes or if client computers detect
excessive false positives.
See Running commands on client computers from the console on page 244.
Managing intrusion prevention and Generic Exploit Mitigation 369
Managing intrusion prevention
Task Description
Create exceptions to change the default You might want to create exceptions to change the default behavior of the
behavior of Symantec network intrusion default Symantec network intrusion prevention signatures. Some signatures
prevention signatures block the traffic by default and other signatures allow the traffic by default.
Note: You cannot change the behavior of browser intrusion prevention
signatures.
You might want to change the default behavior of some network signatures
for the following reasons:
You can use application control to prevent users from running peer-to-peer
applications on their computers.
If you want to block the ports that send and receive peer-to-peer traffic, use
a Firewall policy.
Task Description
Create exceptions to ignore browser You can create exceptions to exclude browser signatures from browser
signatures on client computers intrusion prevention on Windows computers.
(Windows only) You might want to ignore browser signatures if browser intrusion prevention
causes problems with browsers in your network.
Exclude specific computers from You might want to exclude certain computers from network intrusion
network intrusion prevention scans prevention. For example, some computers in your internal network may be
set up for testing purposes. You might want Symantec Endpoint Protection
to ignore the traffic that goes to and from those computers.
When you exclude computers, you also exclude them from the denial of
service protection and port scan protection that the firewall provides.
Configure intrusion prevention By default, messages appear on client computers for intrusion attempts. You
notifications can customize the message.
Create custom intrusion prevention You can write your own intrusion prevention signature to identify a specific
signatures (Windows only) threat. When you write your own signature, you can reduce the possibility
that the signature causes a false positive.
For example, you might want to use custom intrusion prevention signatures
to block and log websites.
You must have the firewall installed and enabled to use custom IPS
signatures.
Monitor intrusion prevention Regularly check that intrusion prevention is enabled on the client computers
in your network.
Type Description
Network intrusion prevention Network intrusion prevention uses signatures to identify attacks on client computers.
For known attacks, intrusion prevention automatically discards the packets that
match the signatures.
You can also create your own custom network signatures in Symantec Endpoint
Protection Manager. You cannot create custom signatures on the client directly;
however, you can import custom signatures on the client. Custom signatures are
supported on Windows computers only.
Browser intrusion prevention Browser intrusion prevention monitors attacks on Internet Explorer and Firefox.
(Windows only) Browser intrusion prevention is not supported on any other browsers.
Firefox might disable the Symantec Endpoint Protection plug-in, but you can turn
it back on.
For some browser attacks, intrusion prevention requires that the client terminate
the browser. A notification appears on the client computer.
For the latest information about the browsers that browser intrusion prevention
protects, see: Supported browser versions for browser intrusion prevention.
the list of patterns or partial patterns from previous packets. It can then apply this
information to subsequent packet inspections.
Symantec signatures include signatures for network intrusion prevention, which are
downloaded to the client as part of LiveUpdate content. For Mac computers, there
are some additional network intrusion prevention signatures that are built into the
software.
On Windows computers, LiveUpdate content also includes signatures for browser
intrusion prevention.
Network intrusion prevention Network signatures match patterns of an attack that can crash
signatures applications or exploit the operating systems on your client
computers.
The Symantec Security Response team supplies the attack signatures. The intrusion
prevention engine and the corresponding set of signatures are installed on the client
by default. The signatures are part of the content that you update on the client.
You can view information about IPS signatures on the following Symantec website
page:
Attack Signatures
For information about the built-in IPS signatures for Mac clients, see the following
article:
Built-in signatures for Symantec Endpoint Protection IPS for Mac
See Creating exceptions for IPS signatures on page 374.
See Managing intrusion prevention on page 367.
Managing intrusion prevention and Generic Exploit Mitigation 373
About custom IPS signatures
Note: You must have the firewall installed and enabled to use custom IPS signatures.
See Configuring Windows client installation feature sets on page 120.
Note: To configure these settings in mixed control, you must also enable these
settings in the Client User Interface Mixed Control Settings dialog box.
Managing intrusion prevention and Generic Exploit Mitigation 374
Creating exceptions for IPS signatures
4 Click OK.
See Creating exceptions for IPS signatures on page 374.
See Managing intrusion prevention on page 367.
See Configuring firewall settings for mixed control on page 330.
Note: When you add a browser signature exception, Symantec Endpoint Protection
Manager includes the signature in the exceptions list and automatically sets the
action to Allow and the log setting to Do Not Log. You cannot customize the action
or the log setting.
Note: To change the behavior of a custom IPS signature that you create or import,
you edit the signature directly. Custom signatures are supported on Windows
computers only.
Managing intrusion prevention and Generic Exploit Mitigation 375
Creating exceptions for IPS signatures
Note: The signatures list populates with the latest LiveUpdate content that the
management console downloaded. For Windows computers, the list appears
blank if the management server has not yet downloaded the content. For Mac
computers, the list always contains at least the built-in signatures, which are
installed automatically on your Mac clients.
Note: These options only apply to network signatures. For browser signatures,
click OK.
If you want to revert the signature's behavior back to the original behavior,
select the signature in the Exceptions list, and then click Delete.
7 Click OK to save the policy changes.
See Managing exceptions in Symantec Endpoint Protection on page 534.
Managing intrusion prevention and Generic Exploit Mitigation 376
Setting up a list of excluded computers
Note: You can also set up a list of computers that allows all inbound traffic and
outbound traffic unless an IPS signature detects an attack. In this case, you create
a firewall rule that allows all hosts.
7 Enter the appropriate information that is associated with the host type you
selected.
For more information about these options, click Help.
Managing intrusion prevention and Generic Exploit Mitigation 377
Configuring client intrusion prevention notifications
8 Click OK.
9 Repeat 5 and 8 to add additional devices and computers to the list of excluded
computers.
10 To edit or delete any of the excluded hosts, select a row, and then click Edit
or Delete.
11 Click OK.
12 When you finish configuring the policy, click OK.
Warning: You should be familiar with the TCP, UDP, or ICMP protocols before you
develop intrusion prevention signatures. An incorrectly formed signature can corrupt
the custom signature library and damage the integrity of the clients.
Note: You must have the firewall installed and enabled to use custom IPS signatures.
See Configuring Windows client installation feature sets on page 120.
Task Description
Create a custom library with a signature You must create a custom library to contain your custom signatures. When
group you create a custom library, you use signature groups to manage the
signatures more easily. You must add at least one signature group to a
custom signature library before you add the signatures.
Add custom IPS signatures to a custom You add custom IPS signatures to a signature group in a custom library.
library
See Adding signatures to a custom IPS library on page 380.
Assign libraries to client groups You assign custom libraries to client groups rather than to a location.
Task Description
Change the order of signatures Intrusion prevention uses the first rule match. Symantec Endpoint Protection
checks the signatures in the order that they are listed in the signatures list.
For example, if you add a signature group to block TCP traffic in both
directions on destination port 80, you might add the following signatures:
If the Block all traffic signature is listed first, the Allow all traffic signature is
never enacted. If the Allow all traffic signature is listed first, the Block all
traffic signature is never enacted, and all HTTP traffic is always allowed.
Note: Firewall rules take precedence over intrusion prevention signatures.
Copy and paste signatures You can copy and paste signatures between groups and between libraries.
Define variables for signatures When you add a custom signature, you can use variables to represent
changeable data in signatures. If the data changes, you can edit the variable
instead of editing the signatures throughout the library.
Test custom signatures You should test the custom intrusion prevention signatures to make sure
that they work.
5 To add a new group, on the Signatures tab, under the Signature Groups list,
click Add.
6 In the Intrusion Prevention Signature Group dialog box, type a group name
and optional description, and then click OK.
The group is enabled by default. If the signature group is enabled, all signatures
within the group are enabled automatically. To retain the group for reference
but to disable it, uncheck Enable this group.
7 Add a custom signature.
See Adding signatures to a custom IPS library on page 380.
Block Identifies and blocks the event or attack and records it in the Security Log
Allow Identifies and allows the event or attack and records it in the Security Log
11 To record the event or attack in the Packet Log, check Write to Packet Log.
12 Click OK.
The added signature is enabled by default. If you want to disable the signature
until a later time, uncheck the check box in the Enabled column.
13 You can add additional signatures. When you are finished, click OK.
14 If you are prompted, assign the custom IPS signatures to a group.
You can also assign multiple custom IPS libraries to a group.
See Assigning multiple custom IPS libraries to a group on page 382.
Managing intrusion prevention and Generic Exploit Mitigation 382
Managing custom intrusion prevention signatures
Step Description
Step 1: Make sure that clients use the The next time that the client receives the policy, the client applies the new
current policy custom signatures.
See How the client computer and the management server communicate
on page 161.
Step 2: Test the signature content on You should test the traffic that you want to block on the client computers.
the client
For example, if your custom IPS signatures should block MP3 files, try to
download some MP3 files to the client computers. If the download does not
occur, or times out after many tries, the custom IPS signature is successful.
You can click Help for more information about the syntax that you can use
in custom IPS signatures.
Step 3: View blocked events in You can view events in the Network and Host Exploit Mitigation Attack logs.
Symantec Endpoint Protection Manager The message you specify in the custom IPS signature appears in the log
Note: If you have installed and configured the Windows Enhanced Mitigation
Experience Toolkit (EMET) on your computers, Generic Exploit Mitigation does not
protect processes that EMET protects.
Types of exploits
Generic Exploit Mitigation includes the following types of protection on Windows
computers:
Java exploit protection
Generic Exploit Mitigation blocks Java Applets that try to disable Windows
Security Manager. Some exploit attacks use a Java Applet to turn off Security
Manager to allow Java code to execute privileged actions.
Heap spray mitigation
A heap spray attack occurs when the attacker tries to place its attack code to a
predetermined memory location. Generic Exploit Mitigation reserves the
commonly used memory locations to prevent an attacker from using them.
Structured exception handling overwrite protection (SEHOP)
Generic Exploit Mitigation provides structured exception handling overwrite
protection. Windows provides the protection but some Windows operating
systems have the protection disabled by default. An exploit attack can control
the execution flow of software toward the attackers shellcode by using an
overwrite exception handler function. The exception handler function address
is stored in stack memory and can easily be overwritten when a stack buffer
overflow exists.
How Symantec Endpoint Protection uses the Intelligent Threat Cloud Service
Managing the virus and spyware notifications that appear on client computers
Configuring client groups to use private servers for reputation queries and
submissions
Task Description
Make sure that your computers All computers in your network and all your servers should have Symantec Endpoint
have Symantec Endpoint Protection installed. Make sure that Symantec Endpoint Protection is functioning
Protection installed correctly.
Keep definitions current Make sure that the latest definitions are installed on client computers.
You can check the definitions date on the Clients tab. You can run a command to
update the definitions that are out of date.
You can also run a computer status report to check the latest definitions date.
See How to update content and definitions on the clients on page 172.
Managing Virus and Spyware Protection 389
Preventing and handling virus and spyware attacks on client computers
Table 17-1 Protecting computers from virus and spyware attacks (continued)
Task Description
Run regular scans By default, Auto-Protect and SONAR run on client computers. A default scheduled
active scan also runs on client computers.
You can run scans on demand. You can customize the scan settings.
Typically, you might want to create a full scheduled scan to run once a week, and
an active scan to run once per day. By default, Symantec Endpoint Protection
generates an active scan that runs at 12:30 P.M. On unmanaged computers,
Symantec Endpoint Protection also includes a default startup scan that is disabled.
You should make sure that you run an active scan every day on the computers in
your network. You might want to schedule a full scan once a week or once a month
if you suspect that you have an inactive threat in your network. Full scans consume
more computer resources and might affect computer performance.
See Setting up scheduled scans that run on Windows computers on page 419.
See Setting up scheduled scans that run on Mac computers on page 421.
See Setting up scheduled scans that run on Linux computers on page 422.
Let clients upload critical events Make sure that clients (Windows only) can bypass the heartbeat interval and send
immediately critical events to the management server immediately. Critical events include any
risk found (except cookies) and any intrusion event. You can find this option in
Clients > Policies > Communications Settings. The option is enabled by default.
Administrator notifications can alert you right away when the damper period for
relevant notifications is set to None.
Check or modify scan settings for By default, virus and spyware scans detect, remove, and repair the side effects of
increased protection viruses and security risks.
The default scan settings optimize your client computers' performance while still
providing a high level of protection. You can increase the level of protection,
however.
For example, you might want to increase the Bloodhound heuristic protection.
See Adjusting scans to increase protection on your client computers on page 427.
Managing Virus and Spyware Protection 390
Removing viruses and security risks
Table 17-1 Protecting computers from virus and spyware attacks (continued)
Task Description
Allow clients to submit information Clients can submit information about detections to Symantec. The submitted
about detections to Symantec information helps Symantec address threats.
See Understanding server data collection and client submissions and their
importance to the security of your network on page 474.
Run intrusion prevention Symantec recommends that you run intrusion prevention on your client computers
as well as Virus and Spyware Protection.
Remediate infections if necessary After scans run, client computers might still have infections. For example, a new
threat might not have a signature, or Symantec Endpoint Protection was not able
to completely remove the threat. In some cases client computers require a restart
for Symantec Endpoint Protection to complete the cleaning process.
Step Description
Step 1: Identify infected and at-risk You can get information about infected and at-risk computers from Symantec
computers Endpoint Protection Manager. On the Home page, check the Newly Infected
and the Still Infected counts in the Virus and Risks Activity Summary. The
Newly Infected count is a subset of the Still Infected count. The Newly
Infected count shows the number of infected and at-risk computers during
the time interval that you specify in the summary.
Note: Unremediated SONAR detections are not counted as Still Infected.
They are part of the Suspicious count in the summary.
Files that are considered "still infected" are rescanned when new definitions
arrive or as soon as the client computer is idle.
Step 2: Update definitions and rescan You should make sure that clients use the latest definitions.
For legacy clients that run on Windows computers, you should also make
sure that your scheduled and on-demand scans use the Insight Lookup
feature. As of 14, scheduled and on-demand scans always use Insight
Lookup.
You can check the definitions date in the Infected and At Risk Computers
report. You can run the Update Content and Scan command from the Risk
log.
When the Virus and Risks Activity Summary on the Home page shows the
Still Infected and the Newly Infected counts are zero, then all risks are
eliminated.
See How to update content and definitions on the clients on page 172.
Step 3: Check scan actions and rescan Scans might be configured to leave the risk alone. You might want to edit
the Virus and Spyware Protection policy and change the action for the risk
category. The next time the scan runs, Symantec Endpoint Protection applies
the new action.
You set the action on the Actions tab for the particular scan type
(administrator-defined or on-demand scan, or Auto-Protect). You can also
change the detection action for Download Insight and SONAR.
See Checking the scan action and rescanning the identified computers
on page 393.
Managing Virus and Spyware Protection 392
Removing viruses and security risks
Step Description
Step 4: Restart computers if necessary Computers may still be at risk or infected because they need to be restarted
to complete remediation to finish the remediation of a virus or security risk.
You can view the Risk log to determine if any computers require a restart.
You can run a command from the Computer Status log to restart computers.
See Running commands on client computers from the console on page 244.
Step 5: Investigate and clean remaining If any risks remain, you should investigate them further.
risks
You can check the Symantec Security Response webpage for up-to-date
information about viruses and security risks.
http://securityresponse.symantec.com
On the client computer, you can also access the Security Response website
from the scan results dialog box.
You can also run Power Eraser from Symantec Endpoint Protection Manager
to analyze and remediate difficult, persistent threats. Power Eraser is an
aggressive analysis that you should run on one computer or a small number
of computers only when the computers are unstable or heavily infected.
See What you should know before you run Power Eraser from the Symantec
Endpoint Protection Manager console on page 736.
Symantec Technical Support also offers a Threat Expert tool that quickly
provides detailed analysis of threats. You can also run a load point analysis
tool that can help you troubleshoot problems. You run these tools directly
on the client computer.
Step 6: Check the Computer Status log View the Computer Status log to make sure that risks are remediated or
removed from client computers.
To identify the actions that need to be changed and rescan the identified computers
1 In the console, click Monitors.
2 On the Logs tab, select the Risk log, and then click View Log.
From the Risk log event column, you can see what happened and the action
that was taken. From the Risk Name column, you can see the names of the
risks that are still active. From the Domain Group User column you can see
which group the computer is a member of.
If a client is at risk because a scan took the action Left Alone, you may need
to change the Virus and Spyware Protection policy for the group. In the
Computer column, you can see the names of the computers that still have
active risks on them.
See Changing the action that Symantec Endpoint Protection takes when it
makes a detection on page 468.
If your policy is configured to use Push mode, it is pushed out to the clients in
the group at the next heartbeat.
See How the client computer and the management server communicate
on page 161.
3 Click Back.
4 On the Logs tab, select the Computer Status log, and then click View Log.
5 If you changed an action and pushed out a new policy, select the computers
that need to be rescanned with the new settings.
6 In the Command list box, select Scan, and then click Start to rescan the
computers.
You can monitor the status of the Scan command from the Command Status
tab.
The attacker uses the ransom money to fund additional attacks against
other users.
2. Isolate the infected computer before the ransomware can attack network
drives to which it has access.
3. Use Symantec Endpoint Protection Manager to update the virus definitions
and scan the client computers.
New definitions are likely to detect and remediate the ransomlockers. Symantec
Endpoint Protection Manager automatically downloads virus definitions to the
client, as long as the client is managed and connected to the Symantec
Endpoint Protection Manager.
In Symantec Endpoint Protection Manager, click Clients, right-click the group,
and click Run a command on the group > Update Content and Scan.
4. Restore damaged files from a known good backup.
As with other security products, Symantec Endpoint Protection cannot decrypt
the files that ransomlockers have sabotaged.
5. Submit the malware to Symantec Security Response.
If you can identify the malicious email or executable, submit it to Symantec
Security Response. These samples enable Symantec to create new signatures
and improve defenses against ransomware.
Symantec Insider Tip: Successful Submissions!
Note: The Intelligent Threat Cloud Service is supported on Windows clients only.
Note: The 12.1.x Insight Lookup feature provides file reputation lookups for
scheduled and on-demand scans of portal files on legacy clients. The option can
be enabled or disabled. Previously, the option included a separate sensitivity level.
Now 12.1.x clients use the sensitivity level that is set for Download Insight.
Note: If you use an ATP server, reputation lookups are routed through the ATP
server before they reach the cloud.
See Configuring client groups to use private servers for reputation queries and
submissions on page 448.
If you want to use a proxy server, you can specify an HTTPS proxy in the client's
browser Internet options. Or you can use the Symantec Endpoint Protection Manager
console to specify the HTTPS proxy for clients in Policies > External
Communications.
Managing Virus and Spyware Protection 400
How Symantec Endpoint Protection uses the Intelligent Threat Cloud Service
See Specifying a proxy server for client submissions and other external
communications on page 479.
The amount of bandwidth that the Intelligent Threat Cloud Service clients use is
nearly identical to pre-14 clients, which use reputation lookups only with specific
features such as Download Insight.
Later, Symantec gets more information about the file from its extensive global
intelligence network. Symantec determines that the file might be harmful and
updates the Insight reputation database. Symantec might provide a late-breaking
signature for the file in its definitions in the cloud.
If the user opens the file or runs a scan, Auto-Protect or the scan gets the latest
information about the file from the cloud. Using the latest file reputation and the
Download Insight sensitivity level, or using a late-breaking file signature,
Auto-Protect or the scan now detects the file as potentially malicious.
Task Description
Review the types of scans and Check your scan settings. You can review the defaults and determine if you want
default settings to make changes.
See About the types of scans and real-time protection on page 404.
See About the default Virus and Spyware Protection policy scan settings
on page 414.
Create scheduled scans and run You use scheduled scans and on-demand scans to supplement the protection that
on-demand scans Auto-Protect provides. Auto-Protect provides protection when you read and write
files. Scheduled scans and on-demand scans can scan any files that exist on your
client computers. They can also protect memory, load points, and other important
locations on your client computers.
You can save your scheduled scan settings as a template. The scan templates
can save you time when you configure multiple policies. You can use any scan
that you save as a template as the basis for a new scan in a different policy.
Note: For managed clients, Symantec Endpoint Protection provides a default
scheduled scan that scans all files, folders, and locations on the client computers.
See Setting up scheduled scans that run on Windows computers on page 419.
See Setting up scheduled scans that run on Mac computers on page 421.
See Setting up scheduled scans that run on Linux computers on page 422.
Task Description
Customize scan settings for your You can customize Auto-Protect settings as well as options in administrator-defined
environment scans. You might want to change scan settings to handle false positive detections,
optimize computer or scan performance, or change scan actions or notifications.
For scheduled scans, you can also set options for missed scans, randomized
scans, and whether to scan network drives.
See Customizing the virus and spyware scans that run on Windows computers
on page 452.
See Customizing the virus and spyware scans that run on Mac computers
on page 453.
See Customizing the virus and spyware scans that run on Linux computers
on page 454.
Adjust scans to improve client By default, Symantec Endpoint Protection provides a high level of security while
computer performance it minimizes the effect on your client computers' performance. You can change
some settings, however, to optimize the computer performance even more.
Optimization is important in virtualized environments.
Note: When you adjust settings to optimize client computer performance, you
might decrease some security on your client computers.
Adjust scans to increase The default scan settings optimize your client computers' performance while still
protection on your client providing a high level of protection. You can increase the level of protection,
computers however.
See Adjusting scans to increase protection on your client computers on page 427.
Manage Download Insight Download Insight inspects files that users try to download through web browsers,
detections text messaging clients, and other portals. Download Insight uses reputation
information from Symantec Insight to make decisions about files.
Manage SONAR SONAR is part of Proactive Threat Protection on your client computers. However,
SONAR settings are part of a Virus and Spyware Protection policy.
Configure exceptions for scans You can create exceptions for the files and applications that you know are safe.
Symantec Endpoint Protection also excludes some files and folders automatically.
See About the files and folders that Symantec Endpoint Protection excludes from
virus and spyware scans on page 410.
Managing Virus and Spyware Protection 404
Managing scans on client computers
Task Description
Manage files in the Quarantine You can monitor and delete the files that are quarantined on your client computers.
You can also specify settings for the Quarantine.
Allow clients to submit information By default, clients send information about detections to Symantec. You can turn
about detections to Symantec off submissions or choose which types of the information that clients submit.
Symantec recommends that you always allow clients to send submissions. The
information helps Symantec address threats.
See Understanding server data collection and client submissions and their
importance to the security of your network on page 474.
Manage the virus and spyware You can decide whether or not notifications appear on client computers for virus
notifications that appear on client and spyware events.
computers
See Managing the virus and spyware notifications that appear on client computers
on page 441.
Note: Starting in 14, scans access the complete definitions set in the cloud.
See How Symantec Endpoint Protection uses the Intelligent Threat Cloud Service
on page 398.
By default, Symantec Endpoint Protection runs an active scan every day at 12:30
P.M. Symantec Endpoint Protection also runs an active scan when new definitions
arrive on the client computer. On unmanaged computers, Symantec Endpoint
Protection also includes a default startup scan that is disabled.
Note: When a client computer is off or in hibernation or sleep mode, the computer
might miss a scheduled scan. When the computer starts up or wakes, by default
the scan is retried within a specified interval. If the interval already expired, Symantec
Endpoint Protection does not run the scan and waits until the next scheduled scan
time. You can modify the settings for missed scheduled scans.
Managing Virus and Spyware Protection 405
Managing scans on client computers
You should make sure that you run an active scan every day on the computers in
your network. You might want to schedule a full scan once a week or once a month
if you suspect that you have an inactive threat in your network. Full scans consume
more computer resources and might affect computer performance.
See Managing scans on client computers on page 402.
Auto-Protect Auto-Protect continuously inspects files and email data as they are written to or read from
a computer. Auto-Protect automatically neutralizes or eliminates detected viruses and
security risks. Mac clients and Linux clients support Auto-Protect for the file system only.
Starting in 14, on standard and embedded/VDI clients that are connected to the cloud,
Auto-Protect automatically looks up the latest definitions in the cloud.
Download Insight Download Insight boosts the security of Auto-Protect scans by inspecting files when users
try to download them from browsers and other portals. It uses reputation information from
(Windows only)
Symantec Insight to allow or block download attempts.
See How Symantec Endpoint Protection uses Symantec Insight to make decisions about
files on page 434.
Managing Virus and Spyware Protection 406
Managing scans on client computers
Administrator-defined Administrator-defined scans detect viruses and security risks by examining all files and
scans processes on the client computer. Administrator-defined scans can also inspect memory
and load points.
The following types of administrator-defined scans are available:
Scheduled scans
A scheduled scan runs on the client computers at designated times. Any concurrently
scheduled scans run sequentially. If a computer is turned off or in hibernation or sleep
mode during a scheduled scan, the scan does not run unless it is configured to retry
missed scans. When the computer starts or wakes, Symantec Endpoint Protection
retries the scan until the scan starts or the retry interval expires.
You can schedule an active, full, or custom scan for Windows clients. You can schedule
only a custom scan for Mac clients or Linux clients.
You can save your scheduled scan settings as a template. You can use any scan that
you save as a template as the basis for a different scan. The scan templates can save
you time when you configure multiple policies. A scheduled scan template is included
by default in the policy. The default scheduled scan scans all files and directories.
Startup scans and triggered scans
Startup scans run when the users log on to the computers. Triggered scans run when
new virus definitions are downloaded to computers.
Note: Startup scans and triggered scans are available only for Windows clients.
On-demand scans
On-demand scans are the scans that run immediately when you select the scan
command in Symantec Endpoint Protection Manager.
You can select the command from the Clients tab or from the logs.
If the Symantec Endpoint Protection client for Windows detects a large number of viruses,
spyware, or high-risk threats, an aggressive scan mode engages. The scan restarts and
uses Insight lookups.
See Setting up scheduled scans that run on Windows computers on page 419.
See Setting up scheduled scans that run on Mac computers on page 421.
SONAR SONAR offers real-time protection against zero-day attacks. SONAR can stop attacks even
before traditional signature-based definitions detect a threat. SONAR uses heuristics as
(Windows only)
well as file reputation data to make decisions about applications or files.
Like proactive threat scans, SONAR detects keyloggers, spyware, and any other application
that might be malicious or potentially malicious.
Early launch Works with the Windows early launch anti-malware driver. Supported only on Windows 8
anti-malware (ELAM) and Windows Server 2012.
(Windows only) Early launch anti-malware provides protection for the computers in your network when they
start up and before third-party drivers initialize.
Auto-Protect Continuously scans files as they are read from or written to the client
computer.
You can configure Auto-Protect to scan only selected file extensions. When
Auto-Protect scans the selected extensions, it can also determine a file's
type even if a virus changes the file's extension.
For those clients that do not run email Auto-Protect, your client computers
are still protected when Auto-Protect is enabled. Most email applications
save attachments to a temporary folder when users launch email attachments.
Auto-Protect scans the file as it is written to the temporary folder and detects
any virus or security risk. Auto-Protect also detects the virus if the user tries
to save an infected attachment to a local drive or network drive.
Managing Virus and Spyware Protection 408
Managing scans on client computers
Internet Email Auto-Protect Scans inbound Internet email body and email attachments for viruses and
security risks; also performs outbound email heuristics scanning.
(Windows only)
By default, Internet Email Auto-Protect supports encrypted passwords and
email over POP3 and SMTP connections. Internet Email Auto-Protect
supports 32-bit or 64-bit systems. If you use POP3 or SMTP with Secure
Sockets Layer (SSL), then the client detects secure connections but does
not scan encrypted messages.
Note: For performance reasons, Internet Email Auto-Protect for POP3 is
not supported on server operating systems.
Email scanning does not support IMAP, AOL, or HTTP-based email such
as Hotmail or Yahoo! Mail.
Microsoft Outlook Auto-Protect Downloads incoming Microsoft Outlook email attachments and scans for
viruses and security risks when the user reads the message and opens the
(Windows only)
attachment.
Lotus Notes Auto-Protect Scans incoming Lotus Notes email attachments for viruses and security
risks.
(Windows only)
Lotus Notes Auto-Protect supports Lotus Notes 7.x or later.
See About the types of scans and real-time protection on page 404.
Managing Virus and Spyware Protection 409
Managing scans on client computers
Risk Description
Viruses Programs or code that attach a copy of themselves to another computer program or file
when it runs. When the infected program runs, the attached virus program activates and
attaches itself to other programs and files.
The following types of threats are included in the virus category:
Risk Description
Cookie Messages that Web servers send to Web browsers for the purpose of identifying the computer
or user.
Dialers Programs that use a computer, without the user's permission or knowledge, to dial out
through the Internet to a 900 number or FTP site. Typically, these numbers are dialed to
accrue charges.
Hacking tools Programs that hackers use to gain unauthorized access to a user's computer. For example,
one hacking tool is a keystroke logger, which tracks and records individual keystrokes and
sends this information back to the hacker. The hacker can then perform port scans or
vulnerability scans. Hacking tools may also be used to create viruses.
Joke programs Programs that alter or interrupt the operation of a computer in a way that is intended to be
humorous or frightening. For example, a joke program might move the recycle bin away
from the mouse when the user tries to delete an item.
Misleading applications Applications that intentionally misrepresent the security status of a computer. These
applications typically masquerade as security notifications about any fake infections that
must be removed.
Parental control Programs that monitor or limit computer usage. The programs can run undetected and
programs typically transmit monitoring information to another computer.
Remote access Programs that allow access over the Internet from another computer so that they can gain
programs information or attack or alter a user's computer.
Security assessment Programs that are used to gather information for unauthorized access to a computer.
tool
Spyware Stand-alone programs that can secretly monitor system activity and detect passwords and
other confidential information and relay it back to another computer.
Trackware Stand-alone or appended applications that trace a user's path on the Internet and send
information to the controller or hacker's system.
Note: The client does not exclude the system temporary folders from scans because
doing so can create a significant security vulnerability on a computer.
To improve scan performance or reduce false positive detections, you can exclude
files by adding a file or a folder exception to an Exceptions policy. You can also
specify the file extensions or the folders that you want to include in a particular
scan.
Warning: The files or folders that you exclude from scans are not protected from
viruses and security risks.
You can view the exclusions that the client automatically creates.
Look in the following locations of the Windows registry:
On 32-bit computers, see
HKEY_LOCAL_MACHINE\Software\Symantec\Symantec Endpoint
Protection\AV\Exclusions.
On 64-bit computers, see
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Symantec\Symantec
Endpoint Protection\AV\Exclusions.
Files Description
Microsoft Exchange The client software automatically creates file and folder scan exclusions for the following
Microsoft Exchange Server versions:
Exchange 5.5
Exchange 6.0
Exchange 2000
Exchange 2003
Exchange 2007
Exchange 2007 SP1
Exchange 2010
Exchange 2013
Exchange 2016
For Exchange 2007, see your user documentation for information about compatibility
with antivirus software. In a few circumstances, you might need to create scan
exclusions for some Exchange 2007 folders manually. For example, in a clustered
environment, you might need to create some exclusions.
The client software checks for changes in the location of the appropriate Microsoft
Exchange files and folders at regular intervals. If you install Microsoft Exchange on a
computer where the client software is already installed, the exclusions are created
when the client checks for changes. The client excludes both files and folders; if a
single file is moved from an excluded folder, the file remains excluded.
For more information, see the article, Preventing Symantec Endpoint Protection from
scanning the Microsoft Exchange 2007 directory structure.
Microsoft Forefront The client automatically creates file and folder exclusions for the following Microsoft
Forefront products:
Also see the article, Configuring Symantec Endpoint Protection exclusions for Microsoft
Forefront.
Active Directory domain The client automatically creates file and folder exclusions for the Active Directory
controller domain controller database, logs, and working files. The client monitors the applications
that are installed on the client computer. If the software detects Active Directory on the
client computer, the software automatically creates the exclusions.
Managing Virus and Spyware Protection 413
Managing scans on client computers
Files Description
Symantec products The client automatically creates appropriate file and folder scan exclusions for certain
Symantec products when they are detected.
The client creates exclusions for the following Symantec products:
Symantec Mail Security 4.0, 4.5, 4.6, 5.0, and 6.0 for Microsoft Exchange
Symantec AntiVirus/Filtering 3.0 for Microsoft Exchange
Norton AntiVirus 2.x for Microsoft Exchange
Symantec Endpoint Protection Manager embedded database and logs
Veritas products The client automatically creates appropriate file and folder scan exclusions for certain
Veritas products when they are detected.
Selected extensions and For each type of administrator-defined scan or Auto-Protect, you can select files to
Microsoft folders include by extension. For administrator-defined scans, you can also select files to
include by folder. For example, you can specify that a scheduled scan only scans
certain extensions and that Auto-Protect scans all extensions.
For executable files and Microsoft Office files, Auto-Protect can determine a file's type
even if a virus changes the file's extension.
By default Symantec Endpoint Protection scans all extensions and folders. Any
extensions or folders that you deselect are excluded from that particular scan.
Symantec does not recommend that you exclude any extensions from scans. If you
decide to exclude files by extension and any Microsoft folders, however, you should
consider the amount of protection that your network requires. You should also consider
the amount of time and resources that your client computers require to complete the
scans.
Note: Any file extensions that you exclude from Auto-Protect scans of the file system
also excludes the extensions from Download Insight. If you are running Download
Insight, you should include extensions for common programs and documents in the
list of extensions that you want to scan. You should also make sure that you scan .msi
files.
Managing Virus and Spyware Protection 414
Managing scans on client computers
Files Description
File and folder exceptions You use an Exceptions policy to create exceptions for the files or the folders that you
want Symantec Endpoint Protection to exclude from all virus and spyware scans.
Note: By default, users on client computers can also create file and folder exceptions.
For example, you might want to create file exclusions for an email application inbox.
If the client detects a virus in the Inbox file during an on-demand or scheduled scan,
the client quarantines the entire inbox. You can create an exception to exclude the
inbox file instead. If the client detects a virus when a user opens an email message,
however, the client still quarantines or deletes the message.
Trusted files Virus and spyware scans include a feature that is called Insight that lets scans skip
trusted files. You can choose the level of trust for the files that you want to skip, or you
can disable the option. If you disable the option, you might increase scan time.
Auto-Protect can also skip the files that are accessed by trusted processes such as
Windows Search.
About the default Virus and Spyware Protection policy scan settings
Symantec Endpoint Protection Manager includes three default policies.
Virus and Spyware Protection Balanced policy
Virus and Spyware Protection High Security policy
The High Security policy is the most stringent of all the preconfigured policies.
You should be aware that it can affect the performance of other applications.
Virus and Spyware Protection High Performance policy
The High Performance policy provides better performance than the High Security
policy, but it does not provide the same safeguards. The policy relies primarily
on Auto-Protect to scan files with selected file extensions to detect threats.
The basic Virus and Spyware Protection policy provides a good balance between
security and performance.
Managing Virus and Spyware Protection 415
Managing scans on client computers
Table 17-8 Virus and Spyware Protection Balanced policy scan settings
Setting Description
Scans all files, including the files that are inside compressed
files.
Cleans the virus-infected files. Quarantines the files that cannot
be cleaned.
Quarantines the files with security risks. Logs the files that
cannot be quarantined.
Sends a message to the computer users about detected viruses
and security risks.
SONAR Enabled
Table 17-8 Virus and Spyware Protection Balanced policy scan settings
(continued)
Setting Description
Scans all files and folders, including the files that are contained
in compressed files.
Scans memory and common infection locations.
Cleans the virus-infected files. Backs up the files before it repairs
them. Quarantines the files that cannot be cleaned.
Quarantines the files with security risks. Logs the files that
cannot be quarantined.
The default Virus and Spyware High Security policy provides high-level security,
and includes many of the settings from the Virus and Spyware Protection policy.
The policy provides increased scanning.
Table 17-9 Virus and Spyware Protection High Security policy settings
Setting Description
Auto-Protect for the file Same as Virus and Spyware Protection Balanced policy
system and email
Auto-Protect also inspects the files on the remote computers.
SONAR Same as Virus and Spyware Protection Balanced policy but with
the following changes:
The default Virus and Spyware Protection High Performance policy provides
high-level performance. The policy includes many of the settings from the Virus
and Spyware Protection policy. The policy provides reduced security.
Table 17-10 Virus and Spyware Protection High Performance policy settings
Setting Description
Auto-Protect for the file Same as Virus and Spyware Protection Balanced policy but with
system the following changes:
Microsoft Outlook
Auto-Protect
Lotus Notes
Auto-Protect
SONAR Same as Virus and Spyware Protection Balanced policy with the
following changes:
Table 17-11 How Symantec Endpoint Protection handles the detection of viruses
and security risks
Detection Description
Security risks By default, the client moves any files that security risks infect
to the Quarantine on the infected computer. The client also
tries to remove or repair the risk's side effects.
Detections by SONAR are considered suspicious events. You configure actions for
these detections as part of the SONAR configuration.
See Managing SONAR on page 483.
For Windows clients and Linux clients, you can assign a first and a second action
for Symantec Endpoint Protection to take when it finds risks. You can configure
different actions for viruses and security risks. You can use different actions for
scheduled, on-demand, or Auto-Protect scans.
Note: Risky cookies are always deleted unless you specify that you want to log
cookies instead. You can specify only one action for cookies, either Delete or Leave
alone (log only).
Managing Virus and Spyware Protection 419
Setting up scheduled scans that run on Windows computers
Note: On Windows clients, the list of the detection types for security risks is dynamic
and changes as Symantec discovers new categories. New categories are
downloaded to the console or the client computer when new definitions arrive.
For Mac clients, you can specify whether Symantec Endpoint Protection repairs
the infected files that it finds. You can also specify whether Symantec Endpoint
Protection moves the infected files that it cannot repair into the Quarantine. You
can use different actions for scheduled, on-demand, or Auto-Protect scans.
See Managing the Quarantine on page 435.
Multiple simultaneous scans If you schedule multiple scans to occur on the same computer
run serially and the scans start at the same time, the scans run serially.
After one scan finishes, another scan starts. For example,
you might schedule three separate scans on your computer
to occur at 1:00 P.M. Each scan scans a different drive. One
scan scans drive C. Another scan scans drive D. Another
scan scans drive E. In this example, a better solution is to
create one scheduled scan that scans drives C, D, and E.
Missed scheduled scans If your computer misses a scheduled scan for some reason,
might not run by default Symantec Endpoint Protection tries to perform the
scan until it starts or until a specific time interval expires. If
Symantec Endpoint Protection cannot start the missed scan
within the retry interval, it does not run the scan.
Scheduled scan time might Symantec Endpoint Protection might not use the scheduled
drift time if the last run of the scan occurred at a different time
because of the scan duration or missed scheduled scan
settings. For example, you might configure a weekly scan to
run every Sunday at midnight and a retry interval of one day.
If the computer misses the scan and starts up on Monday at
6 A.M., the scan runs at 6 A.M. The next scan is performed
one week from Monday at 6 A.M. rather than the next Sunday
at midnight.
Note: Windows settings include some options that are not available for clients that
run on other operating systems.
You can click Help for more information about the options that are used in this
procedure.
To set up scheduled scans that run on Windows computers
1 In the console, open a Virus and Spyware Protection policy.
2 Under Windows Settings, click Administrator-defined Scans.
3 On the Scans tab, under Scheduled Scans, click Add.
4 In the Add Scheduled Scan dialog box, click Create a new scheduled scan.
Managing Virus and Spyware Protection 421
Setting up scheduled scans that run on Mac computers
5 Click OK.
6 In the Add Scheduled Scan dialog box, on the Scan Details tab, type a name
and description for this scheduled scan.
7 Click Active Scan, Full Scan, or Custom Scan.
8 If you selected Custom, under Scanning, you can specify the folders to scan.
9 Under File types, click Scan all files or Scan only selected extensions.
Note: Scheduled scans always scan container files unless you disable the
Scan files inside compressed files option under Advanced Scanning
Options or you create specific exceptions for the container file extensions.
See Customizing administrator-defined scans for clients that run on Mac computers
on page 461.
Note: Mac settings do not include all the options that are available for clients that
run on Windows.
7 Under File types, click Scan all files or Scan only selected extensions.
Note: Scheduled scans always scan container files unless you disable the
Scan files inside compressed files option or you create specific exceptions
for the container file extensions.
Note: If you issue a restart command on a client computer that runs an on-demand
scan, the scan stops, and the client computer restarts. The scan does not restart.
Managing Virus and Spyware Protection 424
Adjusting scans to improve computer performance
You can run an on-demand scan from the Computer Status log or from the Clients
tab in the console.
You can cancel all scans in progress and queued for selected clients from the
Computer Status log. If you confirm the command, the table refreshes and you see
that the cancel command is added to the command status table.
To run on-demand scans on client computers
1 In the console, click Clients.
2 Under Clients, right-click the group or clients that you want to scan.
3 Do one of the following actions:
Click Run a command on the group > Scan.
Click Run command on computers > Scan.
Click Update Content and Scan to update definitions and then run the scan
in one step.
4 For Windows clients, select Active Scan, Full Scan, or Custom Scan, and
then click OK.
See Managing scans on client computers on page 402.
See Preventing and handling virus and spyware attacks on client computers
on page 388.
See Running commands on client computers from the console on page 244.
See What are the commands that you can run on client computers? on page 241.
Task Description
Modify tuning and compressed You can adjust the following options for scheduled and on-demand scans:
files options for scheduled and
Change tuning options
on-demand scans
You can change the scan tuning to Best Application Performance. When you
configure a scan with this setting, scans can start but they only run when the
client computer is idle. If you configure an Active Scan to run when new
definitions arrive, the scan might not run for up to 15 minutes if the user is using
the computer
Change the number of levels to scan compressed files
The default level is 3. You might want to change the level to 1 or 2 to reduce
scan time.
Use resumable scans For computers in your network that have large volumes, scheduled scans can be
configured as resumable scans.
A scan duration option provides a specified period to run a scan. If the scan does
not complete by the end of the specified duration, it resumes when the next
scheduled scan period occurs. The scan resumes at the place where it stopped
until the entire volume is scanned. Typically you use the scan duration option on
servers.
Note: Do not use a resumable scan if you suspect that the computer is infected.
You should perform a full scan that runs until it scans the entire computer. You
should also not use a resumable scan if a scan can complete before the specified
interval.
See Setting up scheduled scans that run on Windows computers on page 419.
Adjust Auto-Protect settings You can adjust some settings for Auto-Protect scans of the file system that might
improve your client computers' performance.
You can set the following options:
File cache
Make sure that the file cache is enabled (the default is enabled). When the file
cache is enabled, Auto-Protect remembers the clean files that it scanned and
does not rescan them.
Network settings
When Auto-Protect scans of remote computers are enabled, make sure that
Only when files are executed is enabled.
Task Description
Allow all scans to skip trusted files Virus and spyware scans include an option called Insight that skips trusted files.
By default Insight is enabled. You can change the level of trust for the types of files
that scans skip:
See Modifying global scan settings for Windows clients on page 465.
Randomize scheduled scans In virtualized environments, where multiple virtual machines (VMs) are deployed,
simultaneous scans create resource problems. For example, a single server might
run 100 or more VMs. Simultaneous scans on those VMs drain resources on the
server.
Use Shared Insight Cache in Shared Insight Cache eliminates the need to rescan the files that Symantec
virtualized environments Endpoint Protection has determined are clean. You can use Shared Insight Cache
for scheduled and manual scans on your clients computers. Shared Insight Cache
is a separate application that you install on a server or in a virtual environment.
Disable early launch anti-malware Symantec Endpoint Protection ELAM works with Windows ELAM to provide
(ELAM) detection protection against malicious startup drivers.
Task Description
Enable idle-time scan Applies to scheduled scans on clients that run on Mac computers.
This option configures scheduled scans to run only while the computer is idle.
Task Description
You can enable or disable the option, but you cannot specify the level of
compressed files to scan.
Task Description
Scan by type of folder The default is to scan all folder types. You can specify any of: Root, Home, Bin,
Usr, Etc, and Opt. If you know that a folder is safe, you can uncheck it in the list.
Scan by file type The default is to scan all files. If you know that a given extension is safe, you can
remove it from the list.
Scan files inside compressed files You can expand up to three levels to scan within compressed files. You might want
to change the level to 1 or 2 to reduce scan time.
Scan for security risks Lets you choose whether to scan for security risks. Security risks are updated
through LiveUpdate. Scanning for security risks slows the scan down, but increases
security. The default is to scan for security risks. To improve computer performance,
uncheck this option.
Note: If you increase the protection on your client computers, you might affect
computer performance.
Managing Virus and Spyware Protection 428
Adjusting scans to increase protection on your client computers
Task Description
Lock scan settings Some settings are locked by default; you can lock additional settings so that users
cannot change the protection on their computers.
Modify settings for You should check or modify the following options:
administrator-defined scans
Scan performance
Set the scan tuning to Best Scan Performance. The setting, however, might
affect your client computer performance. Scans run even if the computer is not
idle.
Scheduled scan duration
By default, scheduled scans run until the specified time interval expires and
then resume when the client computer is idle. You can set the scan duration
to Scan until finished.
Use Insight Lookup on legacy clients
For legacy clients, you should make sure that Insight Lookup is enabled.
Insight Lookup uses the latest definition set from the cloud and information from
the Insight reputation database to scan and make decisions about files that
were downloaded from a supported portal.
In previous versions, you could configure the Insight Lookup sensitivity as well
as enable or disable Insight Lookup. As of 14, you can only enable or disable
Insight Lookup for legacy clients.
Note:
In 14, scheduled and on-demand scans always use the cloud to evaluate portal
files. Auto-Protect also uses the cloud to evaluate portal files.
See How Symantec Endpoint Protection uses the Intelligent Threat Cloud Service
on page 398.
Specify stronger scan detection Specify Quarantine, Delete, or Terminate actions for detections.
actions
Note: Be careful when you use Delete or Terminate for security risk detections.
The action might cause some legitimate applications to lose functionality.
See Changing the action that Symantec Endpoint Protection takes when it makes
a detection on page 468.
Increase the level of Bloodhound Bloodhound locates and isolates the logical regions of a file to detect virus-like
protection behavior. You can change the detection level from Automatic to Aggressive to
increase the protection on your computers. The Aggressive setting, however, is
likely to produce more false positives.
See Modifying global scan settings for Windows clients on page 465.
Managing Virus and Spyware Protection 429
Managing Download Insight detections
Task Description
File cache
You can disable the file cache so that Auto-Protect rescans good files.
Network settings
By default, files on network drives are scanned only when they are executed.
You can disable this option.
Table 17-16 Adjusting scans to increase protection on Mac and Linux computers
Task Description
Modify compressed file options The default is to scan 3 levels deep in compressed files. To increase protection,
for scans leave it at 3 levels, or change it to 3 if it is at a lower level.
Lock Auto-Protect settings Some settings are locked by default; you can lock additional settings so that users
cannot change the protection on their computers. On the Mac client and the Linux
client, you can click Enable Auto-Protect, and then click the lock icon to lock the
setting.
Specify stronger scan detection Specify Quarantine or Delete (Linux only) actions for detections.
actions
Note: Be careful when you use Delete for security risk detections. The action
might cause some legitimate applications to lose functionality.
See Changing the action that Symantec Endpoint Protection takes when it makes
a detection on page 468.
Note: If you install Auto-Protect for email on your client computers, Auto-Protect
also scans the files that users receive as email attachments.
Task Description
Learn how Download Insight uses Download Insight uses reputation information exclusively when it makes decisions
reputation data to make decisions about downloaded files. It does not use signatures or heuristics to make decisions.
about files If Download Insight allows a file, Auto-Protect or SONAR scans the file when the
user opens or runs the file.
See How Symantec Endpoint Protection uses Symantec Insight to make decisions
about files on page 434.
Managing Virus and Spyware Protection 431
Managing Download Insight detections
Task Description
View the Download Risk You can use the Download Risk Distribution report to view the files that Download
Distribution report to view Insight detected on your client computers. You can sort the report by URL, Web
Download Insight detections domain, or application. You can also see whether a user chose to allow a detected
file.
Note: Risk details for a Download Insight detection show only the first portal
application that attempted the download. For example, a user might use Internet
Explorer to try to download a file that Download Insight detects. If the user then
uses Firefox to try to download the file, the risk details show Internet Explorer as
the portal.
The user-allowed files that appear in the report might indicate false positive
detections.
You can also specify that you receive email notifications about new user-allowed
downloads.
Users can allow files by responding to notifications that appear for detections.
Administrators receive the report as part of a weekly report that Symantec Endpoint
Protection Manager generates and emails. You must have specified an email
address for the administrator during installation or configured as part of the
administrator properties. You can also generate the report from the Reports tab
in the console.
Task Description
Create exceptions for specific files You can create an exception for an application that your users download. You can
or Web domains also create an exception for a specific Web domain that you believe is trustworthy.
See Excluding a trusted Web domain from scans on Windows clients on page 546.
Note: If your client computers use a proxy with authentication, you must specify
trusted Web domain exceptions for Symantec URLs. The exceptions let your client
computers communicate with Symantec Insight and other important Symantec
sites.
For information about the recommended exceptions, see the following articles:
By default, Download Insight does not examine any files that users download from
a trusted Internet or intranet site. You configure trusted sites and trusted local
intranet sites on the Windows Control Panel > Internet Options > Security tab.
When the Automatically trust any file downloaded from an intranet site option
is enabled, Symantec Endpoint Protection allows any file that a user downloads
from any sites in the lists.
Symantec Endpoint Protection checks for updates to the Internet Options trusted
sites list at user logon and every four hours.
Note: Download Insight recognizes only explicitly configured trusted sites. Wildcards
are allowed, but non-routable IP address ranges are not supported. For example,
Download Insight does not recognize 10.*.*.* as a trusted site. Download Insight
also does not support the sites that are discovered by the Internet Options >
Security > Automatically detect intranet network option.
Make sure that Insight lookups Download Insight requires reputation data from Symantec Insight to make decisions
are enabled about files. If you disable Insight lookups, Download Insight runs but detects only
the files with the worst reputations. Insight lookups are enabled by default.
See How Symantec Endpoint Protection uses Symantec Insight to make decisions
about files on page 434.
Managing Virus and Spyware Protection 433
Managing Download Insight detections
Task Description
Customize Download Insight You might want to customize Download Insight settings for the following reasons:
settings
Increase or decrease the number of Download Insight detections.
You can adjust the malicious file sensitivity slider to increase or decrease the
number of detections. At lower sensitivity levels, Download Insight detects fewer
files as malicious and more files as unproven. Fewer detections are false positive
detections.
At higher sensitivity levels, Download Insight detects more files as malicious
and fewer files as unproven. More detections are false positive detections.
Change the action for malicious or unproven file detections.
You can change how Download Insight handles malicious or unproven files.
The specified action affects not only the detection but whether or not users can
interact with the detection.
For example, you might change the action for unproven files to Ignore. Then
Download Insight always allows unproven files and does not alert the user.
Alert users about Download Insight detections.
When notifications are enabled, the malicious file sensitivity setting affects the
number of notifications that users receive. If you increase the sensitivity, you
increase the number of user notifications because the total number of detections
increases.
You can turn off notifications so that users do not have a choice when Download
Insight makes a detection. If you keep notifications enabled, you can set the
action for unproven files to Ignore so that these detections are always allowed
and users are not notified.
Regardless of the notifications setting, when Download Insight detects an
unproven file and the action is Prompt, the user can allow or block the file. If
the user allows the file, the file runs automatically.
When notifications are enabled and Download Insight quarantines a file, the
user can undo the quarantine action and allow the file.
Note: If users allow a quarantined file, the file does not automatically run. The
user can run the file from the Temporary Internet Files folder. Typically, the
folder location is one of the following:
Windows 8 and later:
Drive:\Users\username\AppData\Local\Microsoft\Windows\INetCache
Windows Vista / 7:
Drive:\Users\username\AppData\Local\Microsoft\Windows\Temporary
Internet Files
Windows XP (for legacy 12.1.x clients): Drive:\Documents and Settings
\username\Local Settings\Temporary Internet Files
Task Description
Allow clients to submit information By default, clients send information about reputation detections to Symantec.
about reputation detections to
Symantec recommends that you enable submissions for reputation detections.
Symantec
The information helps Symantec address threats.
Insight lookups
Scanning features in Symantec Endpoint Protection leverage Insight to make
decisions about files and applications. Virus and Spyware Protection includes a
feature that is called Download Insight. Download Insight requires reputation
information to make detections. SONAR also uses reputation information to make
detections.
Managing Virus and Spyware Protection 435
Managing the Quarantine
You can change the Insight lookups setting on the Clients tab. Go to Policies >
Settings > External Communications Settings > Client Submissions.
Starting in 14, on standard and embedded/VDI clients, the Insight lookups option
also allows Auto-Protect and scheduled and manual scans to look up file reputation
information as well as definitions in the cloud. Symantec recommends that you
keep the option enabled.
Warning: Download Insight, SONAR, and virus and spyware scans use Insight
lookups for threat detection. Symantec recommends that you always allow Insight
lookups. Disabling lookups disables Download Insight and impairs the functionality
of SONAR heuristics and virus and spyware scans.
Task Description
Monitor files in the Quarantine You should periodically check the quarantined files to prevent accumulating large
numbers of files. Check the quarantined files when a new virus outbreak appears on
the network.
Leave files with unknown infections in the Quarantine. When the client receives new
definitions, it rescans the items in the Quarantine and might delete or repair the file.
Delete files in the Quarantine You can delete a quarantined file if a backup exists or if you have a copy of the file
from a trustworthy source.
You can delete a quarantined file directly on the infected computer, or by using the
Risk log in the Symantec Endpoint Protection console.
See Using the Risk log to delete quarantined files on your client computers on page 440.
Configure how Symantec By default, Symantec Endpoint Protection rescans items in the Quarantine when new
Endpoint Protection rescans definitions arrive. It automatically repairs and restores items silently. Typically you
items in the Quarantine when should keep the default setting, but you can change the rescan action based on your
new definitions arrive needs.
See Configuring how the Quarantine handles the rescanning of files after new
definitions arrive on page 439.
Specify how clients submit Symantec Endpoint Protection lets users submit infected or suspicious files and related
information about quarantined side effects to Symantec Security Response for further analysis. When users submit
items information, Symantec can refine its detection and repair.
Files that are submitted to Symantec Security Response become the property of
Symantec Corporation. In some cases, files may be shared with the antivirus community.
If Symantec shares files, Symantec uses industry-standard encryption and may make
data anonymous to help protect the integrity of the content and your privacy.
Task Description
Manage the storage of By default, the Quarantine stores backup, repaired, and quarantined files in a default
quarantined files folder. It automatically deletes files after 30 days.
You can manage the storage of quarantined items in the following ways:
Note: The Central Quarantine Server is not shipped with version 14.
3 Click OK.
See Managing the Quarantine on page 435.
To configure how the Quarantine handles the rescanning of files after new
definitions arrive
1 In the console, open a Virus and Spyware Protection policy and click
Quarantine.
2 On the General tab, under When New Virus Definitions Arrive, click one of
the following options:
Automatically repair and restore files in Quarantine silently
Repair files in Quarantine silently without restoring
Prompt user
Do nothing
3 If you are finished with the configuration for this policy, click OK.
Using the Risk log to delete quarantined files on your client computers
You can use the Risk log in the Symantec Endpoint Protection Manager console
to delete quarantined files on your client computers. You run the Delete from
Quarantine command from the log for any quarantined file that you want to delete.
See Managing scans on client computers on page 402.
If Symantec Endpoint Protection detects risks in a compressed file, the compressed
file is quarantined as a whole. However, the Risk log contains a separate entry for
each file in the compressed file. To successfully delete all risks in a compressed
file, you must select all the files in the compressed file.
To use the Risk log to delete files from the Quarantine on your client computers
1 Click Monitors.
2 On the Logs tab, from the Log type list box, select the Risk log, and then click
View Log.
3 Do one of the following actions:
Select an entry in the log that has a file that has been quarantined.
Select all entries for files in the compressed file.
You must have all entries in the compressed file in the log view. You can
use the Limit option under Additional Settings to increase the number of
entries in the view.
Table 17-19 Tasks for managing virus and spyware notifications that appear on
client computers
Task Description
Customize a scan detection For Windows and Linux client computers, you can configure a detection message
message for the following types of scans:
Note: If a process continually downloads the same security risk to a client computer,
Auto-Protect automatically stops sending notifications after three detections.
Auto-Protect also stops logging the event. In some situations, however, Auto-Protect
does not stop sending notifications and logging events. Auto-Protect continues to
send notifications and log events when the action for the detection is Leave alone
(log only).
For Mac client computers, you can configure a detection message that applies to
all scheduled scans, to on-demand scans, and to Auto-Protect detections. These
notification messages appear in the Mac OS X Notification Center. You cannot
customize the messages for Mac.
Table 17-19 Tasks for managing virus and spyware notifications that appear on
client computers (continued)
Task Description
For Internet Email Auto-Protect, you can also specify that a notification appears
about scan progress when Auto-Protect scans an email.
See Customizing Auto-Protect for email scans on Windows computers on page 459.
Allow users to see scan progress Applies to Windows client computers only.
and start or stop scans
You can configure whether or not the scan progress dialog box appears. You can
configure whether or not users are allowed to pause or delay scans.
When you let users view scan progress, a link to the scan progress dialog appears
in the main pages of the client user interface. A link to reschedule the next
scheduled scan also appears.
See Allowing users to view scan progress and interact with scans on Windows
computers on page 470.
Table 17-19 Tasks for managing virus and spyware notifications that appear on
client computers (continued)
Task Description
If the user clicks a notification on the Windows 8 style user interface, the Windows
8 desktop appears. If the user clicks the notification on the Windows 8 desktop, the
notification disappears. For detections of malware or security risks, the user can
view information about the detections in the Detection Results dialog on the
Windows 8 desktop.
When Symantec Endpoint Protection notifies Windows 8 that it detected malware
or a security risk that affects a Windows 8 style app, an alert icon appears on the
app tile. When the user clicks the tile, the Windows App Store appears so that the
user can re-download the app.
See Enabling or disabling Symantec Endpoint Protection pop-up notifications that
appear on Windows 8 clients on page 444.
Managing Virus and Spyware Protection 444
Enabling or disabling Symantec Endpoint Protection pop-up notifications that appear on Windows 8 clients
loads and Symantec Endpoint Protection starts. Rootkits can sometimes hide
themselves from virus and spyware scans. Early launch anti-malware detects these
rootkits and bad drivers at startup.
Note: ELAM is only supported on Microsoft Windows 8 or later, and Windows Server
2012 or later.
Symantec Endpoint Protection provides an ELAM driver that works with the Windows
ELAM driver to provide the protection. The Windows ELAM driver must be enabled
for the Symantec ELAM driver to have any affect.
You use the Windows Group Policy editor to view and modify the Windows ELAM
settings. See your Windows documentation for more information.
Task Description
View the status of ELAM on your client You can see whether Symantec Endpoint Protection ELAM is enabled in the
computers Computer Status log.
View ELAM detections You can view early launch anti-malware detections in the Risk log.
Enable or disable ELAM You might want to disable Symantec Endpoint Protection ELAM to help
improve computer performance.
Task Description
Adjust ELAM detection settings if you The Symantec Endpoint Protection ELAM settings provide an option to treat
get false positives bad drivers and bad critical drivers as unknown. Bad critical drivers are the
drivers that are identified as malware but are required for computer startup.
You might want to select the override option if you get false positive
detections that block an important driver. If you block an important driver,
you might prevent client computers from starting up.
Note: ELAM does not support a specific exception for an individual driver.
The override option applies globally to ELAM detections.
Run Power Eraser on ELAM detections In some cases, an ELAM detection requires Power Eraser. In those cases,
that Symantec Endpoint Protection a message appears in the log suggesting that you run Power Eraser. You
cannot remediate can run Power Eraser from the console. Power Eraser is also part of the
Symantec Help tool. You should run Power Eraser in rootkit mode.
Note: If you change an existing Server URL to an invalid URL, clients use the
previously valid URL for the private Insight server. If the Server URL has never
been configured and you enter an invalid URL, clients use the default Symantec
Insight server.
At the next heartbeat, your clients start to use the specified private server for
reputation queries.
See How Symantec Endpoint Protection uses Symantec Insight to make decisions
about files on page 434.
See Configuring client groups to use private servers for reputation queries and
submissions on page 448.
This option redirects the reputation queries from clients in the group to a private
Insight server. The private Insight server stores a copy of Symantec's Insight
reputation database. The private Insight server handles the reputation queries
rather than Symantecs Insight server. When you use a private Insight server,
clients continue to send submissions about detections to Symantec. Typically
you use a private Insight server in a dark network, which is a network that is
disconnected from the Internet. In that case, Symantec cannot receive any client
submissions.
See Understanding server data collection and client submissions and their
importance to the security of your network on page 474.
You can also copy the private server configuration to other client groups.
You can specify multiple private servers to load balance network traffic. You can
also specify multiple groups of servers to manage failover.
When you choose to enable an ATP server, the ATP connection status appears in
the client user interface as well as the management console logs and reports. To
communicate with the ATP server, the Symantec Endpoint Protection client must
at a minimum run Virus and Spyware Protection.
Note: If you enable private servers for groups, 12.1.5 and earlier clients in those
groups cannot use Symantec servers if the designated private server is not available.
12.1.5 and earlier clients cannot use the priority list and must be configured to use
a single server.
7 In the Add Private Server dialog, select the protocol and then enter the host
name for the URL.
8 Specify the port number for the server.
9 To designate this server as the single server that 12.1.5 and earlier clients use,
click Use this server as the private Insight server for 12.1.5 clients and
earlier. The 12.1.5 and earlier clients cannot use a server list, so you must
specify which server these legacy clients should use.
10 To add a priority group, click Add > New Group.
11 To apply the settings to additional client groups, click Copy settings. Select
the groups and locations, and then click OK.
Chapter 18
Customizing scans
This chapter includes the following topics:
Customizing the virus and spyware scans that run on Windows computers
Customizing the virus and spyware scans that run on Mac computers
Customizing the virus and spyware scans that run on Linux computers
Changing the action that Symantec Endpoint Protection takes when it makes a
detection
Customizing scans 452
Customizing the virus and spyware scans that run on Windows computers
Allowing users to view scan progress and interact with scans on Windows
computers
Task Description
Customize Auto-Protect settings You can customize Auto-Protect in many ways, including the configuration
for the following settings:
You can also enable or disable the Scan Results dialog for Auto-Protect
scans of the file system.
Customize administrator-defined scans You can customize the following types of options for scheduled and
on-demand scans.
Compressed files
Tuning options
Advanced schedule options
User notifications about detections
Task Description
Adjust ELAM settings You might want to enable or disable Symantec Endpoint Protection early
launch anti-malware (ELAM) detection if you think ELAM is affecting your
computers' performance. Or you might want to override the default detection
setting if you get many false positive ELAM detections.
Adjust Download Insight settings You might want to adjust the malicious file sensitivity to increase or decrease
the number of detections. You can also modify actions for detections and
user notifications for detections.
Customize scan actions You can change the action that Symantec Endpoint Protection takes when
it makes a detection.
See Changing the action that Symantec Endpoint Protection takes when it
makes a detection on page 468.
Customize global scan settings You might want to customize global scan settings to increase or decrease
the protection on your client computers.
See Modifying global scan settings for Windows clients on page 465.
Customize miscellaneous options for You can specify the types of risk events that clients send to Symantec
Virus and Spyware Protection Endpoint Protection Manager.
Task Description
Customize Auto-Protect You can customize Auto-Protect settings for the clients that run on Mac computers.
See Customizing Auto-Protect for Mac clients on page 456.
Customize administrator-defined You can customize common settings and notifications as well as scan priority.
scans
You can also enable or disable a warning to alert the user when definitions are
out-of-date.
Task Description
Customize Auto-Protect settings You can customize Auto-Protect in many ways, including the configuration
for the following settings:
You can also enable or disable the Scan Results dialog for Auto-Protect
scans of the file system.
Customize administrator-defined scans You can customize the following types of options for scheduled and
on-demand scans.
Task Description
Customize scan actions You can change the action that Symantec Endpoint Protection takes when
it makes a detection.
See Changing the action that Symantec Endpoint Protection takes when it
makes a detection on page 468.
Customize miscellaneous options for You can specify the types of risk events that clients send to Symantec
Virus and Spyware Protection Endpoint Protection Manager.
4 Under Scanning, under File types, select one of the following options:
Scan all files
This option is the default and is the most secure option.
Scan only selected extensions
You can improve scan performance by selecting this option, however, you
might decrease the protection on your computer.
11 Click OK.
12 On the Actions tab, set any of the options.
See Changing the action that Symantec Endpoint Protection takes when it
makes a detection on page 468.
You can also set remediation options for Auto-Protect.
13 On the Notifications tab, set any of the notification options.
See Managing the virus and spyware notifications that appear on client
computers on page 441.
14 On the Advanced tab, set any of the following options:
Startup and shutdown
Reload options
5 Under General Scan Details, specify the files that Auto-Protect scans.
Note: To exclude files from the scan, you must select Scan everywhere except
in specified folders, and then add an Exceptions policy to specify the files to
exclude.
See Excluding a file or a folder from scans on page 541.
6 Under Scan Mounted Disk Details, check or uncheck any of the available
options.
7 On the Notifications tab, set any of the notification options, and then click OK.
See Customizing the virus and spyware scans that run on Mac computers
on page 453.
See Changing the action that Symantec Endpoint Protection takes when it makes
a detection on page 468.
See Managing the virus and spyware notifications that appear on client computers
on page 441.
See Changing the action that Symantec Endpoint Protection takes when it makes
a detection on page 468.
See Managing the virus and spyware notifications that appear on client computers
on page 441.
5 On the Scan Details tab, you can enable or disable Insight Lookup for legacy
12.1.x clients only.
6 For scheduled scans only, on the Schedule tab, set any of the following options:
Scan Duration
You can set how long the scan runs before it pauses and waits until the
client computer is idle. You can also randomize scan start time.
Missed Scheduled Scans
You can specify a retry interval for missed scans.
5 You can also enable or disable idle-time scans. Enabling the option improves
computer performance; disabling the option improves scan performance.
6 Click OK.
Edit the scan details for any other scan that is included in this policy.
7 On the Notifications tab, enable or disable notification messages about scan
detections. The setting applies to all scheduled scans that you include in this
policy.
8 On the Common Settings tab, set any of the following options:
Scan Options
Actions
Alerts
These options apply to all scheduled scans that you include in this policy.
9 Click OK.
To customize the on-demand scans that run on Mac computers
1 On the Virus and Spyware Protection Policy page, under Mac Settings, select
Administrator-Defined Scans.
2 Under Administrator On-demand Scan, click Edit.
3 On the Scan Details tab, under Scan drives and folders, select the items
that you want to scan.
You can also specify actions for scan detections and enable or disables scans
of compressed files.
4 On the Notifications tab, enable or disable notifications for detections.
You can also specify the message that appears on the client.
5 Click OK.
See Customizing the virus and spyware scans that run on Mac computers
on page 453.
See Setting up scheduled scans that run on Mac computers on page 421.
See Changing the action that Symantec Endpoint Protection takes when it makes
a detection on page 468.
See Managing the virus and spyware notifications that appear on client computers
on page 441.
Customizing scans 463
Customizing administrator-defined scans for clients that run on Linux computers
4 On the Scan Details tab, check Scan all folders or specify the particular
folders you want to scan.
5 Click Scan all files or Scan only selected extensions and specify the
extensions you want to scan.
6 On the Scan files inside compressed files choice, you can reduce the number
of levels to scan compressed files. If you reduce the number of levels, you
might improve client computer performance.
7 Check or uncheck Scan for security risks.
8 For scheduled scans only, on the Schedule tab, set any of the following options:
Scanning schedule
You can set how often the scan runs, on a daily, weekly, or monthly basis.
Missed Scheduled Scans
You can specify a retry interval for missed scans.
8 Click OK.
9 Make sure that you apply the policy to the group that includes the computers
that run Virtual Machines.
See Adjusting scans to improve computer performance on page 424.
See Setting up scheduled scans that run on Windows computers on page 419.
Note: If you increase the protection on your client computers by modifying these
options, you might affect client computer performance.
Password for mapped network Specifies whether or not clients prompt users for
drives a password when the client scans network drives.
4 Click OK.
Customizing scans 466
Modifying log handling and notification settings on Windows computers
Warning: For security risks, use the Delete action with caution. In some cases,
deleting security risks causes applications to lose functionality. If you configure the
client to delete the files that security risks affect, it cannot restore the files.
To back up the files that security risks affect, use the Quarantine action instead.
Customizing scans 469
Changing the action that Symantec Endpoint Protection takes when it makes a detection
To change the action that Symantec Endpoint Protection takes when it makes a
detection on Windows or Linux clients
1 In the Virus and Spyware Protection policy, under Windows Settings or Linux
Settings, select the scan (any Auto-Protect scan, administrator scan, or
on-demand scan).
2 On the Actions tab, under Detection, select a type of malware or security risk.
By default, each subcategory is automatically configured to use the actions
that are set for the entire category.
Check Override actions configured for Security Risks, and then set the
actions for that subcategory only.
4 Under Actions for, select the first and second actions that the client software
takes when it detects that category of virus or security risk.
For security risks, use the Delete action with caution. In some cases, deleting
security risks causes applications to lose functionality.
5 Repeat these steps for each category for which you want to set actions (viruses
and security risks).
6 When you finish configuring this policy, click OK.
To change the action that Symantec Endpoint Protection takes when it makes a
detection on Mac clients
1 In the Virus and Spyware Protection policy, under Mac Settings, select
Administrator-Defined Scans.
2 Do one of the following actions:
For scheduled scans, select the Common Settings tab.
Customizing scans 470
Allowing users to view scan progress and interact with scans on Windows computers
You can allow the user to perform the following scan actions:
Pause When a user pauses a scan, the Scan Results dialog box remains open
and waits for the user to either continue or abort the scan. If the
computer is turned off, the paused scan does not continue.
Snooze When a user snoozes a scheduled scan, the user has the option of
snoozing the scan for one hour or three hours. The number of snoozes
is configurable. When a scan snoozes, the Scan Results dialog box
closes; it reappears when the snooze period ends and the scan
resumes.
Stop When a user stops a scan, the scan usually stops immediately. If a user
stops a scan while the client software scans a compressed file, the
scan does not stop immediately. In this case, the scan stops as soon
as the compressed file has been scanned. A stopped scan does not
restart.
Note: Users can stop a Power Eraser analysis but cannot pause or snooze it.
You can click Help for more information about the options that are used in this
procedure.
To allow users to view scan progress and interact with scans on Windows computers
1 In the console, open a Virus and Spyware Protection policy.
2 Under Windows Settings, click Administrator-defined Scans.
3 On the Advanced tab, under Scan Progress Options, click Show scan
progress or Show scan progress if risk detected.
4 To automatically close the scan progress indicator after the scan completes,
check Close the scan progress window when done.
5 Check Allow user to stop scan.
6 Click Pause Options.
7 In the Scan Pause Options dialog box, do any of the following actions:
To limit the time that a user may pause a scan, check Limit the time the
scan may be paused, and then type a number of minutes. The range is 3
to 180.
To limit the number of times a user may delay (or snooze) a scan, in the
Maximum number of snooze opportunities box, type a number between
1 and 8.
Customizing scans 472
Configuring Windows Security Center notifications to work with Symantec Endpoint Protection clients
By default, a user can delay a scan for one hour. To change this limit to
three hours, check Allow users to snooze the scan for 3 hours.
8 Click OK.
See Managing scans on client computers on page 402.
Note: You can configure all the Windows Security Center options on your client
computers that run Windows XP SP3 only. You can only configure the Display a
Windows Security Center message when definitions are outdated option or
Windows Vista and Windows 7 and later.
Table 18-4 Options to configure how Windows Security Center works with the
client
Disable Windows Security Lets you permanently or temporarily Disable Windows Security Center
Center disable Windows Security Center on your permanently if you do not want your client
client computers. users to receive the security alerts that it
provides. Client users can still receive
Available options:
Symantec Endpoint Protection alerts.
Never. Windows Security Center is
always enabled on the client computer. Enable Windows Security Center
permanently if you want your client users
Once. Windows Security Center is
to receive the security alerts that it
disabled only once. If a user enables
provides. You can set Windows Security
it, it is not disabled again.
Center to display Symantec Endpoint
Always. Windows Security Center is
Protection alerts.
permanently disabled on the client
computer. If a user enables it, it is
immediately disabled.
Restore. Windows Security Center is
enabled if the Virus and Spyware
Protection Policy previously disabled
it.
Customizing scans 473
Configuring Windows Security Center notifications to work with Symantec Endpoint Protection clients
Table 18-4 Options to configure how Windows Security Center works with the
client (continued)
Display antivirus alerts Lets you set antivirus alerts from the Enable this setting if you want your users
within Windows Security Symantec Endpoint Protection client to to receive Symantec Endpoint Protection
Center appear in the Windows notification area. alerts with other security alerts in the
Windows notification area of their
computers.
Display a Windows Security Lets you set the number of days after Set this option if you want Windows
Center message when which Windows Security Center considers Security Center to notify your client users
definitions are outdated definitions to be outdated. By default, about outdated definitions more frequently
Windows Security Center sends this than the default time (30 days).
message after 30 days.
Note: On client computers, Symantec
Endpoint Protection checks every 15
minutes to compare the out-of-date time,
the date of the definitions, and the current
date. Typically, no out-of-date status is
reported to Windows Security Center
because definitions are usually updated
automatically. If you update definitions
manually you might have to wait up to 15
minutes to view an accurate status in
Windows Security Center.
Understanding server data collection and client submissions and their importance
to the security of your network
Both server data and client submissions are critical to improving the security of your
network.
What is server data collection?
What are anonymous client submissions?
What are non-anonymous client submissions?
Concerns about privacy
Concerns about bandwidth usage
Manually submitting files to Symantec
Note: Symantec always recommends that you keep server data collection enabled.
Note: Mac client submissions do not include SONAR or file reputation submissions.
Linux clients do not support any client submissions.
The anonymous information that clients send to Symantec benefits you by:
Increasing the security of your network
Optimizing product performance
In some cases, however, you might want to prevent your clients from submitting
some information. For example, your corporate policies might prevent your client
computers from sending any network information to outside entities. You can disable
a single type of submission, such as submission of network information, rather than
disabling all types of client submissions.
Note: Symantec recommends that you always keep client submissions enabled.
Disabling submissions might interfere with faster resolution of false positive
detections on the applications that are used exclusively in your organization. Without
information about the malware in your organization, product response and Symantec
response to threats might take longer.
Note: Mac client submissions do not include SONAR or file reputation submissions.
Linux clients do not support any client submissions.
Managing the information that the management server and clients send to Symantec 478
How Symantec Endpoint Protection minimizes the impact of client submissions on your network bandwidth
7 Select OK.
Note: On Mac clients, you can also disable IPS ping submissions. See the following
article:
How to disable IPS data submission on Symantec Endpoint Protection for Mac
clients
Note: If your client computers use a proxy with authentication, you might need to
specify exceptions for Symantec URLs in your proxy server configuration. The
exceptions let your client computers communicate with Symantec Insight and other
important Symantec sites.
You need to include exceptions for Symantec URLs in your proxy server settings
if you use the following proxy configuration options:
You use a proxy server with authentication.
You select Use a proxy server specified by my client browser option in the
Symantec Endpoint Protection Manager External Communication Dialog.
Managing the information that the management server and clients send to Symantec 480
Specifying a proxy server for client submissions and other external communications
About SONAR
Managing SONAR
About SONAR
SONAR is a real-time protection that detects potentially malicious applications when
they run on your computers. SONAR provides "zero-day" protection because it
detects threats before traditional virus and spyware detection definitions have been
created to address the threats.
SONAR uses heuristics as well as reputation data to detect emerging and unknown
threats. SONAR provides an additional level of protection on your client computers
and complements your existing Virus and Spyware Protection, intrusion prevention,
Generic Exploit Mitigation, and firewall protection
SONAR uses a heuristics system that leverages Symantec's online intelligence
network with proactive local monitoring on your client computers to detect emerging
threats. SONAR also detects changes or behavior on your client computers that
you should monitor.
Managing SONAR and Tamper Protection 482
About SONAR
Note: Auto-Protect also uses a type of heuristic that is called Bloodhound to detect
suspicious behavior in files.
SONAR might inject some code into the applications that run in Windows user mode
to monitor them for suspicious activity. In some cases, the injection might affect the
application performance or cause problems with running the application. You can
create an exception to exclude the file, folder, or application from this type of
monitoring.
SONAR does not make detections on application type, but on how a process
behaves. SONAR acts on an application only if that application behaves maliciously,
regardless of its type. For example, if a Trojan horse or keylogger does not act
maliciously, SONAR does not detect it.
SONAR detects the following items:
System changes SONAR detects applications or the files that try to modify
DNS settings or a host file on a client computer.
Trusted applications that Some good trusted files might be associated with suspicious
exhibit bad behavior behavior. SONAR detects these files as suspicious behavior
events. For example, a well-known document sharing
application might create executable files.
If you disable Auto-Protect, you limit SONAR's ability to make detections of high
and low risk files. If you disable Insight lookups (reputation queries), you also limit
the SONAR's detection capability.
Note: SONAR does not inject code into applications on computers that run Symantec
Endpoint Protection earlier than 12.1.2. If you use Symantec Endpoint Protection
Manager 12.1.2 or later to manage clients, a SONAR file exception in an Exceptions
policy is ignored on those legacy clients. If you use a legacy Symantec Endpoint
Protection Manager to manage clients, the legacy policy does not support SONAR
file exceptions for your Symantec Endpoint Protection 12.1.2 clients. You can
prevent SONAR code injection into applications on these clients, however, by
creating an Application to monitor exception in the legacy policy. After the client
learns the application, you can configure an application exception in the policy.
Managing SONAR
SONAR is part of Proactive Threat Protection on your client computers and the
Virus and Spyware Protection policy in Symantec Endpoint Protection Manager.
Task Description
Learn how SONAR works Learn how SONAR detects unknown threats. Information about how SONAR
works can help you make decisions about using SONAR in your security
network.
Check that SONAR is enabled To provide the most complete protection for your client computers you should
enable SONAR. SONAR interoperates with some other Symantec Endpoint
Protection features. SONAR requires Auto-Protect.
You can use the Clients tab to check whether Proactive Threat Protection is
enabled on your client computers.
Check the default settings for SONAR SONAR settings are part of a Virus and Spyware Protection policy.
See About the default Virus and Spyware Protection policy scan settings
on page 414.
Make sure that Insight lookups are SONAR uses reputation data in addition to heuristics to make detections. If
enabled you disable Insight lookups, SONAR makes detections by using heuristics
only. The rate of false positives might increase, and the protection that SONAR
provides is limited.
See Understanding server data collection and client submissions and their
importance to the security of your network on page 474.
Monitor SONAR events to check for You can use the SONAR log to monitor events.
false positive detections
You can also view the SONAR Detection Results report (under Risk Reports)
to view information about detections.
Task Description
Adjust SONAR settings You can change the detection action for some types of threats that SONAR
detects. You might want to change the detection action to reduce false positive
detections.
You also might want to enable or disable notifications for high or low risk
heuristic detections.
See Handling and preventing SONAR false positive detections on page 485.
Prevent SONAR from detecting the SONAR might detect the files or applications that you want to run on your client
applications that you know are safe computers. You can use an Exceptions policy to specify exceptions for the
specific files, folders, or applications that you want to allow. For the items that
SONAR quarantines, you can create an exception for the quarantined item
from the SONAR log.
You also might want to set SONAR actions to log and allow detections. You
can use application learning so that Symantec Endpoint Protection learns the
legitimate applications on your client computers. After Symantec Endpoint
Protection learns the applications that you use in your network, you can change
the SONAR action to Quarantine.
Note: If you set the action for high risk detections to log only, you might allow
potential threats on your client computers.
See Handling and preventing SONAR false positive detections on page 485.
Prevent SONAR from examining some In some cases an application might become unstable or cannot run when
applications SONAR injects code into the application to examine it. You can create a file,
folder, or application exception for the application.
See Creating exceptions for Virus and Spyware scans on page 537.
Manage the way SONAR detects the You can use the SONAR policy settings to globally adjust the way SONAR
applications that make DNS or host handles detections of DNS or host file changes. You can use the Exceptions
file changes policy to configure exceptions for specific applications.
See Creating an exception for an application that makes a DNS or host file
change on page 548.
Managing SONAR and Tamper Protection 485
Handling and preventing SONAR false positive detections
Task Description
Allow clients to submit information Symantec recommends that you enable submissions on your client computers.
about SONAR detections to Symantec The information that clients submit about detections helps Symantec address
threats. The information helps Symantec create better heuristics, which results
in fewer false positive detections.
See Understanding server data collection and client submissions and their
importance to the security of your network on page 474.
Warning: If you set the action for high risk detections to log only, you might allow
potential threats on your client computers.
Managing SONAR and Tamper Protection 486
Adjusting SONAR settings on your client computers
Task Description
Log SONAR high risk heuristic You might want to set detection action for high risk heuristic detections to
detections and use application learning Log for a short period of time. Let application learning run for the same period
of time. Symantec Endpoint Protection learns the legitimate processes that
you run in your network. Some true detections might not be quarantined,
however.
After the period of time, you should set the detection action back to
Quarantine.
Note: If you use aggressive mode for low risk heuristic detections, you
increase the likelihood of false positive detections. Aggressive mode is
disabled by default.
Create exceptions for SONAR to allow You can create exceptions for SONAR in the following ways:
safe applications
Use the SONAR log to create an exception for an application that was
detected and quarantined
You can create an exception from the SONAR log for false positive
detections. If the item is quarantined, Symantec Endpoint Protection
restores the item after it rescans the item in the Quarantine. Items in the
Quarantine are rescanned after the client receives updated definitions.
See Creating exceptions from log events on page 549.
See Configuring how the Quarantine handles the rescanning of files
after new definitions arrive on page 439.
Use an Exceptions policy to specify an exception for a particular file name,
folder name, or application.
You can exclude an entire folder from SONAR detection. You might want
to exclude the folders where your custom applications reside.
See Creating exceptions for Virus and Spyware scans on page 537.
3 Under Scan Details, change the actions for high or low risk heuristic threats.
You can enable aggressive mode for low risk detections. This setting increases
SONAR sensitivity to low risk detections. It might increase the false positive
detections.
4 Optionally change the settings for the notifications that appear on your client
computers.
5 Under System Change Events, change the action for either DNS change
detected or Host file change detected.
Note: The Prompt action might result in many notifications on your client
computers. Any action other than Ignore might result in many log events in
the console and email notifications to administrators.
Warning: If you set the action to Block, you might block important applications
on your client computers.
For example, if you set the action to Block for DNS change detected, you
might block VPN clients. If you set the action to Block for Host file change
detected, you might block your applications that need to access the host file.
You can use a DNS or host file change exception to allow a specific application
to make DNS or host file changes.
See Creating an exception for an application that makes a DNS or host file
change on page 548.
6 Under Suspicious Behavior Detection, you can change the action for high
or low risk detections.
If SONAR is disabled, you can also enable or disable Suspicious Behavior
Detection.
7 Click OK.
Managing SONAR and Tamper Protection 488
Monitoring SONAR detection results to check for false positives
Event The event type and the action that the client has taken on the process,
such as cleaning it or logging it. Look for the following event types:
File/Path The path name from where the process was launched.
The Event column tells you immediately whether a detected process is a security
risk or a possible legitimate process. However, a potential risk that is found may or
may not be a legitimate process, and a security risk that is found may or may not
be a malicious process. Therefore, you need to look at the Application type and
File/Path columns for more information. For example, you might recognize the
application name of a legitimate application that a third-party company has
developed.
To monitor SONAR detection results to check for false positives
1 In the console, click Monitors > Logs.
2 On the Logs tab, in the Log type drop-down list, click SONAR.
3 Select a time from the Time range list box closest to when you last changed
a scan setting.
4 Click Additional Settings.
5 In the Event type drop-down list, select one of the following log events:
To view all detected processes, make sure All is selected.
Managing SONAR and Tamper Protection 489
Changing Tamper Protection settings
To view the processes that have been evaluated as security risks, click
Security risk found.
To view the processes that have been evaluated and logged as potential
risks, click Potential risk found.
Warning: Application control and system lockdown are advanced security features
that only experienced administrators should configure.
You use application control, system lockdown, and device control for the following
tasks.
Both application control and device control are supported on 32-bit and 64-bit
Windows computers.
As of 14, Mac computers support device control.
Managing application control, device control, and system lockdown 492
Setting up application control
Steps Description
Open a policy and enable default Application Control policies contain predefined rule sets, which are disabled
application control rule sets by default. You can enable any sets that you need, and apply the policy to
a group. The predefined rule sets are configured in production mode rather
than test mode. However, you should change the setting to test mode and
test the rules in your test network before you apply them to your production
network.
Add additional application control rules If the default rule sets do not meet your requirements, add new rule sets and
(optional) rules. Typically only advanced administrators should perform this task.
Add exceptions for applications Application control injects code in some applications to examine them, which
can slow applications that run on the computer. If necessary, you can exclude
some applications from application control. You use an Exceptions policy to
add file exceptions or folder exceptions for application control.
Steps Description
View the Application Control logs If you are testing a new policy or are troubleshooting an issue, you should
monitor application control events in the log.
In both test mode and production mode, application control events are in the
Application Control log in Symantec Endpoint Protection Manager. On the
client computer, application control and device control events appear in the
Control log.
You might see duplicate or multiple log entries for a single application control
action. For example, if explorer.exe tries to copy a file, it sets the write and
delete bits of the file's access mask. Symantec Endpoint Protection logs the
event. If the copy action fails because an application control rule blocks the
action, explorer.exe tries to copy the file by using only the delete bit in the
access mask. Symantec Endpoint Protection logs another event for the copy
attempt.
Prevent or allow users from enabling or In rare cases, application control might interfere with some safe applications
disabling application control (optional) that run on client computers. You might want to allow users to disable this
option to troubleshoot problems. In the mixed mode or client mode, use the
Allow user to enable and disable the application device control setting
in the Client User Interface Settings dialog.
You can also use system lockdown to allow approved applications or block
unapproved applications on the client computers.
See Configuring system lockdown on page 504.
In the following task you can enable and test the Block writing to USB drives rule
set.
To enable a default application rule set
1 In the console, click Policies > Application and Device Control, and under
Tasks, click Add an Application Control Policy.
2 In the Overview pane, type a name and description for the policy.
3 Click Application Control.
4 In the Application Control pane, check the Enabled check box next to each
rule set that you want to implement.
For example, next to the Block writing to USB drives rule set, check the
check box in the Enabled column.
5 To review the rules for the rule set, select the rule, click Edit, and then click
OK.
See Adding custom rules to Application Control on page 496.
6 Change Production to Test (log only).
7 Assign the policy to a group, and click OK.
To test the rule set Block writing to USB drives
1 On the client computer, attach a USB drive.
2 Open Windows Explorer and double-click the USB drive.
3 Right-click the window and click New > Folder.
If application control is in effect, an Unable to create folder error message
appears.
See About application control, system lockdown, and device control on page 490.
See About the structure of an Application Control and Device Control policy
on page 494.
Device control consists of a list of blocked devices and a list of devices that are
excluded from blocking. You can add to these two lists and manage their
contents.
Figure 21-1 illustrates the application and device control components and how they
relate to each other.
See About application control, system lockdown, and device control on page 490.
See Setting up application control on page 492.
See Adding custom rules to Application Control on page 496.
See Managing device control on page 528.
Managing application control, device control, and system lockdown 496
Adding custom rules to Application Control
Consider the order of the rules and their conditions when you configure them to
avoid unexpected consequences. Typically only advanced administrators should
perform this task.
See Best practices for adding application control rules on page 499.
To add custom rule sets and rules
1 Open an Application Control policy.
See Enabling and testing default application rules on page 493.
2 In the Application Control panel, under the list of default rule sets, click Add.
To modify a predefined rule set, select it and then click Edit. For example, to
monitor the applications that access the BitTorrent protocol, select Block
programs from running from removable drives [AC2].
3 In the Add Application Control Rule Set dialog box, type a name and
description for the rule set.
4 Under Rules, select Rule 1, and on the Properties tab, type a meaningful
name and description for the rule.
To add an additional rule, click Add > Add Rule.
Each condition has its own specific actions to take on the process when the condition
is true. Except for the Terminate process action, the actions always apply to the
process that you define for the rule, and not the condition.
Warning: The Terminate process action terminates the caller process, or the
application that made the request. The caller process is the process that you define
in the rule and not the condition. The other actions act on the target process, defined
in the condition.
See Best practices for choosing which condition to use for a rule on page 501.
Condition Description
Registry Access Attempts Allows or blocks access to a client computer's registry settings.
File and Folder Access Allows or blocks access to defined files or folders on a client
Attempts computer.
Launch Process Attempts Allows or blocks the ability to launch a process on a client
computer.
Load DLL Attempts Allows or blocks the ability to load a DLL on a client computer.
3 In the Add entity Definition dialog box, type process name, DLL, or registry
key.
For example, to add BitTorrent, type its file path and executable, such as:
C:\Users\UserName\AppData\Roaming\BitTorrent
Consider the rule order Application control rules work similarly to You want to prevent all users from moving,
most network-based firewall rules in that copying, and creating files on USB drives.
both use the first rule match feature. When
You have an existing rule with a condition
multiple conditions are true, the first rule is
that allows write access to a file named
the only one that is applied unless the
Test.doc. You add a second condition to
action that is configured for the rule is to
this existing rule set to block all USB
Continue processing other rules.
drives. In this scenario, users are still able
to create and modify a Test.doc file on USB
drives. The Allow access to Test.doc
condition comes before the Block access
to USB drives condition in the rule set. The
Block access to USB drives condition
does not get processed when the condition
that precedes it in the list is true.
Use the right action The Terminate Process Attempts Process Explorer is a tool that displays the
condition allows or blocks an application's DLL processes that have opened or
ability to terminate the calling process on loaded, and what resources the processes
a client computer. use.
The condition does not allow or prevent You might want to terminate Process
users from stopping an application by the Explorer when it tries to terminate a
usual methods, such as clicking Quit from particular application.
the File menu.
Use the Terminate Process Attempts
condition and the Terminate process
action to create this type of rule. You apply
the condition to the Process Explorer
application. You apply the rule to the
application or applications that you do not
want Process Explorer to terminate.
Use one rule set per goal Create one rule set that includes all of the You want to block write attempts to all
actions that allow, block, or monitor a given removable drives and you want to block
task. applications from tampering with a
particular application.
Use the Terminate process The Terminate process action kills the You want to terminate Winword.exe any
action sparingly calling process when the process meets time that any process launches
the configured condition. Winword.exe.
Only advanced administrators should use You create a rule and configure it with the
the Terminate process action. Typically, Launch Process Attempts condition and
you should use the Block access action the Terminate process action. You apply
instead. the condition to Winword.exe and apply
the rule to all processes.
Test rules before you put The Test (log only) option for rule sets The test option reduces potential accidents
them into production logs the actions, and does not apply to the you might make by not considering all
actions to the client computer. Run rules possibilities of the rule.
in test mode for some acceptable period
See Testing application control rules
of time before you switch them back to
on page 503.
production mode. During this time period,
review the Application Control logs and
verify that the rules work as planned.
Rule Condition
Prevent users from opening an You can block an application when it meets either of these conditions:
application
Launch Process Attempts
For example, to prevent users from transferring FTP files, you can add
a rule that blocks a user from launching an FTP client from the command
prompt.
Load DLL Attempts
For example, if you add a rule that blocks Msvcrt.dll on the client
computer, users cannot open Microsoft WordPad. The rule also blocks
any other application that uses the DLL.
Prevent users from writing to a particular You may want to let users open a file but not modify the file. For example,
file a file may include the financial data that employees should view but not edit.
You can create a rule to give users read-only access to a file. For example,
you can add a rule that lets you open a text file in Notepad but does not let
you edit it.
Use the File and Folder Access Attempts condition for this type of rule.
Block file shares on Windows computers You can disable local file and print sharing on Windows computers.
Include the following conditions:
You can also use firewall rules to prevent or allow client computers to share
files.
See Permitting clients to browse for files and printers in the network
on page 362.
Managing application control, device control, and system lockdown 503
Testing application control rules
Rule Condition
Prevent users from running peer-to-peer You can prevent users from running peer-to-peer applications on their
applications computers.
You can create a custom rule with a Launch Process Attempts condition.
In the condition, you must specify all peer-to-peer applications that you want
to block, such as LimeWire.exe or *.torrent. You can set the action for the
condition to Block access.
Block write attempts to DVD drives Currently, application control does not have a default rule that blocks CD/DVD
writing directly. Instead, you create a rule that blocks the specific DLLs that
write to CD or DVD drives using the Add Condition and File and Folder
Access Attempts conditions.
You should also create a Host Integrity policy that sets the Windows registry
key to block write attempts to DVD drives.
Note: Any applications that system lockdown allows are subject to other protection
features in Symantec Endpoint Protection.
A whitelist or blacklist can include file fingerprint lists and specific application names.
A file fingerprint list is a list of file checksums and computer path locations.
You can use an Application and Device Control policy to control specific applications
instead of or in addition to system lockdown.
You set up system lockdown for each group or location in your network.
Managing application control, device control, and system lockdown 506
Configuring system lockdown
Action Description
Step 1: Create file fingerprint lists You can create a file fingerprint list that includes the applications that are
allowed or not allowed to run on your client computers. You use the file
fingerprint list as part of a whitelist or blacklist in system lockdown.
When you run system lockdown, you need a file fingerprint list that includes
all of the applications you want to whitelist or blacklist. For example, your
network might include Windows Vista 32-bit, Windows Vista 64-bit, and
Windows XP SP2 clients. You can create a file fingerprint list for each client
image that you want to whitelist.
You can create a file fingerprint list in the following ways:
Note: In 12.1.6 or later, if you run Symantec ATP in your network, you might
see file fingerprint lists from Symantec ATP.
See Interaction between system lockdown and Symantec ATP blacklist rules
on page 515.
Managing application control, device control, and system lockdown 507
Configuring system lockdown
Action Description
Step 2: Import file fingerprint lists into Before you can use a file fingerprint list in the system lockdown configuration,
Symantec Endpoint Protection the list must be available in Symantec Endpoint Protection Manager.
Manager
When you create file fingerprint lists with a checksum tool, you must manually
import the lists into Symantec Endpoint Protection Manager.
When you create a file fingerprint list with the Collect File Fingerprint List
command, the resulting list is automatically available in the Symantec Endpoint
Protection Manager console.
You can also export existing file fingerprint lists from Symantec Endpoint
Protection Manager.
Step 3: Create application name lists You can use any text editor to create a text file that includes the file names of
for approved or unapproved the applications that you want to whitelist or blacklist. Unlike file fingerprint
applications lists, you import these files directly into the system lockdown configuration.
After you import the files, the applications appear as individual entries in the
system lockdown configuration.
You can also manually enter individual application names in the system
lockdown configuration.
Note: A large number of named applications might affect client computer
performance when system lockdown is enabled in blacklist mode.
See Creating an application name list to import into the system lockdown
configuration on page 516.
Managing application control, device control, and system lockdown 508
Configuring system lockdown
Action Description
Step 4: Set up and test the system In test mode, system lockdown is disabled and does not block any applications.
lockdown configuration All unapproved applications are logged but not blocked. You use the Log
Unapproved Applications Only option in the System Lockdown dialog to
test the entire system lockdown configuration.
To set up and run the test, complete the following steps:
See Setting up and testing the system lockdown configuration before you
enable system lockdown on page 521.
Step 5: View the unapproved After you run the test for a period of time, you can check the list of unapproved
applications and modify the system applications. You can view the list of unapproved applications by checking the
lockdown configuration if necessary status in the System Lockdown dialog box.
You can decide whether to add more applications to the file fingerprint or the
applications list. You can also add or remove file fingerprint lists or applications
if necessary before you enable system lockdown.
See Setting up and testing the system lockdown configuration before you
enable system lockdown on page 521.
Managing application control, device control, and system lockdown 509
Configuring system lockdown
Action Description
Step 6: Enable system lockdown By default, system lockdown runs in whitelist mode. You can configure system
lockdown to run in blacklist mode instead.
When you enable system lockdown in whitelist mode, you block any application
that is not on the approved applications list. When you enable system lockdown
in blacklist mode, you block any application that is on the unapproved
applications list.
Note: Make sure that you test your configuration before you enable system
lockdown. If you block a needed application, your client computers might be
unable to restart.
Action Description
Step 7: Update file fingerprint lists for Over time, you might change the applications that run in your network. You
system lockdown can update your file fingerprint lists or remove lists as necessary.
You can update file fingerprint lists in the following ways:
Manually append, replace, or merge file fingerprint lists that you imported.
You cannot append file fingerprint lists to a fingerprint list that you generate
with the Collect File Fingerprint List command. You can append an imported
list with a command-generated list. In that case, if you re-run the fingerprint
command, you must recreate the appended list.
See Manually updating a file fingerprint list in Symantec Endpoint Protection
Manager on page 514.
See Importing or merging file fingerprint lists in Symantec Endpoint
Protection Manager on page 513.
Automatically update existing file fingerprint lists that you imported.
You can also automatically update applications or the application name
lists that you import.
See Automatically updating whitelists or blacklists for system lockdown
on page 517.
See Creating an application name list to import into the system lockdown
configuration on page 516.
Re-run the Collect File Fingerprint List command to automatically update
a command-generated fingerprint list.
When you re-run the command, the new list automatically replaces the
existing list.
Note: You might want to re-test the entire system lockdown configuration if
you add client computers to your network. You can move new clients to a
separate group or test network and disable system lockdown. Or you can keep
system lockdown enabled and run the configuration in log-only mode. You can
also test individual file fingerprints or applications as described in the next step.
See Setting up and testing the system lockdown configuration before you
enable system lockdown on page 521.
Managing application control, device control, and system lockdown 511
Configuring system lockdown
Action Description
Step 8: Test selected items before you After system lockdown is enabled, you can test individual file fingerprints,
add or remove them when system application name lists, or specific applications before you add or remove them
lockdown is enabled to the system lockdown configuration.
You might want to remove file fingerprint lists if you have many lists and no
longer use some of them.
Note: Be careful when you add or remove a file fingerprint list or a specific
application from system lockdown. Adding or removing items from system
lockdown can be risky. You might block important applications on your client
computers.
See Testing selected items before you add or remove them when system
lockdown is already enabled on page 526.
See Running commands on client computers from the console on page 244.
To create a file fingerprint list with checksum.exe
1 Open a command prompt window on the computer that contains the image for
which you want to create a file fingerprint list.
The computer must have Symantec Endpoint Protection client software installed.
2 Navigate to the folder that contains the file checksum.exe. Typically, the file is
located in the following folder:
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection\
3 Type the following command:
checksum.exe\ outputfile path
where outputfile is the name of the text file that contains the checksums for all
the applications that are located on the specified drive. The output file is a text
file (outputfile.txt).
The format of each line is checksum_of_the_file space
full_pathname_of_the_exe_or_DLL.
Note: To run a checksum against all files on the C: drive, you must add the
backslash at the end of the command. Otherwise, the command only runs in
the folder where checksum.exe is located.
0bb018fad1b244b6020a40d7c4eb58b7 c:\dell\openmanage\remind.exe
35162d98c2b445199fef95e838feae4b c:\dell\pnp\m\co\HSFCI008.dll
2f276c59243d3c051547888727d8cc78 c:\Nokia Video Manager\QtCore4.dll
Example syntax
The following is an example of the syntax you could use to create a fingerprint list
for an image:
checksum.exe cdrive.txt c:
This command creates a file that is called cdrive.txt. It contains the checksums and
file paths of all the executables and DLLs found on the C drive of the client computer
on which it was run.
The following is an example of the syntax that you could use to create a fingerprint
for a folder on the client computer:
checksum.exe blocklist.txt c:\Files
Managing application control, device control, and system lockdown 513
Configuring system lockdown
This command creates a file that is called blocklist.txt. It contains the checksums
and file paths of any executables and DLLs found in the Files folder.
8 Click Next.
9 Do one of the following actions:
Managing application control, device control, and system lockdown 514
Configuring system lockdown
Specify the path to the file fingerprint that you created. You can browse to
find the file.
Select the fingerprint lists that you want to merge.
10 Click Next.
11 Click Close.
12 Click Finish.
The imported or merged fingerprint list appears under on the Policies tab under
Policies > Policy Components > File Fingerprint Lists.
Click Append a fingerprint file to this file fingerprint to add a new file to
an existing one.
Click Append another file fingerprint to this file fingerprint to merge file
fingerprint lists that you already imported.
Click Replace an existing list with a new one.
Click Remove any fingerprints that also appear on a new list.
Note: Symantec ATP sends whitelist rules directly to Symantec Endpoint Protection
clients. Symantec ATP does not send whitelist file fingerprints to Symantec Endpoint
Protection Manager.
Note: The test mode field enables or disables the Test Before Addition or Test
Before Removal option for each application in the list. The test mode field is ignored
when you use the Log Applications Only option to test the entire system lockdown
configuration.
For example:
aa.exe
bb.exe 0 1
cc.exe 1
dd.exe 1 0
"c:\program files\ee.exe" 0 0
When you import this list into system lockdown, the individual applications appear
in the system lockdown configuration with the following settings:
Step Description
Step 1: Create updated file fingerprint You can use the checksum.exe utility or any third-party utility to create the
lists or application name lists and updated file fingerprint lists. You can use any text editor to update application
compress the files name lists. The lists must have the same names that already exist in
Symantec Endpoint Protection Manager.
A fingerprint list that you generate from the Collect File Fingerprint List
command cannot be updated directly. You can merge a command-generated
list with another list, or append an imported list with a command-generated
list.
The automatic updates feature requires a compressed file (zip file) of the
file fingerprint and application name lists. You can use the file compression
feature in Windows or any compression utility to zip the files.
Step 2: Create an index.ini file The index.ini file specifies which file fingerprint lists and application names
lists Symantec Endpoint Protection Manager should update.
You can create an index.ini file with any text editor and copy the file to the
specified URL.
Step 3: Make the compressed file and Symantec Endpoint Protection Manager uses UNC, FTP, or HTTP/HTTPS
index.ini available to Symantec Endpoint to retrieve the index.ini file and zip file at the specified URL. Symantec
Protection Manager Endpoint Protection Manager uses the instructions in the index.ini file to
update the specified files. When you enable automatic updates, Symantec
Endpoint Protection Manager periodically checks the URL for updated files
based on the schedule you set.
Note: If you cannot use UNC, FTP, or HTTP/HTTPS, you can copy the
index.ini and updated file fingerprint and application name files directly into
the following folder: C:\Program Files (x86)\Symantec\Symantec Endpoint
Protection Manager\data\inbox\WhitelistBlacklist\content. The files should
be unzipped. Symantec Endpoint Protection Manager checks this folder if it
cannot use UNC, FTP, or HTTP/HTTPS to update the files.
Step 4: Enable automatic whitelist and You must enable the automatic update of existing whitelists or blacklists in
blacklist updates in the management the Symantec Endpoint Protection Manager console.
console
You use the File Fingerprint Update dialog in Symantec Endpoint Protection
Manager to enable the update feature and specify the schedule and the URL
information.
Step Description
Step 5: Check the status of automatic You can make sure that Symantec Endpoint Protection Manager completes
updates for the whitelist or blacklist the updates by checking the status in the console.
See Checking the status of automatic whitelist or blacklist updates for system
lockdown on page 521.
Note: If you use non-English characters in the text file, you should use UTF-8 without
a byte order mark (BOM) character to edit and save the file.
[Revision]
Revision=YYYYMMDD RXXX
SourceFile=zip file name
Description=optional description
For example, you could use the following lines in an index.ini file:
[Revision]
Revision=20111014 R001
SourceFile=20110901 R001.zip
Description=NewUpdates
[FingerprintList - Default]
FingerprintListName 1="FingerprintList1.txt" REPLACE
FingerprintListName 2="FingerprintList2.txt" REPLACE
[ApplicationNameList - Default]
My Company\Group AA\Group AA 1="ApplicationNameList1.txt" REPLACE
My Company\Group AA\Group AA 2="ApplicationNameList2.txt" REPLACE
[FingerprintList - DomainABC]
FingerprintListName 1="FingerprintList1.txt" REPLACE
FingerprintListName 2="FingerprintList2.txt" REPLACE
[ApplicationNameList - DomainABC]
My Company\Group AA\Group AA 1="ApplicationNameList1.txt" REPLACE
My Company\Group AA\Group AA 2="ApplicationNameList2.txt" REPLACE
See Automatically updating whitelists or blacklists for system lockdown on page 517.
See Creating an application name list to import into the system lockdown
configuration on page 516.
4 On the File Fingerprint Update tab, check Automatically update the whitelist
or blacklist.
5 Enter the URL for the location of the index.ini and the compressed file.
If you want to use UNC or FTP, you must also specify a user name and
password for both the index.ini and the content.
6 Under Schedule, you can specify how often Symantec Endpoint Protection
Manager should try to update the whitelist or blacklist or you can use the default
setting.
7 Click OK.
See Automatically updating whitelists or blacklists for system lockdown on page 517.
See Automatically updating whitelists or blacklists for system lockdown on page 517.
See Viewing logs on page 603.
When you run system lockdown in test mode, system lockdown is disabled. System
lockdown does not block any applications. Instead, unapproved applications are
logged rather than blocked so that you can review the list before you enable system
lockdown. You can view the log entries in the Control log. You can also view the
unapproved applications in the System Lockdown dialog box.
Note: You can also create firewall rules to allow approved applications on the client.
To set up and test the system lockdown configuration before you enable system
lockdown
1 In the console, click Clients, then under Clients, locate the group for which
you want to set up system lockdown.
2 On the Policies tab, click System Lockdown.
3 Click Log Unapproved Applications Only to run system lockdown in test
mode.
This option logs the unapproved applications that clients are currently running.
4 Select Whitelist Mode or Blacklist Mode.
5 Under Application File Lists, under File Fingerprint List, add or remove file
fingerprint lists.
To add a list, the list must available in Symantec Endpoint Protection Manager.
See Importing or merging file fingerprint lists in Symantec Endpoint Protection
Manager on page 513.
6 To add an application name list, under Application File Lists, under File
Name, click Import.
Specify the application name list that you want to import and click Import. The
applications in the list appear as individual entries in the system lockdown
configuration.
Note: The application name list must be a text file that specifies the file name,
test mode, and matching mode.
See Creating an application name list to import into the system lockdown
configuration on page 516.
7 To add an individual application, under Application File Lists, under File
Name, click Add.
Managing application control, device control, and system lockdown 523
Configuring system lockdown
8 In the Add File Definition dialog box, specify the full path name of the file
(.exe or .dll).
Names can be specified using a normal string or regular expression syntax.
Names can include wildcard characters (* for any characters and ? for one
character). The name can also include environment variables such as
%ProgramFiles% to represent the location of your Program Files directory or
%windir% for the Windows installation directory.
9 Either leave Use wildcard matching (* and ? supported) selected by default,
or click Use regular expression matching if you used regular expressions in
the file name instead.
10 If you want to allow the file only when it is executed on a particular drive type,
click Only match files on the following drive types.
Unselect the drive types you do not want to include. By default, all drive types
are selected.
11 If you want to match by device ID type, check Only match files on the
following device id type, and then click Select.
12 Click the device you want in the list, and then click OK.
13 Click OK to start the test.
After a period of time, you can view the list of unapproved applications. If you re-open
the System Lockdown for name of group dialog box, you can see how long the
test has been running.
To view the unapproved applications that the test logged but did not block
1 In the System Lockdown name of group dialog box, click View Unapproved
Applications.
2 In the Unapproved Applications dialog box, review the applications.
This list includes information about the time that the application was run, the
computer host name, the client user name, and the executable file name.
3 Determine how you want to handle the unapproved applications.
For whitelist mode, you can add the names of applications that you want to
allow to the list of approved applications. For blacklist mode, you can remove
the names of applications that you want to allow.
4 In the Unapproved Applications dialog, click Reset the Test if you changed
the file fingerprint lists or individual applications and want to run the test again.
Otherwise, click Close.
5 After you finish testing, you can enable system lockdown.
See Configuring system lockdown on page 504.
Managing application control, device control, and system lockdown 524
Configuring system lockdown
Note: By default, system lockdown runs in whitelist mode when you enable it.
You should configure system lockdown to run in whitelist mode only after the
following conditions are true:
You tested the system lockdown configuration with the Log Unapproved
Applications Only option.
You are sure that all the applications that your client computers need to run are
listed in the approved applications list.
Warning: Be careful when you add or remove a file fingerprint list or a specific
application from system lockdown. Adding or removing items from system lockdown
can be risky. You might block important applications on your client computers.
See Setting up and testing the system lockdown configuration before you enable
system lockdown on page 521.
Note: If you run system lockdown enabled in whitelist mode, Symantec Endpoint
Protection Manager does not apply any blacklist rules from Symantec ATP.
See Interaction between system lockdown and Symantec ATP blacklist rules
on page 515.
Running system lockdown in whitelist mode
1 On the console, click Clients.
2 Under Clients, select the group for which you want to set up system lockdown.
If you select a subgroup, the parent group must have inheritance turned off.
3 On the Policies tab, click System Lockdown.
4 Under System Lockdown, select Enable System Lockdown to block any
unapproved applications that clients try to run.
Managing application control, device control, and system lockdown 525
Configuring system lockdown
Warning: You must include all the applications that your client computers run
in the approved applications list. If you do not, you could make some client
computers unable to restart or prevent users from running important
applications.
Note: If you run Symantec ATP in your network, the Symantec ATP configuration
affects the system lockdown blacklist configuration.
See Interaction between system lockdown and Symantec ATP blacklist rules
on page 515.
You should configure system lockdown to block unapproved applications only after
the following conditions are true:
You tested the system lockdown configuration with the Log Unapproved
Applications Only option.
You are sure that all of the applications that your client computers should block
are listed in the unapproved applications list.
See Setting up and testing the system lockdown configuration before you enable
system lockdown on page 521.
Managing application control, device control, and system lockdown 526
Configuring system lockdown
Warning: Be careful when you add or remove a file fingerprint list or a specific
application from system lockdown. Adding or removing items from system lockdown
can be risky. You might block important applications on your client computers.
Testing selected items before you add or remove them when system
lockdown is already enabled
After system lockdown is enabled for a period of time, you might want to add or
remove file fingerprint lists or specific applications. Over time you might accumulate
many file fingerprint lists that you no longer use. Or the applications that your users
need might change.
You test specific items before you add or remove them so that your client computers
do not block important applications. In blacklist mode, system lockdown blocks any
new items that you add to the configuration. In whitelist mode, system lockdown
Managing application control, device control, and system lockdown 527
Configuring system lockdown
blocks any existing items that you remove. System lockdown runs in whitelist mode
by default.
Note: When you test individual items, system lockdown is enabled. System lockdown
continues to block the applications that are not part of the test.
You can test individual file fingerprint lists to make sure that your client computers
no longer use the applications in the list. You can also test the individual applications
that are specified in the system lockdown configuration.
You can test the entire system lockdown configuration, rather than specific items,
when system lockdown is disabled.
To test selected items before you add or remove them when system lockdown is
already enabled
1 In the console, click Clients.
2 Under Clients, locate the group for which you want to remove items from
system lockdown.
3 On the Policies tab, click System Lockdown.
The system lockdown configuration should already be enabled.
For whitelist mode, you should know which existing file fingerprint list or
the specific application name that you want to test.
For blacklist mode you should add a new file fingerprint list or application
name that you want to test.
See Running system lockdown in whitelist mode on page 524.
See Running system lockdown in blacklist mode on page 525.
4 In whitelist mode, under Application File Lists, check Test Before Removal
next to an existing file fingerprint list or application that you want to test.
System lockdown continues to allow these applications, but they are logged
as unapproved applications.
If you imported an application name list, the Test Before Removal field is
already populated.
5 Click OK to start the test.
If you re-open the System Lockdown for name of group dialog box, you can see
how long the test has been running. Typically, you might want to run this test for a
week or more.
After the test, you can check the Application Control log. If the applications that you
tested appear in the Application Control log, you know that your users run the
Managing application control, device control, and system lockdown 528
Managing device control
applications. You can decide whether to keep the tested item as part of the system
lockdown configuration.
If you decide that you now want to block the items that you tested, do one of the
following actions:
In the System Lockdown for name of group dialog box, when whitelist mode
is enabled, select the tested item and click Remove.
In the System Lockdown for name of group dialog box, when blacklist mode
is enabled, unselect Test Before Addition.
See Setting up and testing the system lockdown configuration before you enable
system lockdown on page 521.
See Configuring system lockdown on page 504.
Step Description
Review the default hardware devices list By default, Symantec Endpoint Protection Manager includes a list of hardware
in Symantec Endpoint Protection devices. The list appears on the Policies tab in Symantec Endpoint Protection
Manager Manager under Policy Components. You use this list to select the devices
that you want to control on your client computers.
If you want to control a device that is not included in the list, you must add
the device first.
Step Description
Add devices to the hardware device list When you add a device to the device list, you need a class ID or device ID
(if necessary) for the device.
You cannot add a customized device for Mac. You can only use the device
types that are provided.
See Adding a hardware device to the Hardware Devices list on page 532.
Allow or block a device in the Device Specify the devices that you want to allow or block from being accessed on
Control policy the client.
For Mac clients, device control is part of SymDaemon service. You do not need to
restart the Windows client or the Mac client for device control to work.
See About application control, system lockdown, and device control on page 490.
See Device Control differences based on platform on page 764.
5 Click OK.
6 Under Devices Excluded From Blocking, click Add.
7 In the Device Selection window, select one or more devices.
Managing application control, device control, and system lockdown 530
Managing device control
8 Check Notify users when devices are blocked if you want to notify the user.
9 Click OK.
To configure device control for Mac clients (as of 14)
1 In the console, open an Application and Device Control policy.
2 Under Mac Settings, click Device Control.
3 Under Blocked Devices, click Add.
4 In the Device Selection window, select a device from the list. You can only
add one device at a time.
Fill in the fields at the bottom of the window, if available. If you leave the fields
blank, all devices of this type are blocked.
You can also use regular expressions to define device vendor, device model,
or serial number. See the Help in the Mac Device Control window for more
information.
To obtain the serial number, model number, or vendor name from a
Mac-connected device, use the DeviceInfo tool from the installation file. You
can find this tool and its instructions under Tools/DeviceInfo.
5 Click OK.
6 Under Devices Excluded From Blocking, click Add.
7 In the Device Selection window, select a device from the list, define the
excluded devices, and then click OK.
8 Check Notify users when devices are blocked if you want to notify the user.
9 Click OK.
See Managing device control on page 528.
See About application control, system lockdown, and device control on page 490.
Devices are identified by a device ID or class ID. You use either of these values to
add a device to the list. You can use a tool to determine the device ID or the class
ID. For Windows, go to Tools\DevViewer. For the Mac, go to Tools\DeviceInfo.
See Obtaining a device vendor or model for Windows computers with DevViewer
on page 531.
class ID The class ID refers to the Windows GUID. Each device type has both a Class and a
ClassGuid associated with it. The ClassGuid is a hexadecimal value with the following
format:
{00000000-0000-0000-0000-000000000000}
device ID A device ID is the most specific ID for a device. The syntax of a device ID includes some
descriptive strings that make it easier to read than the class ID.
When you add a device ID, you can use a device's specific ID. Alternately, you can use
a wildcard character in the device ID string to indicate a less specific group of devices.
You can use an asterisk (*) to indicate zero or more additional characters or a question
mark (?) to indicate a single character of any value.
USBSTOR\DISK&VEN_SANDISK&PROD_CRUZER_MICRO&REV_2033\0002071406&0
The following is a device ID with a wildcard that indicates any USB SanDisk device:
USBSTOR\DISK&VEN_SANDISK*
The following is a device ID with a wildcard that indicates any USB disk device:
USBSTOR\DISK*
The following is a device ID with a wildcard that indicates any USB storage device:
USBSTOR*
Restricting the types of exceptions that users can configure on client computers
Task Description
Learn about exceptions You use exceptions to exclude items from being
scanned on your client computers.
Task Description
Review the types of files and folders that Symantec Endpoint Protection automatically
Symantec Endpoint Protection creates exceptions, or exclusions, for some
automatically excludes from scans third-party applications and some Symantec
products.
Restricting the types of exceptions that By default, users on client computers have limited
users can configure on client computers configuration rights for exceptions. You can restrict
(Windows only) users further so that they cannot create exceptions
for virus and spyware scans or for SONAR.
Check the logs for detections for which After Symantec Endpoint Protection makes a
you might want to create exceptions detection, you can create an exception for the
detection from the log event.
Task Description
Create exceptions for intrusion You can specify exceptions for intrusion prevention.
prevention signatures
You can also set up a list of excluded hosts for
intrusion prevention.
Note: You cannot create exceptions for an individual virus and spyware scan. For
example, if you create a file exception, Symantec Endpoint Protection applies the
exception to all virus and spyware scans (Auto-Protect, Download Insight, and any
administrator-defined or user-defined scan).
Exceptions apply to a particular client type (Windows, Mac, or Linux). You configure
the exceptions for each client type separately.
Managing exceptions 537
Creating exceptions for Virus and Spyware scans
See About the files and folders that Symantec Endpoint Protection excludes from
virus and spyware scans on page 410.
See Managing exceptions in Symantec Endpoint Protection on page 534.
Task Description
Exclude a file from virus and spyware Supported on Windows and Mac clients.
scans
Excludes a file by name from virus and spyware scans, SONAR, or
application control on Windows clients.
Task Description
Exclude a folder from virus and spyware Supported on Windows, Mac, and Linux clients.
scans
Excludes a folder from virus and spyware scans, SONAR, or all scans on
Windows clients.
On Windows and Linux clients, you can choose to limit an exception for virus
and spyware scans to Auto-Protect or scheduled and on-demand scans only.
If you run an application that writes many temp files to a folder, you might
want to exclude the folder from Auto-Protect. Auto-Protect scans files as
they are written so you can increase computer performance by limiting the
exception to scheduled and on-demand scans.
You might want to exclude the folders that are not often used or that contain
archived or packed files from scheduled and on-demand scans. For example,
scheduled or on-demand scans of deeply archived files that are not often
used might decrease computer performance. Auto-Protect still protects the
folder by scanning only when any files are accessed or written to the folder.
If a user configures custom actions for a known risk that you configure to
ignore, Symantec Endpoint Protection ignores the custom actions.
See Excluding known risks from virus and spyware scans on Windows
clients on page 543.
Exclude file extensions from virus and Supported on Windows and Linux clients.
spyware scans
Excludes any files with the specified extensions from virus and spyware
scans.
See Excluding file extensions from virus and spyware scans on Windows
clients and Linux clients on page 544.
Managing exceptions 539
Creating exceptions for Virus and Spyware scans
Task Description
Applications for which you can create exceptions appear in the Exceptions
dialog after Symantec Endpoint Protection learns the application. You can
request that Symantec Endpoint Protection monitors a specific application
to learn.
Task Description
Download Insight must be enabled for the exception to have any effect.
Note: If your client computers use a proxy with authentication, you must
specify trusted web domain exceptions for Symantec URLs. The exceptions
let your client computers communicate with Symantec Insight and other
important Symantec sites.
Task Description
See Creating an exception for an application that makes a DNS or host file
change on page 548.
5 Under Specify the types of scans that will exclude this file, select the type
of scan (Security Risk, SONAR, or Application control).
You must select at least one type.
6 For security risk scans, under Specify the type of security risk scan, select
Auto-Protect, Scheduled and on-demand, or All Scans.
See the help for information about why you might want to limit the exception
to a specific type of security risk scan.
7 Click OK.
To exclude a folder from scans on Windows clients
1 On the Exceptions Policy page, click Exceptions.
2 Under Exceptions, click Add > Windows Exceptions > Folder.
3 In the Prefix variable drop-down box, select a common folder.
Select [NONE] to enter the absolute path and file name.
When you select a prefix, the exception can be used on different Windows
operating systems.
4 In the Folder text box, type the name of the folder.
If you select a prefix variable, the path should be relative to the prefix. If you
select [NONE], type the full path name.
5 Under Specify the type of scan that excludes this folder, select the type of
scan (Security Risk, SONAR, Application control, or All).
You must select at least one type.
6 For security risk scans, under Specify the type of security risk scan, select
Auto-Protect, Scheduled and on-demand, or All Scans.
See the help for information about why you might want to limit the exception
to a specific type of security risk scan.
7 Click OK.
To exclude a file or folder from scans on Mac clients
1 On the Exceptions Policy page, click Exceptions.
2 Under Exceptions, click Add > Mac Exceptions > Security Risk Exceptions
for File or Folder.
Managing exceptions 543
Creating exceptions for Virus and Spyware scans
5 Click OK.
To exclude a folder from scans on Linux clients
1 On the Exceptions Policy page, click Exceptions.
2 Under Exceptions, click Add > Linux Exceptions.
3 Click Folder.
4 In the Add Folder Exception dialog box, you can choose a prefix variable,
type a folder name, and either include subfolders or not.
If you select a prefix variable, the path should be relative to the prefix. If you
select [NONE], type the full path name.
5 Specify the type of security risk scan. Select Auto-Protect, Scheduled and
on-demand, or All scans, and then click OK.
See Creating exceptions for Virus and Spyware scans on page 537.
See Excluding file extensions from virus and spyware scans on Windows clients
and Linux clients on page 544.
To exclude known risks from virus and spyware scans on Windows clients
1 On the Exceptions Policy page, click Exceptions.
2 Under Exceptions, click Add > Windows Exceptions > Known Risks.
3 In the Add Known Security Risk Exceptions dialog box, select one or more
security risks that you want to exclude from virus and spyware scans.
4 Check Log when the security risk is detected if you want to log the detection.
If you do not check this option, the client ignores the risk when it detects the
selected risks. The client therefore does not log the detection.
5 Click OK.
6 If you are finished with the configuration for this policy, click OK.
See Creating exceptions for Virus and Spyware scans on page 537.
The applications also appear in the list for DNS and Host File Change Exception.
To specify how Symantec Endpoint Protection handles monitored applications on
Windows clients
1 On the Exceptions Policy page, click Exceptions.
2 Click Add > Windows Exceptions > Application.
3 In the View drop-down box, select All, Watched Applications, or User-allowed
Applications.
4 Select the applications for which you want to create an exception.
5 In the Action drop-down box, select Ignore, Log only, Quarantine, Terminate,
or Remove.
The Ignore and Log only actions apply when scans detect the application.
The Terminate, Quarantine, and Remove actions apply when the application
launches.
6 Click OK.
See Monitoring an application to create an exception for the application on Windows
clients on page 545.
See Creating exceptions for Virus and Spyware scans on page 537.
See Monitoring the applications and services that run on client computers
on page 318.
See Creating an exception for an application that makes a DNS or host file change
on page 548.
Note: You can specify a URL, but the exception uses only the domain name
portion of a URL. If you specify a URL, you can pre-pend the URL with either
HTTP or HTTPS (case-insensitive), but the exception applies to both.
Regardless of whether a user navigates to the domain through HTTP or HTTPS,
both Download Insight and SONAR exclude the domain. If the user navigates
to any location within the domain, the user can download files from that location.
You can specify an IP address, but it must be HTTP. For HTTPS, you can only
specify a URL.
3 Click OK.
4 Repeat the procedure to add more Web domain exceptions.
See Creating exceptions for Virus and Spyware scans on page 537.
3 In the Add Tamper Protection Exception dialog box, in the Prefix variable
drop-down box, select a common folder.
When you select a prefix, the exception can be used on different Windows
operating systems.
Select [NONE] if you want to enter the absolute path and file name.
4 In the File text box, type the name of the file.
If you selected a prefix, the path should be relative to the prefix. If you selected
[NONE] for the prefix, type the full path name.
You must specify a file name. Tamper Protection does not support folder
exceptions. If you enter a folder name, Tamper Protection does not exclude
all the files in a folder with that name. It only excludes a file with that specified
name.
5 Click OK.
See How to collect the Tamper Protection log from Symantec Endpoint Protection
Manager in Symantec Endpoint Protection 12.1.
See Creating exceptions for Virus and Spyware scans on page 537.
4 In the Action drop-down box, select Ignore, Log only, Prompt, or Block.
The actions apply when scans detect the application making a DNS or host
file change.
5 Click OK.
See Creating exceptions for Virus and Spyware scans on page 537.
See Specifying how Symantec Endpoint Protection handles monitored applications
on Windows clients on page 545.
See Adjusting SONAR settings on your client computers on page 486.
Note: You cannot create exceptions from log events for early launch anti-malware
detections.
Managing exceptions 550
Creating exceptions from log events
SONAR log
SONAR log
SONAR log
Symantec Endpoint Protection must have already detected the item for which you
want to create an exception. When you use a log event to create an exception, you
specify the Exceptions policy that should include the exception.
To create exceptions from log events
1 On the Monitors tab, click the Logs tab.
2 In the Log type drop-down list, select the Risk log, SONAR log, or Application
and Device Control log.
3 If you selected Application and Device Control, select Application Control
from the Log content list.
4 Click View Log.
5 Next to Time range, select the time interval to filter the log.
6 Select the entry or entries for which you want to create an exception.
7 Next to Action, select the type of exception that you want to create.
The exception type that you select must be valid for the item or items that you
selected.
8 Click Apply or Start.
9 In the dialog box, remove any items that you do not want to include in the
exception.
Managing exceptions 551
Creating exceptions from log events
10 For security risks, check Log when the security risk is detected if you want
Symantec Endpoint Protection to log the detection.
11 Select all of the Exceptions policies that should use the exception.
12 Click OK.
See Monitoring endpoint protection on page 584.
See Managing exceptions in Symantec Endpoint Protection on page 534.
See Creating exceptions for Virus and Spyware scans on page 537.
Chapter 23
Testing security policies
This chapter includes the following topics:
Virus and Spyware To test a default Virus and Spyware Protection policy, download
Protection the EICAR test virus from:
http://www.eicar.org/86-0-Intended-use.html
SONAR Download the Socar.exe test file to verify that SONAR works
correctly
See Adding and testing a rule that blocks a DLL on page 557.
4 On the Logs tab, in the Log type drop-down list, click Risk, and then click
View Log.
5 On the Risk Logs page, the Virus found event appears.
9 In the Add File or Folder Definition dialog box, in the text box in the File or
Folder Name To Match group box, type c:\1.txt, and then click OK.
10 In the Application Control Rule Set dialog box, on the Actions tab, in the
Read Attempt group box, select Allow access, and then check Enable
logging and Notify user.
11 Under Notify user, type reading is allowed.
12 In the Create, Delete, or Write Attempt group box, click Block access, Enable
logging, and Notify user.
13 Under Notify user, type writing to block Notepad.
14 Click OK twice and assign the policy to the client computer group.
Test the rule.
To test a rule that prevents users from writing to a particular file
1 On the client computer, open File Explorer, locate the c:\ drive, and then click
File > New > Text Document.
If you create the file by using Notepad, the file is a read-only file.
2 Rename the file as 1.txt.
Make sure that the file is saved to the c:\ folder.
3 In Notepad, open the c:\1.txt file.
You can open the file but you cannot edit it.
Note: Some applications that are written to be "security conscious may interpret
the DLL injection as a malicious act. Take counter measures to block the injection
or remove the DLL.
Testing security policies 558
Adding and testing a rule that terminates a process
Note: To open the renamed executable file, you must access the web server\site
using the IP address. For example, you would type: http://web server IP
address/renamed executable.jpg
4 On the client, open the Traffic log and check that the client computer blocked
the renamed executable file.
If you see this type of event, the default IPS policy correctly blocked the
executable file.
Section 5
Monitoring, reporting, and
enforcing compliance
Table 24-1 Process for enforcing security compliance on the client computer
Step Description
Step 1: The client computer runs a The management server downloads the Host Integrity policy to the client
Host Integrity check on the client computers in the assigned group. The client computers run the Host Integrity
computer. check, which compares each computer's configuration with the requirements
that you add to the Host Integrity policy.
The Host Integrity policy checks for the existence for antivirus software, patches,
hot fixes, and other security requirements. For example, the policy may check
whether the latest patches have been applied to the operating system.
Step 2: The Host Integrity check If the computer meets all of the policy's requirements, the Host Integrity
passes or fails check passes.
If the computer does not meet all of the policy's requirements, the Host
Integrity check fails. You can also set up the policy to ignore a failed
requirement so that the check passes.
See Allowing the Host Integrity check to pass if a requirement fails
on page 571.
You can also set up peer-to-peer authentication in the Firewall policy, which
can grant or block inbound access to the remote computers that have the client
installed.
Table 24-1 Process for enforcing security compliance on the client computer
(continued)
Step Description
Step 3: Non-compliant computers If the Host Integrity check fails, you can configure the client to remediate.
remediate a failed Host Integrity check To remediate, the client downloads and installs the missing software. You
(optional) can configure either the client to remediate or the end user to remediate in
a predefined requirement or a custom requirement. Host Integrity then
rechecks that the client computer installed the software.
See Setting up remediation for a predefined Host Integrity requirement
on page 568.
If the Host Integrity check that verifies remediation still fails, the client applies
a Quarantine policy. You can use a Quarantine policy to apply stricter
restrictions to the failed computers.
See Creating a Quarantine policy for a failed Host Integrity check
on page 573.
While the client is in the Quarantine location, the Host Integrity check
continues to run and to try to remediate. The frequency of the check and
remediation settings are based on how you configure the Host Integrity
policy. Once the client is remediated and passes the Host Integrity check,
the client moves out of the Quarantine location automatically.
In some cases, you may need to remediate the client computer manually.
Step 4: The client continues to monitor The Host Integrity check actively monitors each client's compliance status. If
compliance at any time the clients compliance status changes, so do the privileges of the
computer.
You can view the results of the Host Integrity check in the Compliance log.
Table 24-2 lists the steps you need to perform to set up security compliance using
Host Integrity policies.
Step Description
Step 1: Add a Host Integrity policy that When you add a new policy, perform the following tasks:
checks for a requirement on the client
1 Choose which types of requirements you want the client computer to
computer and enforces a remediation
check. Create a separate requirement for each type of software (such
action for non-compliant computers
as applications, files, and patches).
3 Set the order in which requirements are checked and the remediation
is tried. For example, updates should be completed in a specific order
so that all updates are applied before the user has to restart the client
computer.
Step 2: Set the options for the Host Configure how often the Host Integrity check runs.
Integrity check and notifications See Configuring the frequency of Host Integrity check settings
on page 571.
Configure whether or not users can cancel remediation.
See Allowing users to delay or cancel Host Integrity remediation
on page 569.
Set up a notification to appear on the client computer when the Host
Integrity check either passes or fails. Use the notification to tell the end
user what to do next. For example, the end user may need to allow a
new patch to download and install on the client computer.
See Configuring notifications for Host Integrity checks on page 572.
Step 3: Set up peer-to-peer enforcement If the client computers being tested for Host Integrity compliance are on the
same network as already-compliant client computers, you can set up
peer-to-peer enforcement. You primarily use peer-to-peer enforcement for
file sharing.
Step Description
Step 4: Set up a Quarantine policy for If the client computer fails the Host Integrity check and does not perform
non-compliant and unremediated remediation, you can quarantine the computer using a Quarantine policy.
computers (optional)
See Creating a Quarantine policy for a failed Host Integrity check
on page 573.
Type Description
Predefined requirements Use a predefined requirement to check that a specific application or file is installed and
runs on the client. A predefined requirement checks for the status of any of the following
types of applications: antivirus software, antispyware software, a firewall, a patch, or a
service pack. For example, a patch requirement checks that the client computers run a
specific operating system patch.
If the predefined requirement does not have enough detail, add a custom requirement and
write a script.
Type Description
Custom requirements Templates are predefined custom requirements that Symantec wrote for commonly
from templates performed tasks. For example, the client can check that a password has been changed in
the last 42 days. You can also use the templates as a basis for writing a custom requirement
script.
Template requirements are available through the Host Integrity policy LiveUpdate service.
You must first set up LiveUpdate to download the Host Integrity templates to the
management server.
See Downloading content from LiveUpdate to the Symantec Endpoint Protection Manager
on page 179.
Custom requirements Use a custom requirement if neither a predefined requirement nor the templates provide
the kind of check that you need. Custom requirements include the same fields as predefined
requirements, but provide more flexibility. For example, you can include an antispyware
application that is not included in the predefined list of antispyware applications.
You can simplify the management of required applications by including similar applications
in one custom requirement. For example, you can include Internet browsers such as Internet
Explorer and Mozilla Firefox in one requirement.
3 Click OK.
See Setting up Host Integrity on page 564.
5 In the Execute the command text box, do one of the following tasks:
If you want the client user to run the installation, leave the text box blank.
If you want the installation to run automatically, type %F%.
The %F% variable represents the last downloaded file. You can use any
command that can be run from Start > Run. For example, to install a patch
for Vista, type the command %Systemroot%\system32\wusa.exe /quiet
/norestart %F%.
6 Optionally set the options to delay or cancel remediation, and then click OK.
See Allowing users to delay or cancel Host Integrity remediation on page 569.
7 Click OK.
See Allowing the Host Integrity check to pass if a requirement fails on page 571.
If the user delays remediation, any of the following events can happen:
The client logs the event. The Host Integrity status is shown as failed because
the requirement is not met. The user can manually run a new Host Integrity
check at any time from the client.
The Host Integrity check remediation message window does not appear again
until the client runs another Host Integrity check. If the user has chosen to be
reminded in five minutes, but the Host Integrity check runs every 30 minutes,
the message window does not appear until 30 minutes. To avoid confusion for
the user, you may want to synchronize the minimum time setting with the Host
Integrity check frequency setting.
If the user delays the remediation before the next Host Integrity check, the user
selection is overridden.
If the user delays a remediation action and the client receives an updated policy,
the amount of time available for remediation is reset to the new maximum.
To allow users to delay or cancel Host Integrity remediation
1 In the console, open a Host Integrity policy and add a requirement.
See Adding predefined requirements to a Host Integrity policy on page 567.
2 In the Add Requirement dialog box, set up remediation.
See Setting up remediation for a predefined Host Integrity requirement
on page 568.
3 On the dialog box for the requirement, do one of the following tasks, and then
click OK:
To let the client user delay a file from being downloaded, check Specify
wait time before attempting the download again if the download fails.
To let the client user cancel remediation, check Allow the user to cancel
the download for Host Integrity remediation.
4 Click OK.
5 Click Advanced Settings.
6 On the Advanced Settings page, under Remediation Dialog Options,
configure the options for canceling the remediation.
7 To add a custom message on the client computer, click Set Additional Text.
The message you type appears on the client remediation window if the user
clicks Details.
8 Click OK.
Managing Host Integrity to enforce security policies 571
Configuring the frequency of Host Integrity check settings
5 To add a custom message, click Set Additional Text, type up to 512 characters
of additional text, and then click OK.
6 When you are finished with the configuration of this policy, click OK.
See Setting up remediation for a predefined Host Integrity requirement on page 568.
See About Host Integrity requirements on page 566.
Managing Host Integrity to enforce security policies 574
Blocking a remote computer by configuring peer-to-peer authentication
Note: Peer-to-peer authentication works in server control and mixed control, but
not in client control.
5 In the Host Integrity Online Updating dialog box, expand Templates, and
then select a template category.
6 Next to each template you want to add, click Add.
7 Click Import.
8 Click OK.
See About Host Integrity requirements on page 566.
See Downloading content from LiveUpdate to the Symantec Endpoint Protection
Manager on page 179.
See Choosing which content and which content revision to update on client
computers on page 187.
Note: If you first add a function or an IF..THEN statement without filling out the
fields, an error appears. If you do not want to add the statement, right-click the
statement and click Delete.
7 With the highlight on the empty condition under the IF node, in the right pane,
select a condition.
The Host Integrity check looks for the condition on the client computer.
8 Under the Select a condition drop-down list, specify the additional information
that is required.
9 Under Customized Requirement Script, click THEN, and then click Add.
The THEN statement provides the action that should be taken if the condition
is true.
10 Click any of the following options:
IF..THEN
Use a nested IF..THEN statement to define conditions to check and actions
to take if the condition is evaluated as true.
Function
Use a function to define a remediation action, such as downloading a file.
Return
Use a return statement to specify whether the results of the evaluation of
the condition pass or fail. Every custom requirement must end with a pass
or fail statement.
Comment (optional)
Use a comment to explain the functionality of the conditions, functions, or
statements that you add.
14 To allow the Host Integrity check to pass no matter what the result, check Allow
the Host Integrity check to pass even if this requirement fails.
15 Click OK.
See Creating a test Host Integrity policy with a custom requirement script
on page 581.
See Adding predefined requirements to a Host Integrity policy on page 567.
String ef4adf4a9d933b747361157b8ce7a22f
Add a Host Integrity policy with a custom requirement script that checks for the
operating system on the client computer.
See To create a test Host Integrity policy with a custom requirement script
on page 582.
Test the Host Integrity policy you have created.
See To test the Host Integrity policy on the client computer on page 583.
To create a test Host Integrity policy with a custom requirement script
1 In the console, open a Host Integrity policy.
2 On the Host Integrity policy page, click Requirements > Add.
3 In the Add Requirement dialog box, click either Windows or Mac.
4 In the Select requirement drop-down list, click Custom requirement, and
then click OK.
5 In the Name box, type a name for the custom requirement.
6 In the Custom Requirement dialog box, under Customized Requirement
Script, right-click Insert statements below, and then click Add > IF..THEN.
7 In the right pane, in the Select a condition drop-down list, click Utility:
Operating System is.
8 Under Operating system, check one or more operating systems that your
client computers run and that you can test.
9 Under Customized Requirement Script, right-click THEN //Insert statements
here, and then click Add > Function > Utility: Show message dialog.
10 In the Caption of the message box field, type a name to appear in the
message title.
11 In the Text of the message box field, type the text that you want the message
to display.
12 In the left pane, under Customized Requirement Script, click Pass.
13 In the right pane, under As the result of the requirement, return, check Fail,
and then click OK.
14 Click OK.
Managing Host Integrity to enforce security policies 583
Creating a test Host Integrity policy with a custom requirement script
15 In the Host Integrity Policies dialog box, in the left panel, click Assign the
policy.
16 In the Assign Host Integrity Policy dialog box, select the groups to which
you want to assign the policy, and click Assign.
In the Assign Host Integrity Policy dialog box, click Yes to assign the Host
Integrity policy changes.
Note: One Host Integrity policy can be assigned to multiple groups, while a
single group can only have a single Host Integrity policy. You can replace an
existing policy with a different policy.
Viewing logs
Task Description
Review the security The following list describes some of the tasks that you can perform to monitor the security
status of your network status of your client computers.
Task Description
Locate which client You can perform the following tasks to view or find which computers need additional
computers need protection:
protection
View the number of computers with Symantec Endpoint Protection disabled.
See Viewing system protection on page 588.
View the number of computers with out-of-date virus and spyware definitions.
See Viewing system protection on page 588.
Find the computers that have not been scanned recently.
See Finding unscanned computers on page 589.
View attack targets and sources.
See Viewing attack targets and sources on page 592.
View event logs.
See Viewing logs on page 603.
Protect your client You can run commands from the console to protect the client computers.
computers
See Running commands on client computers from the console on page 244.
See Checking the scan action and rescanning the identified computers on page 393.
Configure notifications You can create and configure notifications to be triggered when certain security-related
to alert you when events occur. For example, you can set a notification to occur when an intrusion attempt
security events occur occurs on a client computer.
Create custom quick You can create and generate customized quick reports and you can schedule custom reports
reports and scheduled to run regularly with the information that you want to see.
reports for ongoing
See Running and customizing quick reports on page 597.
monitoring
See How to generate scheduled reports on page 600.
Task Description
Minimize the amount of For security purposes, you might need to retain log records for a longer period of time.
space that client logs However, if you have a large number of clients, you may have a large volume of client log
take data.
If your management server runs low on space, you might need to decrease the log sizes,
and the amount of time the database keeps the logs.
You can reduce the volume of log data by performing the following tasks:
Upload only some of the client logs to the server, and change the frequency with which
the client logs are uploaded.
See Specifying client log size and which logs to upload to the management server
on page 678.
Specify how many log entries the client computer can keep in the database, and how
long to keep them.
See Specifying the log size and how long to keep log entries in the database on page 679.
Filter the less important risk events and system events out so that less data is forwarded
to the server.
See Modifying log handling and notification settings on Windows computers on page 466.
Reduce the number of clients that each management server manages.
Reduce the heartbeat frequency, which controls how often the client logs are uploaded
to the server.
See Configuring push mode or pull mode to update client policies and content
on page 162.
Reduce the amount of space in the directory where the log data is stored before being
inserted into the database.
See About increasing the disk space on the server for client log data on page 680.
Export log data to a Log data export is useful if you want to accumulate all logs from your entire network in a
centralized location centralized location. Log data export is also useful if you want to use a third-party program
such as a spreadsheet to organize or manipulate the data. You also might want to export
the data in your logs before you delete log records.
You can export the data in some logs to a comma-delimited text file. You can export other
logs' data to a tab-delimited text file that is called a dump file or to a Syslog server.
Troubleshoot issues with You can troubleshoot some issues with reporting.
reports and logs
See Troubleshooting reporting issues on page 731.
Monitoring protection with reports and logs 588
Monitoring endpoint protection
Note: Symantec Endpoint Protection pulls the events that appear in the reports
from the event logs on your management servers. The event logs contain
time-stamps in the client computers' time zones. When the management server
receives the events, it converts the event time-stamps to Greenwich Mean Time
(GMT) for insertion into the database. When you create reports, the reporting
software displays information about events in the local time of the computer on
which you view the reports.
Viewing risks
You can get information about the risks in your network.
See Monitoring endpoint protection on page 584.
To view infected and at risk computers
1 In the console, click Reports.
2 On the Quick Reports tab, specify the following information:
Configure option You can optionally select the reports to include in the full
report.
The display options that are used for the logs and the reports, as well as legacy
log file uploading
The security status thresholds that you set determine when the Security Status
message on the Symantec Endpoint Protection Manager Home page is considered
Poor. Thresholds are expressed as a percentage and reflect when your network is
considered to be out of compliance with your security policies.
For example, you can set the percentage of computers with out-of-date virus
definitions that triggers a poor security status. You can also set how many days old
the definitions need to be to qualify as out of date. Symantec Endpoint Protection
determines what is current when it calculates whether signatures or definitions are
out of date as follows. Its standard is the most current virus definitions and IPS
signature dates that are available on the management server on which the console
runs.
For information about the preference options that you can set, you can click Help
on each tab in the Preferences dialog box.
To configure reporting preferences
1 In the console, on the Home page, click Preferences.
2 Click one of the following tabs, depending on the type of preferences that you
want to set:
Home and Monitors
Security Status
3 Set the values for the options that you want to change.
4 Click OK.
Note: You must have Internet Explorer 6.0 or later installed. Other web browsers
are not supported.
Note: When you enter the HTTPS standalone reporting URL in your browser,
the browser might display a warning. The warning appears because the
certificate that the management server uses is self-signed. To work around
this issue, you can install the certificate in your browsers trusted certificate
store. The certificate supports host names only, so use the host name in the
URL. If you use localhost, IP address, or the fully qualified domain name, a
warning still appears.
3 When the logon dialog box appears, type your user name and password, and
then click Log On.
If you have more than one domain, in the Domain text box, type your domain
name.
A scheduled report always runs by default. You can change the settings for any
scheduled report that has not yet run. You can also delete a single scheduled report
or all of the scheduled reports.
Table 25-2 Report types available as quick reports and scheduled reports
Audit Displays the information about the policies that clients and
locations use currently. It includes information about policy
modification activities, such as the event times and types,
policy modifications, domains, sites, administrators, and
descriptions.
Application and Device Displays the information about events where some type of
Control behavior was blocked. These reports include information
about application security alerts, blocked targets, and blocked
devices. Blocked targets can be Windows registry keys, DLLs,
files, and processes.
Compliance Displays the information about the how many client passed
or failed the Host Integrity check.
Computer Status Displays the information about the operational status of the
computers in your network, such as which computers have
security features turned off. These reports include information
about versions, the clients that have not checked in to the
server, client inventory, and online status.
Network and Host Exploit Displays the information about intrusion prevention, attacks
Mitigation on the firewall, firewall traffic and packets, and attacks on
vulnerabilities in your network.
The Network and Host Exploit Mitigation reports let you track
a computers activity and its interaction with other computers
and networks. They record information about the traffic that
tries to enter or exit the computers through their network
connections. They also provide information about Generic
Exploit Mitigation events.
Table 25-2 Report types available as quick reports and scheduled reports
(continued)
System Displays the information about event times, event types, sites,
domains, servers, and severity levels. The System reports
contain information that is useful for troubleshooting client
problems.
If you have multiple domains in your network, many reports let you view data for
all domains, one site, or a few sites. The default for all quick reports is to show all
domains, groups, servers, and so on, as appropriate for the report you select to
create.
See Running and customizing quick reports on page 597.
See How to generate scheduled reports on page 600.
3 In the Select a report list box, select the name of the report you want to
customize.
For the Network Compliance Status report and the Compliance Status
report, in the Status list box, select a saved filter configuration that you want
to use, or leave the default filter.
For the Top Risk Detections Correlation report, you can select values for
the X-axis and Y-axis list boxes to specify how you want to view the report.
For the Scan Statistics Histogram Scan report, you can select values for Bin
width and Number of bins.
For some reports, you can specify how to group the report results in the Group
list box. For other reports, you can select a target in the Target field on which
to filter report results.
4 In the Use a saved filter list box, select a saved filter configuration that you
want to use, or leave the default filter.
5 Under What filter settings would you like to use?, in the Time range list
box, select the time range for the report.
6 If you select Set specific dates, then use the Start date and End date list
boxes. These options set the time interval that you want to view information
about.
When you generate a Computer Status report and select Set specific dates,
you specify that you want to see all entries that involve a computer that has
not checked in with its server since the time you specify in the date and time
fields.
7 If you want to configure additional settings for the report, click Additional
Settings and set the options that you want.
You can click Tell me more to see descriptions of the filter options in the
context-sensitive help.
Note: The filter option text boxes that accept wildcard characters and search
for matches are not case-sensitive. The ASCII asterisk character is the only
asterisk character that can be used as a wildcard character.
You can save the report configuration settings if you think you will want to run
this report again in the future.
8 Click Create Report.
See Saving and deleting custom reports on page 599.
See Printing and saving a copy of a report on page 602.
Monitoring protection with reports and logs 599
Saving and deleting custom reports
Note: The filter configuration settings that you save are available for your user logon
account only. Other users with reporting privileges do not have access to your saved
settings.
See Editing the filter used for a scheduled report on page 601.
You can delete any report configuration that you create. When you delete a
configuration, the report is no longer available. The default report configuration
name appears in the Use a saved report list box and the screen is repopulated
with the default configuration settings.
Note: If you delete an administrator from the management server, you have the
option to save the reports that were created by the deleted administrator. The
ownership of the reports is changed, and the report names are changed. The new
report name is in the format "OriginalName('AdminName')". For example, a report
that was created by administrator JSmith, named Monday_risk_reports, would
be renamed Monday_risk_reports(JSmith).
6 Click OK.
7 When the confirmation dialog box appears, click OK.
After you save a filter, it appears in the Use a saved filter list box for related
reports and logs.
To delete a custom report
1 In the console, click Reports.
2 On the Quick Reports tab, select a report type.
3 In the Use saved filter list box, select the name of the filter that you want to
delete.
4 Click the Delete icon beside the Use a saved filter list box.
5 When the confirmation dialog box appears, click Yes.
Note: If you have multiple servers within a site that share a database, only the
first-installed server runs the reports scheduled for the site. This default ensures
that all the servers in the site do not run the same scheduled scans simultaneously.
If you want to designate a different server to run scheduled reports, you can
configure this option in the local site properties.
3 In the Report name text box, type a descriptive name and optionally, type a
longer description.
Although you can paste more than 255 characters into the description text box,
only 255 characters are saved in the description.
4 If you do not want this report to run until another time, uncheck the Enable
this scheduled report check box.
5 Select the report type that you want to schedule from the list box.
6 Select the name of the specific report that you want to schedule from the list
box.
7 Select the name of the saved filter that you want to use from the list box.
8 In the Run every text box, select the time interval at which you want the report
to be emailed to recipients (hours, days, weeks, months). Then, type the value
for the time interval you selected. For example, if you want the report to be
sent to you every other day, select days and then type 2.
9 In the Start after text box, type the date that you want the report to start or
click the calendar icon and select the date. Then, select the hour and minute
from the list boxes.
10 Under Report Recipients, type one or more comma-separated email
addresses.
You must already have set up mail server properties for email notifications to
work.
11 Click OK to save the scheduled report configuration.
If either condition occurs before site replication takes place, the user subsequently
sees two filters with the same name in the filter list. Only one of the filters is usable.
If this problem occurs, it is a best practice to delete the usable filter and recreate it
with a different name. When you delete the usable filter, you also delete the unusable
filter.
See Saving and deleting custom reports on page 599.
Note: When you associate a saved filter with a scheduled report, make sure that
the filter does not contain custom dates. If the filter specifies a custom date, you
get the same report every time the report runs.
Note: By default, Internet Explorer does not print background colors and images.
If this printing option is disabled, the printed report may look different from the report
that you created. You can change the settings in your browser to print background
colors and images.
Viewing logs
You can generate a list of events to view from your logs that are based on a
collection of filter settings that you select. Each log type and content type have a
default filter configuration that you can use as-is or modify. You can also create
and save new filter configurations. These new filters can be based on the default
filter or on an existing filter that you created previously. If you save the filter
configuration, you can generate the same log view at a later date without having
to configure the settings each time. You can delete your customized filter
configurations if you no longer need them.
Note: If database errors occur when you view the logs that include a large amount
of data, you might want to change the database timeout parameters.
If you get CGI or terminated process errors, you might want to change other timeout
parameters.
See Changing timeout parameters for reviewing reports and logs on page 732.
Monitoring protection with reports and logs 604
Viewing logs
Because logs contain some information that is collected at intervals, you can refresh
your log views. To configure the log refresh rate, display the log and select from
the Auto-Refresh list box at the top right on that log's view.
Note: If you view log data by using specific dates, the data stays the same when
you click Auto-Refresh.
Reports and logs always display in the language that the management server was
installed with. To display these when you use a remote Symantec Endpoint
Protection Manager console or browser, you must have the appropriate font installed
on the computer that you use.
See About log types on page 605.
See Saving and deleting custom logs by using filters on page 607.
To view a log
1 In the main window, click Monitors.
2 On the Logs tab, from the Log type list box, select the type of log that you
want to view.
3 For some types of logs, a Log content list box appears. If it appears, select
the log content that you want to view.
4 In the Use a saved filter list box, select a saved filter or leave the value Default.
5 Select a time from the Time range list box or leave the default value. If you
select Set specific dates, then set the date or dates and time from which you
want to display entries.
6 Click Additional Settings to limit the number of entries you display.
You can also set any other available Additional Settings for the type of log
that you selected.
Note: The filter option fields that accept wildcard characters and search for
matches are not case-sensitive. The ASCII asterisk character is the only asterisk
character that can be used as a wildcard character.
7 After you have the view configuration that you want, click View Log.
The log view appears in the same window.
Monitoring protection with reports and logs 605
Viewing logs
Audit The Audit log contains information about policy modification activity.
Available information includes the event time and type; the policy modified; the domain,
site, and user name involved; and a description.
Application and Device The Application Control log and the Device Control log contain information about events
Control where some type of behavior was blocked.
The following Application and Device Control logs are available:
Available information includes the time the event occurred, the action taken, and the
domain and computer that were involved. It also includes the user that was involved,
the severity, the rule that was involved, the caller process, and the target.
You can create an application control or Tamper Protection exception from the
Application Control log.
Compliance The compliance logs contain information about client Host Integrity.
Computer Status The Computer Status log contains information about the real-time operational status
of the client computers in the network.
Network and Host Exploit The Network and Host Exploit Mitigation logs contain information about intrusion
Mitigation prevention, the firewall, and Generic Exploit Mitigation.
The logs contain information about attacks on the firewall and on intrusion prevention.
Information is available about denial-of-service attacks, port scans, and the changes
that were made to executable files. They also contain information about the connections
that are made through the firewall (traffic), and the data packets that pass through.
These logs also contain some of the operational changes that are made to computers,
such as detecting network applications, and configuring software.
The logs also show information about Generic Exploit Mitigation events.
Monitoring protection with reports and logs 607
Viewing logs
SONAR The SONAR log contains information about the threats that have been detected during
SONAR threat scanning. These are real-time scans that detect potentially malicious
applications when they run on your client computers.
The information includes items such as the time of occurrence, event actual action,
user name, Web domain, application, application type, file, and path.
Risk The Risk log contains information about risk events. Available information includes the
event time, event actual action, user name, computer, and domain, risk name and
source, count, and file and path.
Scan The Scan log contains information about virus and spyware scan activity from both
Windows clients and Mac clients.
Available information includes items such as the scan start, computer, IP address,
status, duration, detections, scanned, omitted, and domain.
System The system logs contain information about events such as when services start and
stop.
Note: If you selected Past 24 hours as the time range for a log filter, the 24-hour
time range begins when you first select the filter. If you refresh the page, the start
of the 24-hour range does not reset. If you select the filter, and wait to view a log,
the time range starts when you select the filter. It does not start when you view the
log.
If you want to make sure the past 24-hour range starts now, select a different time
range and then reselect Past 24 hours.
Monitoring protection with reports and logs 608
Viewing logs
Managing notifications
Managing notifications
Notifications alert administrators and computer users about potential security
problems.
Some notification types contain default values when you configure them. These
guidelines provide reasonable starting points depending on the size of your
environment, but they may need to be adjusted. Trial and error may be required to
find the right balance between too many and too few notifications for your
environment. Set the threshold to an initial limit, then wait for a few days. After a
few days, you can adjust the notifications settings.
For virus, security risk, and firewall event detection, suppose that you have fewer
than 100 computers in a network. A reasonable starting point in this network is to
configure a notification when two risk events are detected within one minute. If you
have 100 to 1000 computers, detecting five risk events within one minute may be
a more useful starting point.
You manage notifications on the Monitors page. You can use the Home page to
determine the number of unacknowledged notifications that need your attention.
Managing notifications 611
Managing notifications
Table 26-1 lists the tasks you can perform to manage notifications.
Task Description
Confirm that the email Notifications sent by email require that the Symantec Endpoint
server is configured to Protection Manager and the email server are properly
enable email notifications configured.
See What are the types of notifications and when are they
sent? on page 612.
Configure new notifications Optionally create notifications to remind you and other
administrators about important issues.
Create notification filters Optionally create filters to expand or limit your view of all of the
notifications that have been triggered.
You can set a damper period for notifications. The damper period specifies the time
that must pass before the notification condition is checked for new data. When a
notification condition has a damper period, the notification is only issued on the first
occurrence of the trigger condition within that period. For example, suppose a
large-scale virus attack occurs, and that there is a notification condition configured
to send an email whenever viruses infect five computers on the network. If you set
a one hour damper period for that notification condition, the server sends only one
notification email each hour during the attack.
Note: If you set the Damper period to None for notifications about critical events,
you should make sure that clients can upload critical events immediately. The Let
clients upload critical events immediately option is enabled by default and
configured in the Communications Settings dialog box.
What are the types of notifications and when are they sent?
Symantec Endpoint Protection Manager provides notifications for administrators.
You can customize most of these notifications to meet your particular needs. For
example, you can add filters to limit a trigger condition only to specific computers.
Or you can set notifications to take specific actions when they are triggered.
By default, some of these notifications are enabled when you install Symantec
Endpoint Protection Manager. Notifications that are enabled by default are configured
to log to the server and send email to system administrators.
See Managing notifications on page 610.
See How upgrades from another version affect notification conditions on page 622.
Managing notifications 613
Managing notifications
Notification Description
Client list changed This notification triggers when there is a change to the
existing client list. This notification condition is enabled
by default.
Client security alert This notification triggers upon any of the following
security events:
Compliance events
Network and Host Exploit Mitigation events
Traffic events
Packet events
Device control events
Application control events
Notification Description
File reputation lookup alert Alerts the administrators when a file is submitted to
Symantec for a reputation check. SONAR and Download
Insight use file reputation lookups and submit files to
Symantec automatically.
Over-deployment
Notification Description
Network load alert: requests for Alerts the administrators when too many clients request
virus and spyware full a full definition set, and to potential network bandwidth
definitions issues.
New risk detected This notification triggers whenever virus and spyware
scans detect a new risk.
Note: If you set the notification damper period to None,
you should make sure that clients can upload critical
events immediately. The Let clients upload critical
events immediately option is enabled by default and
configured in the Communications Settings dialog
box.
New software package This notification triggers when a new software package
downloads or the following occurs:
New user-allowed download This notification triggers when a client computer allows
an application that Download Insight detected. An
administrator can use this information to help evaluate
whether to block or allow the application.
Power Eraser recommended Alerts the administrators when a regular scan cannot
repair an infection, so the administrators can use Power
Eraser.
Notification Description
Single risk event This notification triggers upon the detection of a single
risk event and provides details about the risk. The details
include the user and the computer involved, and the
actions that the management server took.
Note: If you set the notification damper period to None,
you should make sure that clients can upload critical
events immediately. The Let clients upload critical
events immediately option is enabled by default and
configured in the Communications Settings dialog
box.
Notification Description
For example, you can create a filter that only displays unacknowledged risk outbreak
notifications posted during the past 24 hours.
To add a notification filter
1 In the console, click Monitors.
2 On the Monitors page, on the Notifications tab, click Additional Settings.
3 Under the What filter settings would you like to use? heading, set the criteria
for the filter.
4 Click Save Filter.
5 On the Notifications tab, in the Filter name box, type a filter name, and then
click OK.
To delete a saved notification filter
1 In the console, click Monitors.
2 On the Monitors page, on the Notifications tab, on the Use a saved filter
menu, choose a filter.
3 At the right of the Use a saved filter menu, click the X icon.
4 In the Delete Filter dialog box, click Yes.
Note: To send email notifications, you must configure a mail server to communicate
with the management server.
Once you choose the notification type, you then configure it as follows:
Specify filters.
Not all notification types provide filters. When they do, you can use the filters to
limit the conditions that trigger the notification. For example, you can restrict a
notification to trigger only when computers in a specific group are affected.
Specify settings.
All notification types provide settings, but the specific settings vary from type to
type. For example, a risk notification may let you specify what type of scan
triggers the notification.
Specify actions.
All notification types provide actions you can specify.
Note: If you set the Damper period to None for notifications about critical events,
you should make sure that clients can upload critical events immediately. The
relevant notifications include the following: Client security alert, Single risk event,
New risk detected, and Risk outbreak. The Let clients upload critical events
immediately option is enabled by default and configured in the Communications
Settings dialog box.
5 Click OK.
See Managing notifications on page 610.
See Viewing and acknowledging notifications on page 618.
Managing notifications 622
How upgrades from another version affect notification conditions
Note: When the Security definitions setting in the New client software notification
condition is enabled, it may cause a large number of notifications to be sent. This
situation can occur when there are many clients or when there are frequently
scheduled security definition updates. If you do not want to receive frequent
notifications about security definition updates, you can edit the notification condition
to disable the Security definitions setting
Several notification conditions may have a new setting that did not appear in earlier
versions: Send email to system administrators. If that setting is new for a
Managing notifications 623
How upgrades from another version affect notification conditions
notification condition, it is disabled by default for any existing condition of that type
following the upgrade.
When a default notification condition type has not been added in a previous
installation, that notification condition is added in the upgraded installation. However,
the upgrade process cannot determine which default notification conditions may
have been deleted deliberately by the administrator in the previous installation. With
one exception, therefore, all of the following action settings are disabled in each
default notification condition in an upgraded installation: Send email to system
administrators, Log the notification, Run batch file, and Send email to. When
all four of these actions are disabled, the notification condition is not processed,
even though the condition itself is present. Administrators can edit the notification
conditions to enable any or all of these settings.
Note that the New client software notification condition is an exception: it can
produce notifications by default when it is added during the upgrade process. Unlike
the other default notification conditions, both the Log the notification and the Send
email to system administrators action settings are enabled for this condition.
If the previous version of the software does not support licenses, an Upgrade
license expiration notification condition is enabled.
Some notification condition types are not available in previous versions of the
software. Those notification conditions are enabled by default when the software
is upgraded.
See What are the types of notifications and when are they sent? on page 612.
Section 6
Protecting clients in virtual
environments
Use Shared Insight Cache to skip the Shared Insight Cache keeps track of the files that are known to be clean.
scanning of files that are known to be Shared Insight Cache can reduce the scan load by eliminating the need to
clean. rescan those files.
Use the Virtual Image Exception tool so The Virtual Image Exception tool lets you mark base image files as safe so
that clients can skip the scanning of that scans skip those files to reduce scan loads.
base image files.
The Virtual Image Exception tool runs in a virtual environment only.
Configure the non-persistent virtual Symantec Endpoint Protection clients have a configuration setting to indicate
desktop infrastructures feature. that they are non-persistent virtual clients. You can configure a separate
aging period for the offline GVMs in non-persistent virtual desktop
infrastructures. Symantec Endpoint Protection Manager removes
non-persistent GVM clients that have been offline longer than the specified
time period.
Note: Symantec does not support the use of the Virtual Image Exception tool in
physical environments.
Overview of Symantec Endpoint Protection and virtual infrastructures 628
About the Virtual Image Exception tool
See Using the Virtual Image Exception tool on a base image on page 642.
See Using Symantec Endpoint Protection in virtual infrastructures on page 625.
Chapter 28
Installing and using a
network-based Shared
Insight Cache
This chapter includes the following topics:
About stopping and starting the network-based Shared Insight Cache service
Table 28-1 Tasks to install and use a network-based Shared Insight Cache
Step Task
Step 2: In the Virus and Spyware See Enabling or disabling the use of a network-based
policy in Symantec Endpoint Shared Insight Cache on page 633.
Protection Manager, enable your
virtual clients to use Shared
Insight Cache
After you have installed a Shared Insight Cache, you can optionally do the following
tasks:
Customize any of the service, cache, or log settings for Shared Insight Cache.
See Customizing Shared Insight Cache settings on page 634.
View related events in the log.
See Viewing network-based Shared Insight Cache log events on page 638.
Use the Windows Performance Manager to monitor its performance.
See Monitoring network-based Shared Insight Cache performance counters
on page 640.
Requirement Description
Requirement Description
Memory 2 GB minimum
Note: You should not use DBCS or high-ASCII characters in the host name of the
server on which you install a Shared Insight Cache. You should also refrain from
using DBCS or high-ASCII characters in the user name that you use to access it.
These characters cause the Shared Insight Cache service to fail to start.
Note: You can type the following command instead, to launch the same
installation program:
msiexec /i SharedInsightCacheInstallation.msi
6 On the Shared Insight Cache Settings pane, specify the following Shared
Insight Cache settings:
Status Listening Port The port that the server uses to communicate
status about the server.
7 Click Install.
8 When the installation has completed, click Finish.
See Customizing Shared Insight Cache settings on page 634.
Uninstalling Shared Insight Cache has the same effect as stopping the Shared
Insight Cache service. If you are uncertain as to whether you want to permanently
uninstall Shared Insight Cache, you can stop the service instead.
Installing and using a network-based Shared Insight Cache 633
Enabling or disabling the use of a network-based Shared Insight Cache
See About stopping and starting the network-based Shared Insight Cache service
on page 638.
Note: To uninstall the Shared Insight Cache, use the appropriate Windows control
panel, such as Add or Remove Programs. You must have Windows administrator
rights to uninstall Shared Insight Cache.
If you uninstall Shared Insight Cache, you may also want to disable the Shared
Insight Cache in Symantec Endpoint Protection Manager. Disabling Shared Insight
Cache prevents the Windows Event log from receiving notifications each time clients
cannot contact the cache.
7 Click OK.
Installing and using a network-based Shared Insight Cache 634
Customizing Shared Insight Cache settings
Cache Service Listening Port on which the service listens. The listening port is used by clients to submit scan results
Port for files and to make requests to determine if the client should scan a file.
The default value is If the range for the port is not between 0 - 65535, the service does not start.
9005.
The service does not start if it cannot listen on the specified port.
<endpoint address="http://localhost:9005/1"
By default, the Shared Insight Cache server listens on all IP addresses. To configure the
listening IP addresses for HTTP or HTTPS services, you must use Netsh.exe. The Shared
Insight Cache server listens on the IP addresses that you specified in the IP Listen List
modified by those tools.
Status Service Listening Port the server uses to communicate status about the server. The status listening port uses
Port a SOAP-based interface on the port specified in the configuration section. This interface
provides a mechanism by which an administrator can query information and status about
The default value is
the Cache Server.
9006.
The service does not start if the range is not between 0 - 65535.
The service does not start if it cannot listen on the specified port.
Vote Count Number of the clients that must verify that the file is clean before Shared Insight Cache uses
the results.
The default value is 1.
The value must be less than or equal to 15. If the value is greater than 15, the server uses
the default value.
Prune Size Percentage of memory usage to remove from the cache when the cache hits the memory
usage limit.
The default value is 10.
The value must be between 10 and 100. If the value is not between 10 and 100, the server
uses the default value.
Note: Symantec recommends that you keep the default prune size.
<prune.size="10" />
Installing and using a network-based Shared Insight Cache 636
Customizing Shared Insight Cache settings
Memory Usage Percentage of size of the cache before Shared Insight Cache starts pruning the cache.
<mem.usage="50" />
WARN
ERROR
FATAL
OFF
A value of OFF indicates that Shared Insight Cache does not log any messages.
See Viewing network-based Shared Insight Cache log events on page 638.
Log Size Size of the log (in bytes) until Shared Insight Cache rolls the log over.
Log Backups Number of rolled over logs to keep before the oldest log is deleted.
The default value is 1. A value of 0 indicates that Shared Insight Cache retains no backups. A negative value
indicates that Shared Insight Cache retains an unlimited number of backups.
<maxSizeRollBackupsvalue="1" />
Installing and using a network-based Shared Insight Cache 637
Customizing Shared Insight Cache settings
Enable SSL By default, Shared Insight Cache is set up with no authentication and no SSL. It can be
changed to Basic authentication with SSL, no authentication with SSL, or Basic authentication
Enable authentication
with no SSL.
<webHttpBinding>
<bindingname="CacheServerBinding">
<!--
Uncomment the appropriate section to get
the desired security.
See Enabling or disabling the use of a network-based Shared Insight Cache on page 633.
For example:
Modify the configuration file to specify the log level that you want to use for
network-based Shared Insight Cache.
Installing and using a network-based Shared Insight Cache 639
Viewing network-based Shared Insight Cache log events
FATAL FATAL messages require you to take action. These messages are the
errors that cause Shared Insight Cache to stop.
For example, a FATAL message may indicate that the server IP address
is not available, which means that Shared Insight Cache cannot run.
ERROR ERROR messages require you to take action, but the process continues
to run. They are errors in the system that cause Shared Insight Cache to
fail or lose functionality.
WARN WARN messages indicate Shared Insight Cache behavior that may be
undesirable, but do not cause it to fail.
You also receive all log entries for FATAL messages and ERROR messages.
INFO INFO messages describe the general actions of or give information about
Shared Insight Cache. They may indicate the state of the system and help
validate behavior or track down issues. However, alone they are not intended
to report actionable items.
You also receive all log entries for FATAL messages, ERROR messages,
and WARN messages.
DEBUG DEBUG and ALL log level messages produce the same results. These log
levels are intended for Support to troubleshoot problems with Shared Insight
ALL
Cache.
You also receive all log entries for all other log levels.
Increase the log level only when you need to troubleshoot issues with Shared Insight
Cache. When you increase the log level, you begin to significantly increase the size
of the log file. When you resolve the issue, return to the default log level of ERROR.
To view Shared Insight Cache events in the log
Go to the following location:
Installation folder/CacheServer.log
Installing and using a network-based Shared Insight Cache 640
Monitoring network-based Shared Insight Cache performance counters
Statistic Description
The number of items in the cache This number represents the current number of
items in the cache.
The number of items in the cache that This number represents the current number of
have been voted clean items in the cache, which have been voted clean.
Number of cache requests The number of cache requests that have been
made to the Shared Insight Cache service.
Number of update requests The number of update requests that have been
made to the service.
5 Select the counters that you want to view, and click Add.
6 Click Close.
The Shared Insight Cache counters that you selected appear in the Performance
graph.
For more information about using the Windows performance monitor, see your
Windows documentation.
See Troubleshooting issues with Shared Insight Cache on page 641.
See What do I need to do to use a network-based Shared Insight Cache?
on page 629.
Issue Explanation/Resolution
Shared Insight Cache returns a Shared Insight Cache returns a no result response when it fails to successfully
"no result" response perform a cache lookup. If the client requests a cache lookup, a no result means
that the file must be scanned.
Note: Shared Insight Cache returns a success response even when it fails to
successfully perform a cache update. The reason is because the client is not
required to perform a different action when a failure occurs.
Suspected issues with HTTP View the HTTP traffic error log. The HTTP traffic errors are logged in the following
traffic location:
%Windir%\System32\Logfiles\HTTPERR
See Viewing network-based Shared Insight Cache log events on page 638.
See Monitoring network-based Shared Insight Cache performance counters
on page 640.
Chapter 29
Using Virtual Image
Exception
This chapter includes the following topics:
Note: You cannot use the Virtual Image Exception tool in a non-virtual environment.
Using Virtual Image Exception 643
System requirements for the Virtual Image Exception tool
Table 29-1 Process for using the Virtual Image Exception tool on a base image
Step Action
Step 1 On the base image, perform a full scan all of the files to ensure that the
files are clean.
See Specifying when repaired files, backup files, and quarantined files
are automatically deleted on page 438.
See Using the Risk log to delete quarantined files on your client computers
on page 440.
Step 3 Run the Virtual Image Exception tool from the command line to mark the
base image files.
Step 4 Enable the feature in Symantec Endpoint Protection Manager so that your
clients know to look for and bypass the marked files when a scan runs.
Step 5 Remove the Virtual Image Exception tool from the base image.
The Virtual Image Exception tool supports fixed, local drives. It works with the files
that conform to the New Technology File System (NTFS) standard.
See System requirements for the Virtual Image Exception tool on page 643.
Warning: The client must be the same version as the Virtual Image Exception tool.
For the most up-to-date information about requirements and supported platforms,
see the following Web page:
Release notes, new fixes, and system requirements for all versions of Endpoint
Protection
See Using the Virtual Image Exception tool on a base image on page 642.
Warning: The client must be the same version as the Virtual Image Exception tool.
See System requirements for the Virtual Image Exception tool on page 643.
To run the Virtual Image Exception tool
1 From the Symantec Endpoint Protection Tools folder of the installation file,
download the following file to the base image:
/Virtualization/VirtualImageException/vietool.exe
Setting up the base image for non-persistent guest virtual machines in VDIs
Step Description
Step 1: Set up the base image. You configure the Symantec Endpoint Protection client
in your base image to indicate that it is a non-persistent
virtual client.
See Setting up the base image for non-persistent
guest virtual machines in VDIs on page 647.
Non-persistent virtual desktop infrastructures 647
Setting up the base image for non-persistent guest virtual machines in VDIs
Step Description
Table 30-2 Tasks to set up the base image for non-persistent GVMs
Step Description
Step 1: Install Symantec Endpoint See Choosing a method to install the client using the
Protection on the base image. Client Deployment Wizard on page 115.
Step 3: Correctly count the number The advantage of non-persistent clients is that offline
of licenses for non-persistent virtual non-persistent clients do not count toward the number
clients. of deployed licenses. Only online clients count. To
mark a virtual client as a non-persistent client, you must
create a registry key in the base image.
After you have finished setting up the base image, you can configure a separate
purge interval for non-persistent clients in Symantec Endpoint Protection Manager.
Non-persistent virtual desktop infrastructures 648
Counting the number of licenses for non-persistent VDI clients
See Purging obsolete non-persistent VDI clients to free up licenses on page 648.
Chapter 31. Configuring the connection between the management server and
the clients
Best practices for updating server certificates and maintaining the client-server
connection
the Symantec Endpoint Protection Manager Apache web server to use an HTTPS
connection after the upgrade.
Step Description
Step 1: Check that the default HTTPS By default, HTTPS traffic uses port 443. In some networks, port 443 may
port is available already be bound to another application or service. Before you enable HTTPS
communication, you must check to see if the default port is available.
Step 2: Change the default HTTPS port If port 443 is not available, choose an unused port from the high port range
as needed (49152-65535). Configure the management server to use the new port.
Update the management server list to reflect the new port.
See Changing the HTTPS port for Apache for client communication
on page 653.
See Configuring a management server list for load balancing on page 688.
Step 3: Enable HTTPS communication Edit the Apache httpd.conf file to allow HTTPS communication to the client.
to the client Test the connection, and then switch the clients to HTTPS communication.
Where port represents the port number for which you want to check availability.
For example, to see if port 443 is available, enter:
netstat -an | find ":443" | find "LISTENING"
If the netstat command returns a result, you must find an unused port. You
use the same command, but replace port with the port of your choice. If this
command yields no results, then the port is free to use.
See Changing the HTTPS port for Apache for client communication on page 653.
Configuring the connection between the management server and the clients 653
Setting up HTTPS communications between a Symantec Endpoint Protection Manager and the clients
Note: If you customize the HTTPS port number after you deploy the client software,
the clients lose communication with the management server. They reestablish
communication after the next client update from the server, which contains the new
connection information. You can also use a Communication Update Package.
Restoring client-server communications with Communication Update Package
Deployment
After you complete this procedure, you enable HTTPS client-server communications.
To change the HTTPS port for Apache for client communication
1 In a text editor, open the following file:
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection
Manager\apache\conf\ssl\sslForClients.conf
<VirtualHost_default_: 443>
2 Find the following text string and remove the hash mark (#):
#Include conf/ssl/sslForClients.conf
To switch the clients to use HTTPS for communication with Symantec Endpoint
Protection Manager
1 In the Symantec Endpoint Protection Manager console, on the Policies tab,
click Policy Components > Management Server Lists.
2 Double-click the management server list that your client groups and locations
use. If you only have the default management server list, duplicate it, and then
double-click the new list to edit it.
You can also click Add a Management Server List, under Tasks. Add the
server information under Management Servers, Add > New Server. You can
add one New Server entry for server IP address, and one for server name.
See Copying and pasting a policy on the Policies page on page 308.
3 Click Use HTTPS protocol.
Only click Verify certificate when using HTTPS protocol if you have
previously updated the management server with a Certificate Authority-signed
certificate and a private key pair.
See Best practices for updating server certificates and maintaining the
client-server connection on page 660.
Table 31-2 Tasks to improve performance on the server and on the client
Task Description
Change client-server Use pull mode instead of push mode to control how often the management server
communication settings downloads policies and content updates to the client computers. In pull mode, the
management server can support more clients.
Increase the heartbeat interval so that the client and the server communicate less
frequently. For fewer than 100 clients per server, increase the heartbeat to 15-30
minutes. For 100 to 1,000 clients, increase the heartbeat to 30-60 minutes. Larger
networks might need a longer heartbeat interval. Increase the download randomization
to between one and three times the heartbeat interval.
See Configuring push mode or pull mode to update client policies and content
on page 162.
For more information about setting heartbeat intervals, see the Symantec Endpoint
Sizing and Scalability Best Practiceswhite paper.
Configuring the connection between the management server and the clients 657
Improving client and server performance
Table 31-2 Tasks to improve performance on the server and on the client
(continued)
Task Description
Randomize and reduce the Content updates vary in size and frequency, depending on the content type and
number of content updates availability. You can reduce the effect of downloading and importing a full set of content
updates by using the following methods:
Adjust scans to improve You can change some scan settings to improve the computers' performance without
computer performance reducing protection.
For example, you can configure scans to ignore trusted files or to run when the computer
is idle.
Table 31-2 Tasks to improve performance on the server and on the client
(continued)
Task Description
Reduce database client log You can configure the logging options to optimize storage requirements and comply
volume with company policies that control retention of logged data.
The database receives and stores a constant flow of entries into its log files. You must
manage the data that is stored in the database so that the stored data does not consume
all the available disk space. Too much data can cause the computer on which the
database runs to crash.
You can reduce the volume of log data by performing the following tasks:
Upload only some of the client logs to the server, and change the frequency with
which the client logs are uploaded.
See Specifying client log size and which logs to upload to the management server
on page 678.
Specify how many log entries the client computer can keep in the database, and
how long to keep them.
See Specifying the log size and how long to keep log entries in the database
on page 679.
Filter the less important risk events and system events out so that less data is
forwarded to the server.
See Modifying log handling and notification settings on Windows computers
on page 466.
Reduce the number of clients that each management server manages.
See Configuring a management server list for load balancing on page 688.
See Installing Symantec Endpoint Protection Manager on page 43.
Reduce the heartbeat frequency, which controls how often the client logs are
uploaded to the server.
See Configuring push mode or pull mode to update client policies and content
on page 162.
Increase the amount of hard disk space in the directory where the log data is stored
before being written to the database.
See About increasing the disk space on the server for client log data on page 680.
Perform database To increase the speed of communication between the client and the server, you should
maintenance tasks schedule regular database maintenance tasks.
Note: Use this process to update either one management server or multiple
management servers at the same time.
Table 31-3 lists the steps to update the certificate without orphaning the clients that
the server manages.
Step Description
Step 1: Break the replication relationship If the management server you want to update replicates with other
(optional) management servers, break the replication relationship.
Step 2: Disable server certificate Disable secure communications between the server and the clients. When
verification you disable the verification, the clients stay connected while the server
updates the server certificate.
Step 3: Wait for all clients to receive the The process of deploying the updated policy may take a week or longer,
updated policy depending on the following factors:
Step Description
Step 4: Update the server certificate Update the server certificate. If you also plan to upgrade the management
server, upgrade the certificate first.
Step 5: Enable server certificate Enable secure communications between the server and the clients again.
verification again
See Enabling or disabling secure communications between the management
server and the client on page 661.
Step 6: Wait for all clients to receive the The client computers must receive the policy changes from the previous
updated policy step.
Step 7: Restore the replication If the management server you updated replicates with other management
relationship (optional) servers, restore the replication relationship.
After you move the clients or update the certificate, you enable secure
communications again.
Enabling or disabling secure communications between the management server and
the client
1 On the console, click Clients > Policies > General Settings.
2 On the Security Settings tab, check or uncheck Enable secure
communications between the management server and clients by using
digital certificates for authentication.
3 Click OK.
See About server certificates on page 659.
See Best practices for updating server certificates and maintaining the client-server
connection on page 660.
3 Under Tasks, click Manage Server Certificate, and then click Next.
4 In the Manage Server Certificate panel, click Update the server certificate,
click Next, and then click Yes.
To maintain the server-client connection, disable secure connections.
See Enabling or disabling secure communications between the management
server and the client on page 661.
5 In the Update Server Certificate panel, choose the certificate you want to
update to, and then click Next.
6 For each certificate type, following the instructions on the panels, and click
Finish.
Backup server certificates are in C:\Program Files
(x86)\Symantec\Symantec Endpoint Protection Manager\Server Private
Key Backup\recovery_timestamp.zip. You can locate the password for the
keystore file in the settings.properties file within the same .zip file. The
password appears in the keystore.password= line.
7 You must restart the following services to use the new certificate:
The Symantec Endpoint Protection Manager service
The Symantec Endpoint Protection Manager Webserver service
The Symantec Endpoint Protection Manager API service
See Stopping and starting the management server service on page 145.
Chapter 32
Configuring the
management server
This chapter includes the following topics:
Task Description
Learn about servers Decide which types of servers you need to set up.
Set server communication You can allow or deny access to the remote console. You
permissions manage access by adding exceptions based on the IP
address of a single computer or a group of computers.
Task Description
Configure the mail server To work with a specific mail server in your network, you
need to configure the mail server.
Manage directory servers You can integrate Symantec Endpoint Protection with
directory servers to help manage administrator accounts
or to create organizational units.
Configure proxy settings if you To set up the Symantec Endpoint Protection Manager to
use a proxy server to connect connect to the Internet through a proxy server, you must
to Symantec LiveUpdate configure the proxy server connection.
servers
See Configuring Symantec Endpoint Protection Manager
to connect to a proxy server to access the Internet and
download content from Symantec LiveUpdate on page 186.
Import or export server You can export server settings to an xml file, and you can
properties re-import the same settings.
Manage server certificates The Symantec Endpoint Protection Manager server uses
a server certificate to encrypt data for the communication
between all servers, and clients in a network. The server
identifies and authenticates itself with a server certificate.
You may need to back up, update, or generate a new server
certificate.
Task Description
Move the server to a different You may need to move the management server software
computer from one computer to another for the following reasons:
Start and stop the management The management server runs as an automatic service. You
server must stop the management server service when you
upgrade, or perform disaster recovery.
can modify it directly. Any site other than the local site is referred to as a remote
site. You connect sites by using replication.
See Setting up sites and replication on page 691.
Management server
The computer on which the Symantec Endpoint Protection Manager software
is installed. From the management server, policies can be created and assigned
to different organizational groups. You can monitor clients, view reports, logs,
and alerts, and configure servers and administrator accounts. Multiple
management servers at a single site provide failover and load balancing
capabilities.
See Setting up failover and load balancing on page 683.
Database server
The database used by Symantec Endpoint Protection Manager. There is one
database per site. The database can be on the same computer as the
management server or on a different computer if you use a SQL Server database.
See Maintaining the database on page 669.
Replication partner
A relationship created between two sites to enable data replication between
them.
See Setting up sites and replication on page 691.
Specifying client log size and which logs to upload to the management server
Specifying the log size and how long to keep log entries in the database
About increasing the disk space on the server for client log data
Task Description
Schedule regular database You should schedule regular database backups in case the database gets
backups corrupted.
See Clearing log data from the database manually on page 681.
Schedule database maintenance You can speed up the interaction time between the management server and the
tasks database by scheduling database maintenance tasks. You can schedule the
management server to perform the following maintenance tasks immediately or
when users are not on the client computers.
Periodically check the database If you use the Microsoft SQL Server database rather than the embedded database,
file size make sure that the database does not reach the maximum file size.
See Increasing the Microsoft SQL Server database file size on page 675.
Managing databases 671
Maintaining the database
Task Description
Calculate the database storage Before you can decide how to reduce the amount of storage space, calculate the
space that you need total amount of disk space that you need.
The database storage is based on the following factors:
For more information on how to calculate the hard disk space you need, see the
Symantec white paper, Symantec Endpoint Protection Sizing and Scalability Best
Practices White Paper.
Managing databases 672
Maintaining the database
Task Description
Reduce the volume of log data The database receives and stores a constant flow of entries into its log files. You
must manage the data that is stored in the database so that the stored data does
not consume all the available disk space. Too much data can cause the computer
on which the database runs to crash.
You can reduce the volume of log data by performing the following tasks:
Upload only some of the client logs to the server, and change the frequency
with which the client logs are uploaded.
See Specifying client log size and which logs to upload to the management
server on page 678.
Specify how many log entries the client computer can keep in the database,
and how long to keep them.
See Specifying the log size and how long to keep log entries in the database
on page 679.
Filter the less important risk events and system events out so that less data is
forwarded to the server.
See Modifying log handling and notification settings on Windows computers
on page 466.
Reduce the amount of space in the directory where the log data is stored before
being inserted into the database.
See About increasing the disk space on the server for client log data
on page 680.
Reduce the number of clients that each management server manages.
See Configuring a management server list for load balancing on page 688.
Reduce the heartbeat frequency, which controls how often the client logs are
uploaded to the server.
See Configuring push mode or pull mode to update client policies and content
on page 162.
Export log data to another server For security purposes, you might need to retain the number of log records for a
longer period of time. To keep the client log data volume low, you can export the
log data to another server.
Create client installation packages The more protection features that you install with the client, the more space that
with only the protection that you the client information takes in the database. Create the client installation package
need with only the appropriate level of protection the client computer needs. The more
groups you add, the more space the client information takes in the database.
Task Description
Use the Group Update Provider If you have low bandwidth or more than 100 client computers, use Group Update
to download content Providers to download content. For example, 2,000 clients using a Group Update
Provider is the equivalent of using four to five management servers to download
content.
See Using Group Update Providers to distribute content to clients on page 201.
To reduce disk space and database size, you can reduce the number of content
revisions that are kept on the server.
Restore the database You can recover a corrupted database by restoring the database on the same
computer on which it was installed originally. Or, you can install the database on
a different computer.
Check Back up logs if you need to save a copy of the logs for security
purposes or company policy.
Otherwise, leave this option disabled, as logs use a lot of disk space.
Specify the number of backups if your company policy requires it.
Note: You can also perform the database maintenance tasks in Microsoft SQL
Server Management Studio. However, you should perform these tasks in either
Symantec Endpoint Protection Manager or Management Studio, but not both.
4 Click Run.
5 After the task completes, click Close.
Managing databases 675
Scheduling automatic database maintenance tasks
Note: You cannot restore the database by using exported log data.
Table 33-2 shows the correspondence of the types of log data to the names of the
exported log data files. The log names do not correspond one-to-one to the log
names that are used on the Logs tab of the Monitors page.
Table 33-2 Log text file names for Symantec Endpoint Protection
Note: When you export to a text file, the number of exported records can differ from
the number that you set in the External Logging dialog box. This situation arises
when you restart the management server. After you restart the management server,
the log entry count resets to zero, but there may already be entries in the temporary
log files. In this situation, the first *.log file of each type that is generated after the
restart contains more entries than the specified value. Any log files that are
subsequently exported contain the correct number of entries.
You can configure whether to upload each type of client log to the server. You can
also configure the maximum size of the uploads. If you choose not to upload the
client logs, you cannot perform the following tasks:
You cannot view the client log data from the Symantec Endpoint Protection
Manager console by using the Logs tab on the Monitors page.
You cannot back up the client logs when you back up the database.
You cannot export the client log data to a file or a centralized log server.
Note: Some client log settings are group-specific and some are set in the Virus and
Spyware Protection policy, which can be applied to a location. If you want all remote
client log and office client log settings to differ, you must use groups instead of
locations to manage remote clients.
See Specifying the log size and how long to keep log entries in the database
on page 679.
To specify client log size and which logs to upload to the management server
1 On the console, click Clients, and select a group.
2 On the Policies tab, under Location-independent Policies and Settings,
click Client Log Settings.
3 In the Client Log Settings for group name dialog box, set the maximum file
size and the number of days to keep log entries.
4 Check Upload to management server for any logs that you want the clients
to forward to the server.
5 For the Security log and Traffic log, set the damper period and the damper
idle period.
These settings determine how frequently Network and Host Exploit Mitigation
events are aggregated
6 Click OK.
Note: Log information on the Symantec Endpoint Protection Manager console Logs
tab on the Monitors page is presented in logical groups for you to view. The log
names on the Site Properties Log Settings tab correspond to log content rather
than to log types on the Monitors page Logs tab.
See Specifying client log size and which logs to upload to the management server
on page 678.
To specify the log size and how long to keep log entries in the database
1 In the console, click Admin.
2 Under Servers, expand Local Site, and click the database.
3 Under Tasks, click Edit Database Properties.
4 On the Log Settings tab, set the number of entries and number of days to
keep log entries for each type of log.
5 Click OK.
To adjust the values that control the space available on the server, you must change
these values in the Windows registry. The Windows registry keys that you need to
change are located on the server in HKEY_LOCAL_MACHINE\SOFTWARE\
Symantec\Symantec Endpoint Protection\SEPM.
Table 33-3 lists the Windows registry keys and their default values and describes
what they do.
Managing databases 681
Clearing log data from the database manually
Table 33-3 Windows registry keys that contain log upload settings
3 On the computer where the manager is installed, open a Web browser and
type the following URL:
https://localhost:8443/servlet/ConsoleServlet?ActionType=ConfigServer&action
=SweepLogs
After you have performed this task, the log entries for all types of logs are saved
in the alternate database table. The original table is kept until the next sweep
is initiated.
4 To empty all but the most current entries, perform a second sweep. The original
table is cleared and entries then start to be stored there again.
5 Return the settings on the Log Settings tab of the Site Properties dialog box
to your preferred settings.
Chapter 34
Managing failover and load
balancing
This chapter includes the following topics:
Tasks Description
Read about failover You should understand if and when you need to set up management
and load balancing. servers for failover and load balancing.
Install additional See Installing a management server for failover or load balancing
management servers. on page 686.
Add management To set up load balancing, you add multiple management servers
servers to a to a management server list. You can either use the default
management server management server list or add management servers to a new
list. management server list. A management server list includes the IP
addresses or host names of management servers to which clients
can connect.
Assign the custom After you have created a custom management server list, you must
management server list assign the management server list to a group.
to a group.
See Assigning a management server list to a group and location
on page 689.
replicate with another site. When you use replication with an embedded database,
Symantec recommends that you do not configure load balancing, as data
inconsistency and loss may result.
Load balancing occurs with a prioritized list of management servers that is assigned
to a group. You should add at least two management servers to a site to
automatically distribute the load among them. You can install more management
servers than are required to handle your clients to protect against the failure of an
individual management server. In a custom management server list, each server
is assigned to a priority level. A client that comes onto the network selects a priority
one server to connect to at random. If the first server it tries is unavailable and there
are other priority one servers in the list, it randomly tries to connect to another. If
no priority one servers are available, then the client tries to connect to one of the
priority two servers in the list. This method of distributing client connections randomly
distributes the client load among your management servers.
Figure 34-1 shows components on different subnets. Management servers and
database servers can be on the same subnets. The servers are identified with the
numbers 1 and 2, which signify a failover configuration.
Clients
1 2
In a failover configuration, all clients send traffic to and receive traffic from server
1. If server 1 goes offline, all clients send traffic to and receive traffic from server 2
until server 1 comes back online. The database is illustrated as a remote installation,
but it also can be installed on a computer that runs the Symantec Endpoint Protection
Manager.
You may also want to consider failover for content updates, if you intend to use
local servers. All the components that run LiveUpdate can also use a prioritized list
of update sources. Your management servers can use a local LiveUpdate server
and failover to LiveUpdate servers in other physical locations.
Note: The use of internal LiveUpdate servers, Group Update Providers, and site
replication does not provide load balancing functionality. You should not set up
multiple sites for load balancing.
8 Step Two tells the Symantec Endpoint Protection Manager how to authenticate
to the SQL Server and includes the database name, database user, and
database user's password.
You should have had this information available already for when you installed
the first management server for that site.
9 Click Next.
10 Specify and confirm a password for the Symantec Endpoint Protection Manager
admin account.
Optionally, provide an administrator email address.
Managing failover and load balancing 688
Configuring a management server list for load balancing
11 Click Next.
12 At the warning, read the text message, and then click OK.
13 In Management Server Completed panel, click Finish.
10 Click OK.
You must then apply the management server list to a group.
See Assigning a management server list to a group and location on page 689.
Deleting sites
See What are sites and how does replication work? on page 693.
Tasks Description
Step 1: Determine whether you need to add Before you set up multiple sites and replication, make sure that it is
another site necessary. Symantec recommends that you set up multiple sites
only in specific circumstances and that you add a maximum of five
sites in each site farm. If you do add an additional site, decide which
site design works for your organization.
Step 2: Install Symantec Endpoint Protection When you install Symantec Endpoint Protection for the first time, by
Manager on the first site default you have installed the first site, or the local site.
Step 3: Install Symantec Endpoint Protection You create a second site by installing a second management server.
Manager on the second site The second site is classified as a remote site and the management
server is called a replication partner. Replication occurs according
to the default schedule that when you added the second site during
the initial installation. After you have added a replication partner,
you can change the replication schedule and what data is replicated.
The first time that the databases between the two sites replicate, let
the replication finish completely. The replication may take a long
time because the entire database gets replicated.
You may want to replicate the data immediately, rather than waiting
until the database are scheduled to replicate. You can also change
the replication schedule to occur earlier or later.
Step 4: Check the history for replication events If you need to check that replication occurred or to troubleshoot the
(optional) replication events, look at the System log.
In the second management server, click Monitors > Logs > System
> Administrative >Additional Settings, and under Event type, click
Replication events.
You can also reconfigure a management server to replicate the data with a currently
existing site in your network. Or, if you have two non-replicating sites, you can
convert one of the sites into a site that replicates with the second site.
Managing sites and replication 693
What are sites and how does replication work?
Figure 35-1 How replication works between the main site and two remote sites
Site 1 Site 2
MS SQL MS SQL
database database
Replication
Replication
Site 3
Symantec Endpoint
Protection Manager
MS SQL
database
For more information on how often to replicate, see the following article: The
Philosophy of SEPM Replication Setup
See Deciding whether or not to set up multiple sites and replication on page 696.
See Determining how many sites you need on page 698.
Managing sites and replication 695
What are sites and how does replication work?
See How to resolve data conflicts between sites during replication on page 695.
Replication does not occur if the database schema versions do not match.
Table 35-2 describes how the management server resolves conflicts if administrators
change settings on the sites in a site farm.
Table 35-2 How the management server resolves conflicts between sites
Two differences cannot Administrators for site 1 and site The management server retains only the most recently
exist together. 2 both configure an identical made change.
Firewall policy setting. On site 1,
For example, if you made a change on site 1 first, and
the setting is enabled. On site 2,
site 2 second, then the site 2 change is retained.
the setting is disabled.
The same variable is Administrators on site 1 and site The management server retains both changes, adding a
created for both sites. 2 both add a group with the same tilde and the numeral 1 (~1) after the more recently made
name. variable.
Data can merge without The administrator for site 1 adds The management server merges the changes.
conflict. two Firewall policies and the
For example, the management server displays all seven
administrator for site 2 adds five
Firewall policies on both sites.
Firewall policies.
to the United States site. This distribution reduces the number of clients that
have to communicate over the slow WAN link.
For database redundancy.
Replication ensures that if one datacenter was corrupted or lost, you would have
backed up the database in a different datacenter.
In some situations, you should use a Group Update Provider (GUP) instead of
multiple sites and replication. Use a GUP when you have either a lot of clients, or
clients that are distributed over several geographical locations.
Note: You should not set up more than five replicated sites.
Table 35-3 Deciding whether to use more than one site with replication, a GUP,
or neither
Do you have a slow WAN link that No. You do not need either replication
connects to a location with more or a GUP.
than 1,000 clients?
Do you have a slow WAN link? Yes. Yes. Consider using replication.
Do you have multiple locations with No. You do not need either replication
more than 1,000 clients per location? or a GUP.
Managing sites and replication 698
Determining how many sites you need
Table 35-3 Deciding whether to use more than one site with replication, a GUP,
or neither (continued)
Do you have multiple locations with Yes. Yes. Consider using a GUP.
more than 1,000 clients per location?
Do you have a slow WAN link that No. You do not need either replication
connects to a location with more or a GUP.
than 1,000 clients?
Do you have a slow WAN link that No. You do not need either replication
connects to a location with more or a GUP.
than 1,000 clients?
A slow WAN link between multiple physical locations with thousands of clients.
If you set up a second site with its own management server, you can minimize
the client-server traffic over that slow link. With fewer clients, you should use a
Group Update Provider.
See Using Group Update Providers to distribute content to clients on page 201.
Any miscellaneous corporate management and IT security management
considerations that are unique.
Use the following size guidelines to decide how many sites to install:
Install as few sites as possible, up to a maximum of 20 sites. You should keep
the number of replicated sites under five.
Connect up to ten management servers to a database.
Connect up to 45,000 to 50,000 clients to a management server.
After you add a site, you should duplicate site information across multiple sites by
replication. Replication is the process of sharing information between databases
to ensure that the content is consistent.
Distributed Each site performs replication bi-directionally for groups and policies, but not logs and content. To
view the site reports, you use the console to connect to a management server in the remote site.
Use this design when you do not need immediate access to remote site data.
Centralized All logs are forwarded from the other sites to a central site.
logging
Use this design when you require centralized reporting.
High availability Each site has multiple management server installations and database clustering.
To handle additional clients, you add multiple management servers rather than adding multiple
sites. You then use a management server list to configure client computers to automatically switch
to an alternative management server if the primary management server becomes unavailable.
You use this design to provide redundancy, failover, and disaster recovery.
Note: When you use replication with an embedded database, Symantec recommends that you do
not add load balancing, as data inconsistency and loss may result.
For more information on whether or not to set up replication, see the following
article: When to use replication with Symantec Endpoint Protection Manager
See What are sites and how does replication work? on page 693.
Managing sites and replication 700
How to install a second site for replication
6 In the site information pane, accept or change the default values, and then
click Next.
7 In the database choice pane, click either the Default Embedded database or
Microsoft SQL Server database, and then click Next.
The site that you replicate with must use the same type of database.
Complete the installation based on the database that you choose.
8 In the Run LiveUpdate pane, click Next.
Optionally add the partner information.
9 Optionally accept the data collection feature, and then click Next.
The database gets created. This step takes some time.
The Symantec Endpoint Protection Manager launches.
management servers have enough available disk space to replicate based on the
frequency and content.
To change the replication frequency and schedule
1 In the console, click Admin > Servers.
2 Under Servers > Local Site, expand Replication Partners, and select the
site you want to replicate with.
3 Under Tasks, click Edit Replication Partner Properties.
4 Choose the content you want to replicate.
5 To change the schedule, do one of the following tasks:
Check Auto-replicate to let the management server choose when to
replicate the data.
This option causes frequent and automatic replication to occur between
two sites, about every 2 hours.
Check Replicate on a schedule to set up a custom schedule.
6 Click OK.
Replication considerations and best practices
See Replicating data immediately on page 702.
See Setting up sites and replication on page 691.
See What are sites and how does replication work? on page 693.
See Deciding whether or not to set up multiple sites and replication on page 696.
See Disabling replication and restoring replication before and after an upgrade
on page 147.
Deleting sites
Deleting a replication partner disconnects the partnership in Symantec Endpoint
Protection Manager, but does not uninstall the management server software or
delete the second site.
If you remove the management server at a remote site, you need to manually delete
it from all sites. Uninstalling the software from one management server console
does not make the icon disappear from the Servers pane on other consoles.
See Disabling replication and restoring replication before and after an upgrade
on page 147.
To delete a site
1 In the console, click Admin > Servers > Local Site, expand Replication
Partners, right-click the replication partner, and click Delete Replication
Partner.
2 Under Remote Sites, right-click the site and click Delete Remote Site.
3 Click Yes.
See Setting up sites and replication on page 691.
Chapter 36
Preparing for disaster
recovery
This chapter includes the following topics:
Step Description
Step 1: Back up the database Back up the database regularly, preferably weekly.
Step 2: Back up the disaster recovery The recovery file includes the encryption password, keystore files domain
file ID, certificate files, license files, and port numbers. By default, the file is
located in the following directory:
The recovery file only stores the default domain ID. If you have multiple
domains, the recovery file does not store that information. If you need to
perform disaster recovery, you must re-add the domains.
Step 3: Update or back up the server If you update the self-signed certificate to a different certificate type, the
certificate (optional) management server creates a new recovery file. Because the recovery file
has a timestamp, you can tell which file is the latest one.
Step 4: Save the IP address and host If you have a catastrophic hardware failure, you must reinstall the
name of the management server to a management server using the IP address and host name of the original
text file (optional) management server.
Add the IP address and host name to a text file, such as: Backup.txt.
Step 5: Store the backup data in a Copy the files you backed up in the previous steps to another computer
secure location off-site
Before you follow these steps, make sure that you made backups and recovery
files.
Step Action
Step 1: Reinstall Symantec Endpoint By reinstalling the management server, you can recover the files that were
Protection Manager using a disaster saved after initial installation.
recovery file.
See Reinstalling or reconfiguring Symantec Endpoint Protection Manager
on page 708.
Step 2: Restore the database. You can restore the database with or without a database backup.
Step 3: Re-enable Federal Information If you use a FIPS-compliant version of Symantec Endpoint Protection and
Processing Standards (FIPS) 140-2 have FIPS compliance enabled, after you recover Symantec Endpoint
compliance. (optional) Protection Manager, you must reenable FIPS compliance.
The backups are placed in a .zip file. By default, the backup database file is named
date_timestamp.zip, the date on which the backup occurs.
Note: Avoid saving the backup file in the product installation directory. Otherwise,
the backup file is removed when the product is uninstalled.
Preparing for disaster recovery 707
Backing up the database and logs
Log data is not backed up unless you configure Symantec Endpoint Protection
Manager to back it up. If you do not back up the logs, then only your log configuration
options are saved during a backup. You can use the backup to restore your
database, but the logs in the database are empty of data when they are restored.
You can keep up to 10 versions of site backups. You should ensure that you have
adequate disk space to keep all your data if you choose to keep multiple versions.
You can check the System log as well as the backup folder for the status during
and after the backup.
You can back up the database immediately, or schedule the backup to occur
automatically. You can back up an embedded database or a Microsoft SQL Server
database that is configured as the Symantec Endpoint Protection Manager database.
See Scheduling automatic database backups on page 673.
See Disaster recovery best practices on page 704.
To back up the database and logs
1 On the computer that runs Symantec Endpoint Protection Manager, on the
Start menu, click All Programs > Symantec Endpoint Protection Manager
> Symantec Endpoint Protection Manager Tools > Database Back Up and
Restore.
2 In the Database Back Up and Restore dialog box, click Back Up.
3 In the Back Up Database dialog box, optionally check Backup logs, and then
click Yes.
4 Click OK.
5 When the database backup completes, click Exit.
6 Copy the backup database file to another computer.
To back up the database and logs from within the console
1 In the console, click Admin > Servers.
2 Under Servers, click Local Site (My Site) > localhost.
3 Under Tasks, click Back Up Database Now.
4 In the Back Up Database dialog box, optionally check Backup logs, and then
click Yes.
5 Click OK.
6 Click Close.
Preparing for disaster recovery 708
Backing up a server certificate
3 In the Welcome panel, make sure that the Use a recovery file to restore
communication with previously deployed clients option is checked, and
then click Next.
By default, the recovery file is located in: C:\Program Files
(x86)\Symantec\Symantec Endpoint Protection Manager\Server Private
Key Backup.
4 Follow the instructions in each panel. The default settings work for most cases.
If the reinstalled server connects to an existing database, you change the
database settings to those of the existing database.
You can also restore the database if necessary. However, if the Symantec Endpoint
Protection Manager database resides on another computer or is otherwise not
affected, you do not need to restore your database.
See Restoring the database on page 710.
To reconfigure the management server
1 To reconfigure the management server, click Start > All Programs > Symantec
Endpoint Protection Manager > Symantec Endpoint Protection Manager
Tools > Management Server Configuration Wizard.
2 Select one of the following options:
To reconfigure the management server on the existing site, click
Reconfigure the management server.
To reconfigure the management server to replicate data with an existing
site, click Reconfigure the management server to replicate with a
different site.
This option reconfigures the locally installed management server to create
a new site and to replicate the data with another existing site in your network.
Also, if you have two non-replicating sites, use this option to convert one
of the sites into a site that replicates with the second site.
Chapter 39. Using Power Eraser to troubleshoot difficult and persistent threats
Chapter 37
Troubleshooting
installation and
communication problems
This chapter includes the following topics:
Task Description
Fixing installation problems You can download and run the Symantec Diagnostic Tool (SymDiag) to verify that your
computers are ready for installation. The tool is provided from the Symantec Support
website through Help on the management server and the client.
See Troubleshooting computer issues with the Symantec Diagnostic Tool (SymDiag)
on page 715.
Handling virus outbreaks You can prevent threats from attacking computers on your network.
See Preventing and handling virus and spyware attacks on client computers
on page 388.
If a threat does attack a client computer, you can identify and respond to the threat.
Troubleshooting content If the latest virus definitions do not update correctly on Symantec Endpoint Protection
update problems Manager or the clients, see the following article:
Fixing communication The communication channels must be open between all of the Symantec Endpoint
problems Protection components. These channels include the following: server to client, server
to database, and server and client to the content delivery component, such as
LiveUpdate.
Performing disaster recovery In case of database corruption or hardware failure, you can restore the latest snapshot
of the database if you have a database backup file.
Reducing the space in the You can make more space available on the database if the database size gets too
database large.
Task Description
Troubleshooting reporting You can solve various report and log issues.
issues
See Troubleshooting reporting issues on page 731.
the reason for the failed installation, you should retain the log file. Provide the file
to Symantec Technical Support if it is requested.
Note: Each time the installation package is executed, the log file is overwritten.
The action that occurred before the line that contains this entry is most likely
the action that caused the failure. The lines that appear after this entry are the
installation components that have been rolled back because the installation
was unsuccessful.
See Choosing a method to install the client using the Client Deployment Wizard
on page 115.
Table 37-2 Checking the connection between the management server and the
client
Look on the client to see if the You can download and view the troubleshooting file on the
client connects to the client to verify the communication settings.
management server
See Symantec Endpoint Protection client status icons
on page 160.
Test the connectivity between You can perform several tasks to check the connectivity
the client and the between the client and the management server.
management server
See Enabling and viewing the Access log to check
whether the client connects to the management server
on page 720.
Ping the management server from the client computer.
See Using the ping command to test the connectivity to
the management server on page 722.
Use a Web browser on the client computer to connect to
the management server.
See Using a browser to test the connectivity to Symantec
Endpoint Protection Manager on the Symantec Endpoint
Protection client on page 722.
Troubleshooting installation and communication problems 718
Troubleshooting connectivity problems between Symantec Endpoint Protection Manager and the Symantec Endpoint
Protection client
Table 37-2 Checking the connection between the management server and the
client (continued)
Check that the management If you reinstalled Symantec Endpoint Protection Manager,
server uses the correct server check that the correct server certificate was applied. If the
certificate management server uses a different server certificate, the
server still downloads content, but the client cannot read the
content. If the management server uses the wrong server
certificate, you must update it.
The client does not display the green dot in the taskbar,
which indicates that it does not communicate with the
management server.
See Checking whether the client is connected to the
management server and is protected on page 158.
The client does not receive policy updates from the
management server.
The management server shows that it does connect with
the client.
See Symantec Endpoint Protection client status icons
on page 160.
Check for any network You should verify that there are no network problems by
problems checking the following items:
Table 37-2 Checking the connection between the management server and the
client (continued)
Check the debug logs on the You can use the debug log on the client to determine if the
client client has communication problems.
Recover lost client If the clients have lost the communication with a management
communication server, you can use a tool to recover the communication file.
Enabling and viewing the Access log to check whether the client
connects to the management server
You can view the Apache HTTP server Access log on the management server to
check whether the client connects to the management server. If the client connects,
the client's connection problem is probably not a network issue. Network issues
include the firewall blocking access, or networks not connecting to each other.
You must first enable the Apache HTTP server Access log before you can view the
log.
Note: Disable the log after you view it because the log uses unnecessary CPU
resources and hard disk space.
2 In the httpd.conf file, remove the hash mark (#) from the following text string
and then save the file:
#CustomLog "logs/access.log" combined
3 Stop and restart the Symantec Endpoint Protection Manager service and
Apache HTTP server:
See Stopping and starting the management server service on page 145.
See Stopping and starting the Apache Web server on page 721.
To view the Apache HTTP server Access log
1 On the management server, open the file C:\Program Files
(x86)\Symantec\Symantec Endpoint Protection
Manager\apache\logs\access.log.
2 Look for a client computer's IP address or host name, which indicates that
clients connect to the Apache HTTP server.
3 Disable the Apache HTTP server Access log.
management server generates the logs (ersecreg.log and exsecars.log). You can
view these logs to troubleshoot client and server communication.
See Troubleshooting connectivity problems between Symantec Endpoint Protection
Manager and the Symantec Endpoint Protection client on page 716.
See Checking the debug log on the client computer on page 723.
To check the inbox logs on the management server
1 On the management server, under
HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint
Protection\SEPM, set the DebugLevel value to 3.
The inbox appears in the following default location on the management server
computer: C:\Program Files (x86)\Symantec\Symantec Endpoint
Protection Manager\data\inbox\log
Note: You can also replace the Sylink.xml file by redeploying a client installation
package. Use this method for a large number of computers, for computers that you
cannot physically access easily or computers that require administrative access.
See Restoring client-server communications with Communication Update Package
Deployment on page 167.
When you run the SylinkDrop tool, it can also perform the following tasks:
Migrates or moves clients to a new domain or management server.
Restores the communication breakages to the client that cannot be corrected
on the management server.
Moves a client from one server to another server that is not a replication partner.
Moves a client from one domain to another.
Converts an unmanaged client to a managed client.
Troubleshooting installation and communication problems 725
Troubleshooting connectivity problems between Symantec Endpoint Protection Manager and the Symantec Endpoint
Protection client
You can write a script with the tool to modify communication settings for large
numbers of clients.
See About managed and unmanaged clients on page 126.
See Troubleshooting connectivity problems between Symantec Endpoint Protection
Manager and the Symantec Endpoint Protection client on page 716.
To restore client-server communication settings by using the SylinkDrop tool for
Windows
1 In the console, export the communications file from the group that connects to
the management server to which you want the client computer to connect. The
communications file is the Sylink.xml file.
See Exporting the client-server communications file (Sylink.xml) manually
on page 168.
2 Copy the communication file to the client computer.
You can either save the file to a network location, email it to the user on the
client computer, or copy it to removable media.
3 Do one of the following tasks:
In the full product installation file from FileConnect, locate
Tools\SylinkDrop\SylinkDrop.exe.
See A guide to Endpoint Protection files on FileConnect.
On the computer that runs the management server, locate C:\Program
Files (x86)\Symantec\Symantec Endpoint
Protection\Version.Number\Bin\SylinkDrop.exe
You can run the tool remotely or save it and then run it on the client computer.
For information on the command-line options, in the \Tools\SylinkDrop
folder, click the readme file.
4 In the Sylink Drop dialog box, click Browse, and locate the .xml file you
deployed in step 2 to the client computer.
5 Click Update Sylink.
6 When you see a confirmation dialog box, click OK.
7 In the Sylink Drop dialog box, click Exit.
Troubleshooting installation and communication problems 726
Troubleshooting communication problems between Symantec Endpoint Protection Manager and the console or the
database
Test the connectivity You can verify that the management server and the database
between the database and communicate properly.
the management server.
See Verifying the connection with the database on page 727.
Check that the management If you cannot log on to the management server's remote
server heap size is correct. console, you may need to increase the Java heap size. You
may also see an out-of-memory message in the scm-server
log.
Check that the management You can check whether the management server runs multiple
server is not running multiple software packages that use different versions of PHP. PHP
versions of PHP. checks for a global configuration file (php.ini). If there are
multiple configuration files, you must force each product to
use its own interpreter. When each product uses the correct
version of PHP associated with it, the management server
operates properly.
Check the system You can check whether both the client and the management
requirements. server run the minimum or the recommended system
requirements.
6 Click Login.
7 On the Login tab, in the User ID text box, type dba.
8 In the Password text box, type the password for the database.
This password is the one that you entered for the database when you installed
the management server.
9 Click Database.
10 On the Database tab, in the Server name text box, type
<\\servername\instancename>.
If you use the English version of Symantec Endpoint Protection Manager, type
the default, sem5. Otherwise, leave the Server name text box blank.
11 On the ODBC tab, click Test Connection and verify that it succeeds.
12 Click OK.
13 Click OK.
To verify communication to the SQL database
1 On the management server, click Start > Control Panel > Administrative
Tools.
2 In the Administrative Tools dialog box, double-click Data Sources (ODBC).
3 In the ODBC Data Source Administrator dialog box, click System DSN.
4 On the System DSN tab, double-click SymantecEndpointSecurityDSN.
5 In the Server drop-down list, verify that the correct server and instance is
selected.
6 Click Next.
7 For Login ID, type sa.
Troubleshooting installation and communication problems 729
Client and server communication files
8 In the Password text box, type the password for the database.
This password is the one that you entered for the database when you installed
the management server.
9 Click Next and make sure that sem5 is selected for the default database.
10 Click Next.
11 Click Finish.
12 Click Test Data Source and look for the result that states:
TESTS COMPLETED SUCCESSFULLY!
sylink.xml Stores the global communication settings. This file is for internal use
only and should not be edited. It contains settings from the Symantec
Endpoint Protection Manager. If you edit this file, most settings will be
overwritten by the settings from the management server the next time
the client connects to the management server.
SerState.dat An encrypted file that stores information about the user interface, such
as the client's screen size, whether the client's console for Network and
Host Exploit Mitigation appears, and whether Windows services appear.
When the client starts, it reads this file and returns to the same user
interface state as before it was stopped.
name, module, and other error details. Symantec uses this information to help
resolve product issues.
In 12.1.6 and earlier, you had to physically or remotely access the client to collect
the logs and send them to Technical Support if requested.
To enable the management server to send information to Symantec about a client
that crashed
1 In the console, click Admin > Servers > Local Site (My Site) > Edit Site
Properties.
2 On the Data Collection tab, make sure that Let clients send troubleshooting
information to Symantec to resolve product issues faster is checked, and
then click OK.
Chapter 38
Troubleshooting reporting
issues
This chapter includes the following topics:
Note: If you specify zero, or leave the fields blank, the default setting is used.
If you get CGI or terminated process errors, you might want to change the following
parameters:
max_execution_time parameter in the Php.ini file
The Apache timeout parameters, FcgidIOTimeout, FcgidBusyTimeout, and
FcgidIdleTimeout, in the httpd.conf file
To change the max_execution_time parameter in Php.ini
1 Browse to following default folder on the Symantec Endpoint Protection Manager
server:
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\Php
2 Right-click the Php.ini file, and then click Properties.
3 On the General tab, uncheck Read-only.
4 Click OK.
5 Open the Php.ini file with a plain-text editor, such as Notepad.
Troubleshooting reporting issues 734
Accessing reporting pages when the use of loopback addresses is disabled
6 Locate the max_execution_time entry and increase the value (in seconds).
For example, to increase the timeout to 10 minutes, change the line to the
following value:
max_execution_time=600
7 Save and close the Php.ini file.
8 Right-click the Php.ini file, and then click Properties.
9 On the General tab, check Read-only.
10 Click OK.
To change Apache timeout parameters in httpd.conf
1 Browse to the following default folder on the Symantec Endpoint Protection
Manager server:
C:\Program Files (x86)\Symantec\Symantec Endpoint Protection
Manager\apache\conf
2 Open the httpd.conf file with a plain-text editor, such as Notepad.
3 Locate the following lines and increase the values (in seconds):
FcgidIOTimeout 1800
FcgidBusyTimeout 1800
FcgidIdleTimeout 1800
What you should know before you run Power Eraser from the Symantec Endpoint
Protection Manager console
Tasks to perform when you need to run Power Eraser from the Symantec
Endpoint Protection Manager console
Warning: You should run Power Eraser only in emergency situations, such as when
computers exhibit instability or have a persistent problem. Typically, you run Power
Eraser on a single computer or small group of computers. You should not run other
applications at the same time. In some cases, a regular scan event alerts you to
run a Power Eraser analysis.
Note: Make sure that you do not run Power Eraser from the console and locally
with the SymDiag tool at the same time. Otherwise, you might negatively affect the
computer performance.
Power Eraser consumes a large amount of computer resources. Power Eraser files
can also consume a large amount of space on the computer if you run Power Eraser
on a computer multiple times. During each analysis, Power Eraser saves detection
information in the files that it stores in the Symantec Endpoint Protection application
folder. The files are purged when the client purges the logs.
You can choose to remove the detection or mark the detection as safe (leave
alone). You can also restore (undo) a removed detection.
Power Eraser can run in regular mode or in rootkit mode. The rootkit mode requires
a restart before the scan launches. Also, if you choose to remove any Power Eraser
detection, the computer must be restarted for the remediation to complete.
days. You can modify the log retention setting, or after the events expire, you
can run another scan and re-populate the logs.
See Modifying log handling and notification settings on Windows computers
on page 466.
Restart options
You can configure the restart settings specifically for rootkit analysis when you
choose to run Power Eraser in rootkit detection mode. The administrator must
have restart privileges. After you choose to remove a Power Eraser detection,
the computer uses the group restart settings. Power Eraser does not use the
rootkit restart settings to restart and complete a remediation.
See Restarting the client computers from Symantec Endpoint Protection
Manager on page 124.
Reputation queries
Power Eraser uses the Symantec Insight server in the cloud when it scans and
makes decisions about files. If you disable reputation queries, or if the client
computer cannot connect to the Insight server, Power Eraser cannot use
Symantec Insight. Without Symantec Insight, Power Eraser makes fewer
detections, and the detections it makes are more likely to be false positives.
Reputation queries are enabled when the Allow Insight lookups for threat
detection option is enabled. The option is enabled by default.
Submissions
Symantec Endpoint Protection sends the information about Power Eraser
detections to Symantec when the Antivirus detections option is enabled. The
option is enabled by default.
See Understanding server data collection and client submissions and their
importance to the security of your network on page 474.
See Troubleshooting computer issues with the Symantec Diagnostic Tool
(SymDiag) on page 715.
Warning: Use Power Eraser carefully. The analysis is aggressive and prone to false
positives.
See What you should know before you run Power Eraser from the Symantec
Endpoint Protection Manager console on page 736.
You can run Power Eraser from Symantec Endpoint Protection Manager on Windows
client computers only.
Note: Power Eraser runs in one of two modes: without rootkit detection or with
rootkit detection. The rootkit detection analysis requires a restart. The administrator
must have restart privileges to run Power Eraser with rootkit detection.
Table 39-1 Tasks to perform when you need to run Power Eraser from the
Symantec Endpoint Protection Manager console
Task Description
Set administrator privileges to run Power To run Power Eraser on client computers, administrators must have the
Eraser following command access rights:
Set the log retention policy The log retention setting affects how long the events are available for you
to perform the Power Eraser remediate and restore actions. You can modify
the log retention setting if you want more time to consider these actions.
Alternately, you can run Power Eraser again to re-populate the logs.
The log retention setting is part of the miscellaneous options in the Virus and
Spyware Protection policy.
Make sure that your clients have Internet Your client computers require Internet access so that Power Eraser can use
connectivity Symantec Insight reputation data to make decisions about potential threats.
Intermittent or non-existent Internet access means that Power Eraser cannot
use Symantec Insight. Without Symantec Insight, Power Eraser makes fewer
detections, and the detections it produces are more likely to be false positives.
Using Power Eraser to troubleshoot difficult and persistent threats 741
Tasks to perform when you need to run Power Eraser from the Symantec Endpoint Protection Manager console
Table 39-1 Tasks to perform when you need to run Power Eraser from the
Symantec Endpoint Protection Manager console (continued)
Task Description
Start a Power Eraser analysis on a client Choose whether to run Power Eraser in regular mode or rootkit mode.
computer from Symantec Endpoint You can issue the Power Eraser command from several places in Symantec
Protection Manager Endpoint Protection Manager:
Clients page
Computer Status log
Risk log
Note: A user on the client computer cannot run Power Eraser directly from
the client user interface. Power Eraser is available as part of the SymDiag
tool. However, if a client user runs the tool, the resulting logs that include
Power Eraser detections are not sent to Symantec Endpoint Protection
Manager.
You can view the status of the command in the Computer Status log. You
can filter the log so that only Power Eraser commands appear for ease of
viewing.
After you run Power Eraser, you view the results in the Scan log or the Risk
log. The Scan log shows whether or not scan results are pending.
Cancel a Power Eraser command or To cancel the Power Eraser command, use the Command Status log.
action on a client computer
Note: You cannot cancel Power Eraser running in rootkit mode after the
restart prompt appears on the client computer. After the restart, only the
computer user can cancel Power Eraser if the Virus and Spyware Protection
policy lets users cancel scans.
If you cancel the Power Eraser command, you also cancel any pending
actions that are associated with any Power Eraser analysis, including any
remediation or undo actions.
See Running commands on client computers from the console on page 244.
Using Power Eraser to troubleshoot difficult and persistent threats 742
Tasks to perform when you need to run Power Eraser from the Symantec Endpoint Protection Manager console
Table 39-1 Tasks to perform when you need to run Power Eraser from the
Symantec Endpoint Protection Manager console (continued)
Task Description
View Power Eraser detections from the You can view Power Eraser detections from the following logs in Symantec
logs Endpoint Protection Manager:
Scan log
The Scan log has a Scan type filter to display only Power Eraser results.
The view also indicates whether or not scan results are pending. You
can select Detections in the filtered view to display the Power Eraser
Detections view.
Risk log
The Risk log provides a similar filter for Power Eraser detections.
However, the Risk log does not show whether or not scan results are
pending.
Computer Status log
The Computer Status log might include report icons in the Infected
column. The event details icon links to a report that shows all current
threats that cannot be remediated. The report includes log-only detections
and unresolved detections. The report might recommend that you run
Power Eraser on some computers.
A Power Eraser icon links to a report that shows any Power Eraser
detections on the computer that require administrator action.
These icons also appear in the Health State column on the Clients page.
Check for the notifications that By default, the administrator receives a notification when a regular scan
recommend that you run Power Eraser cannot repair an infection and Power Eraser is recommended. You can check
on client computers for the Power Eraser recommended notification on the Monitors >
Notifications page.
View Power Eraser detections on the You can access reports about Power Eraser detections on the Command
Command Status page Status page.
An event details icon appears in the Completion Status column. The icon
links to a report that shows information about detections that were made by
the Start Power Eraser Analysis command and any other scan command.
The command status details option gives you information about a particular
scan. You can click on the event details icon to get information about a
particular client computer.
See Running commands on client computers from the console on page 244.
Using Power Eraser to troubleshoot difficult and persistent threats 743
Starting Power Eraser analysis from Symantec Endpoint Protection Manager
Table 39-1 Tasks to perform when you need to run Power Eraser from the
Symantec Endpoint Protection Manager console (continued)
Task Description
View Power Eraser detections from the You can access reports about Power Eraser detections from the Clients tab
Clients tab on the Clients page.
A Power Eraser icon links to a report that shows any Power Eraser detections
on the computer that require administrator action.
Remediate or restore Power Eraser Unlike other Symantec Endpoint Protection scans, Power Eraser does not
detections from the Scan log or Risk log automatically remediate detected threats. Power Eraser analysis is aggressive
in Symantec Endpoint Protection and might detect many false positives. After you determine that the detection
Manager requires remediation, you must initiate a remediation manually.
You can also undo (restore) a Power Eraser detection that you remediated.
Note: When you run Power Eraser in rootkit mode, and the restart option message
appears on the client computer, the administrator or the user cannot cancel Power
Eraser. After the restart, the user can cancel Power Eraser if the Virus and Spyware
Protection policy lets users cancel scans.
To start Power Eraser analysis from the Clients page in Symantec Endpoint
Protection Manager
1 On the Clients page, on the Clients tab, select the computers that you want
to analyze.
If you select many computers, you might adversely affect the performance of
your network.
2 Under Tasks, click Run command on computers, and then click Start Power
Eraser Analysis.
3 In the Choose Power Eraser dialog, select whether or not you want Power
Eraser to run in rootkit mode. For rootkit mode, you can set the restart options.
You must have administrator privileges to set restart options and run a rootkit
scan.
4 Click OK.
Power Eraser runs on the select computers. You can cancel the command on
the Command Status tab on the Monitors page.
To start Power Eraser analysis from the Computer Status log in Symantec Endpoint
Protection Manager
1 In the console, in the sidebar, click Monitors and select the Logs tab.
2 In the Log type list box, select the Computer Status log, and then click View
Log.
3 Select the computers on which you want to run Power Eraser and select Start
Power Eraser Analysis from the Commands drop-down box.
If you select many computers, you might adversely affect the performance of
your network.
4 Click Start.
Using Power Eraser to troubleshoot difficult and persistent threats 745
Responding to Power Eraser detections
5 In the Choose Power Eraser dialog, select whether or not you want Power
Eraser to run in rootkit mode. For rootkit mode, you can set the restart options.
You must have administrator privileges to set restart options and run a rootkit
scan.
6 Click OK.
Power Eraser runs on the selected computers. You can cancel the command
on the Command Status tab.
To start Power Eraser analysis from the Risk log in Symantec Endpoint Protection
Manager
1 In the console, in the sidebar, click Monitors and select the Logs tab.
2 In the Log type list box, select the Risk log, and then click View Log
3 Select the risks on which you want to run Power Eraser. In the Event Action
column, you might see an alert to run Power Eraser.
You can run Power Eraser on any risk in the log.
4 Select Start Power Eraser Analysis from the Action drop-down or the Action
column.
5 Click Start.
6 In the Choose Power Eraser dialog, select whether or not you want Power
Eraser to run in rootkit mode. For rootkit mode, you can set the restart options.
You must have administrator privileges to set restart options and run a rootkit
scan.
7 Click OK.
Power Eraser runs on the computers that are infected with the selected risks.
You can cancel the command on the Command Status tab.
See What you should know before you run Power Eraser from the Symantec
Endpoint Protection Manager console on page 736.
To respond to Power Eraser detections
1 Make sure that the Power Eraser analysis completed.
The Computer Status log includes an icon that indicates the scan is
complete.
The Scan log shows whether or not Power Eraser finished the analysis.
2 In the Risk log or on the Scan log > View detections page, select a single
detection or multiple detections to which to apply an action.
Next to a particular risk that is labeled Potential risk found (Pending
admin action), click the plus icon in the Action column.
Select multiple risks that are labeled Potential risk found (Pending admin
action), and then select the action from the Action drop-down menu.
Note: This action changes the event action to Left alone by Admin in the
management console logs only. The acknowledgement does not update
the corresponding event action on the client. The client log view continues
to show the event action as Pending analysis.
4 If you selected an action from the Action drop-down menu, click Apply.
If you selected Ignore risk that Power Eraser detected, the detection now appears
as Potential risk found (left alone).
You can restore a removed detection that is labeled Potential risk found
(Removed) by selecting the Restore risk that Power Eraser deleted action.
Using Power Eraser to troubleshoot difficult and persistent threats 747
Responding to Power Eraser detections
Download Protection Download Protection is part of Auto-Protect and gives Symantec Endpoint
Protection the ability to track URLs. The URL tracking is required for several
policy features.
Even if you disable Download Insight, the Automatically trust any file
downloaded from an intranet website option continues to function.
If you disable Download Insight, you disable portal detections. This means
that Auto-Protect and scheduled and on-demand scans evaluate all files as
non-portal files and use a sensitivity level that is determined by Symantec.
Insight Lookup (12.1.x clients) and cloud Insight Lookup uses the Symantec Insight reputation database in the cloud
protection to make decisions about files that were downloaded from a supported portal.
Starting in 14:
See How Symantec Endpoint Protection uses the Intelligent Threat Cloud
Service on page 398.
Cloud scans and 12.1.x Insight Lookup have the following feature
dependencies:
Note: (12.1.x clients only) Cloud lookups do not apply to right-click scans
of folders or drives on your client computers. However, cloud lookups do
apply to right-click scans of selected portal files.
Browser Intrusion Prevention Download Protection must be installed. Download Insight can be enabled
or disabled.
Trusted Web Domain exception The exception is only applied if Download Protection is installed.
See What you should know before you run Power Eraser from the Symantec
Endpoint Protection Manager console on page 736.
Generic Exploit Mitigation Intrusion prevention must be installed. Intrusion prevention can be enabled
or disabled.
System lockdown
Tamper Protection
**You can only run these commands when viewing logs in Symantec Endpoint
Protection Manager.
See What are the commands that you can run on client computers? on page 241.
See Using Intelligent Updater files to update content on Windows computers
on page 209.
See Tasks to perform when you need to run Power Eraser from the Symantec
Endpoint Protection Manager console on page 739.
See Monitoring the applications and services that run on client computers
on page 318.
See Managing the client-server connection on page 157.
See Restoring client-server communications with Communication Update Package
Deployment on page 167.
See Upgrading client software with AutoUpgrade on page 150.
Windows Mac
Standard clients receive a delta upgrade package that Mac clients always receive a full install package for
Symantec Endpoint Protection Manager generates. upgrade.
Embedded and dark network clients receive the full install
package for an upgrade.
Windows client installation settings offer more configuration Mac client installation settings offer configuration options
options, such as a custom installation folder, and the option only for restart and upgrade. You cannot customize the
to uninstall existing security software. installation folder. Installation logging always writes to
/tmp/sepinstall.log.
In the restart options for Client Install Settings, you can The restart options for Client Install Settings do not
choose not to restart the Windows client computer after include an option to not restart. Mac client computers
the upgrade completes. always restart after the upgrade completes.
When you run the Upgrade Clients with Package wizard, You cannot modify the feature set on the Mac client.
you can modify the feature set on the Windows client.
You can upgrade to the latest version of Symantec AutoUpgrade is not supported for an upgrade from version
Endpoint Protection from any earlier version, based on the 12.1.6 or earlier. For example, you cannot upgrade from
supported upgrade path. 12.1.6 to 14 using AutoUpgrade.
Table A-5 Virus and Spyware Protection policy settings based on platform
Table A-5 Virus and Spyware Protection policy settings based on platform
(continued)
Define remediation actions for Clean (only applies to Repair infected files Clean (only applies to
detections malware) Quarantine files that malware)
Quarantine cannot be repaired Quarantine
Delete Delete
Leave alone (log only) Leave alone (log only)
Table A-5 Virus and Spyware Protection policy settings based on platform
(continued)
Bloodhound Yes No No
SONAR Yes No No
Suspicious Behavior
Detection (14)
vShield-enabled (12.1.6
and earlier)
See Preventing and handling virus and spyware attacks on client computers
on page 388.
Client feature comparison tables 761
Intrusion Prevention policy settings based on platform
**You can set up the Apache web server that installs with Symantec Endpoint
Protection Manager as a reverse proxy for LiveUpdate content. See:
Client feature comparison tables 762
LiveUpdate policy settings based on platform
Enabling Mac and Linux clients to download LiveUpdate content using the Apache
Web server as a reverse proxy
See Managing intrusion prevention on page 367.
Run Intelligent Updater to Virus and spyware Virus and spyware Virus and spyware
update content definitions definitions definitions
SONAR (12.1.3) Only for legacy clients
IPS definitions (12.1.3) (12.1.3 and earlier)
Use standard HTTP headers Yes, by default Yes, by default Yes, by default
(12.1.6 and earlier)
** You can set up the Apache web server that installs with Symantec Endpoint
Protection Manager as a reverse proxy for LiveUpdate content. See:
Enabling Mac and Linux clients to download LiveUpdate content using the Apache
Web server as a reverse proxy
See Comparison of Symantec Endpoint Protection Windows client type versions
on page 766.
See How to update content and definitions on the clients on page 172.
See Using Intelligent Updater files to update content on Windows computers
on page 209.
Windows Mac
Device control works based only on Class ID (GUID) and Device control works at the file system level. Volume-level
Device ID. tasks (such as those that can be performed via command
line or Disk Utility) are unaffected.
Device control performs wildcard matches on Class ID or Device control performs regular expression (regexp)
Device ID with the star character or asterisk (*). matches, and are limited to the following specific
operations:
. (dot)
\ (backslash)
[set], [^Set] (set)
* (star character or asterisk)
+ (plus)
Client feature comparison tables 765
Device Control differences based on platform
Windows Mac
The Hardware Device list includes many common device You can choose from only five device types:
types by default.
Thunderbolt
CD/DVD
USB
FireWire
Secure Digital (SD) Card
You can add additional custom devices to the Hardware You cannot add additional custom devices.
Device list by Class ID or Device ID.
Devices to block (or to exclude from blocking) are derived Devices to block (or exclude from blocking) are selected
only from the Hardware Device list. The list includes those from the device types noted above. The vendor, model,
default common device types, as well as custom devices and serial number can be left blank, or can be defined by
you may have added. regular expression (regexp) queries. You can use regular
expressions to define a range of similar devices, such as
from different vendors, model, serial number ranges, and
so on.
You can add more than one device type at a time. You can only add one device type at a time.
The actions to take are to block, or to exclude from The actions to take are to block, or to exclude from
blocking (allow). blocking (allow) with mount permissions.
Read only
Read and write
Read and execute
Read, write, and execute
You can customize the client notification for device control. You cannot customize the client notification for device
control.
Uses virus and spyware definitions in the cloud. Cannot use virus and spyware definitions in the cloud,
Installs only the latest virus and spyware definitions on but uses reputation lookups for Download Insight and
disk. SONAR.
The standard client is approximately 80 percent to 90 Installs the full set of virus and spyware definitions.
percent smaller on disk than legacy standard or dark Handles AutoUpgrade with deltas rather than full
network Windows clients. installation.
Handles AutoUpgrade with deltas rather than full
installation.
Uses virus and spyware definitions in the cloud. Cannot use virus and spyware definitions in the cloud.
Installs only the latest virus and spyware definitions. Installs only the latest virus and spyware definitions.
The client is approximately 80 percent to 90 percent The legacy client is approximately 80 percent to 90
smaller on disk than dark network Windows clients. percent smaller on disk than legacy standard Windows
The embedded/VDI client includes more size clients.
optimizations than the standard client: This client provides slightly less protection than the
The installer cache does not save after installation 12.1.x standard client. Symantec recommends that you
completes. This change means you cannot remove install and enable all protection features, which include
or modify the installation through the Control Panel the firewall, Download Insight, Generic Exploit
unless you first copy the installation package to the Mitigation, intrusion prevention, and SONAR. For the
client computer. highest level of security, use the system lockdown
The embedded client employs NTFS compression feature.
on more folders than the standard client. Includes the same size optimizations as the newer
Handles AutoUpgrade with full installation packages; embedded client.
cannot use deltas. Handles AutoUpgrade with full installation packages;
cannot use deltas
Introduced in 12.1.6.
Appendix B
Customizing and deploying
the Windows client
installation by using
third-party tools
This appendix includes the following topics:
Installing Windows clients with an Active Directory Group Policy Object (GPO)
Tool Description
Windows Installer command-line The Symantec client software installation packages are Windows Installer (MSI)
tools files that you can configure by using the standard Windows Installer options. You
can use the environment management tools that support MSI deployment, such
as Active Directory or Tivoli, to install clients on your network. You can configure
how the Windows Security Center interacts with the unmanaged client.
See Command-line examples for installing the Windows client on page 777.
Tool Description
Microsoft SMS 2003 You can install the client by using Microsoft Systems Management Server.
See Installing Windows clients with Microsoft SCCM/SMS on page 777.
Windows Active Directory You can use a Windows Active Directory Group Policy Object if the client
computers and are members of a Windows Active Directory domain. The client
computers must also use a supported Windows operating system.
See Installing Windows clients with an Active Directory Group Policy Object
(GPO) on page 778.
See Uninstalling client software with an Active Directory Group Policy Object
on page 783.
to deploy a package, you can customize the installation. You can use the standard
Windows Installer parameters and the Symantec-specific features and properties.
To use the Windows Installer, elevated privileges are required. If you try the
installation without elevated privileges, the installation may fail without notice.
For the most up-to-date list of Symantec installation commands and parameters,
see the article: MSI command line reference for Symantec Endpoint Protection.
[CUSTOM_SMC_CONFIG]
InstallationLogDir=
DestinationDirectory=
[FEATURE_SELECTION]
Core=1
SAVMain=1
Download=1
OutlookSnapin=1
Pop3Smtp=0
NotesSnapin=0
PTPMain=1
DCMain=1
TruScan=1
Customizing and deploying the Windows client installation by using third-party tools 771
Symantec Endpoint Protection command-line client installation properties
Note: The features are indented to show hierarchy. The features are not indented
inside the Setaid.ini file. Feature names in Setaid.ini are case-sensitive.
Feature values that are set to 1 install the features. Feature values that are set to
0 do not install the features. You must specify and install the parent features to
successfully install the client features.
Be aware of the following additional setaid.ini settings that map to MSI properties
for Symantec Endpoint Protection client installation:
DestinationDirectory maps to PRODUCTINSTALLDIR
KeepPreviousSetting maps to MIGRATESETTINGS
AddProgramIntoStartMenu maps to ADDSTARTMENUICON
See Symantec Endpoint Protection command-line client features on page 772.
See Symantec Endpoint Protection command-line client installation properties
on page 771.
See Windows Installer parameters on page 773.
Property Description
RUNLIVEUPDATE=val Determines whether LiveUpdate is run as part of the installation, where val is one of the
following values:
By default, all Symantec Endpoint Protection clients in a group receive the latest versions
of all content and all product updates. If the clients are configured to get updates from a
management server, the clients receive only the updates that the server downloads. If the
LiveUpdate Content policy allows all updates, but the management server does not download
all updates, the clients receive only what the server downloads.
ENABLEAUTOPROTECT= Determines whether File System Auto-Protect is enabled after the installation is complete,
val where val is one of the following values:
Property Description
CACHE_INSTALLER=val Determines whether the installation files cache on the client, where val is one of the following
values:
MIGRATESETTINGS= Determines the status of preserved settings in an upgrade scenario, where val is one of
val the following values:
ADDSTARTMENUICON= Determines whether or not to add the program to the Start Menu folder, where val is one
val of the following values:
Pop3Smtp Installs the protection for POP3 and SMTP mail. SAVMain
Available only on 32-bit systems.
Parameter Description
Sep.msi (32-bit) The installation file for the Symantec Endpoint Protection client. If the file name contains
spaces, enclose the file name in quotations when used with /I and /x.
Sep64.msi (64-bit)
Required
Required
/I ".msi file name" Install the specified file. If the file name contains spaces, enclose the file name in
quotations. If the file is not in the same directory from which you execute Msiexec,
specify the path name. If the path name contains spaces, enclose the path name in
quotations. For example, msiexec.exe /I "C:\path to\Sep.msi"
Required
Optional
/qb Install with a basic user interface that shows the installation progress.
Optional
/l*v logfilename Create a verbose log file, where logfilename is the name of the log file you want to
create.
Optional
PRODUCTINSTALLDIR=path Designate a custom path on the target computer where path is the specified target
directory. If the path includes spaces, enclose the path in quotation marks.
Note: The default directory for 32-bit computers is C:\Program
Files\Symantec\Symantec Endpoint Protection. The default directory for 64-bit
computers is C:\Program Files (x86)\Symantec\Symantec Endpoint Protection.
Optional
Customizing and deploying the Windows client installation by using third-party tools 775
Windows Security Center properties
Parameter Description
SYMREBOOT=value Controls a computer restart after installation, where value is a valid argument.
The valid arguments include the following:
Optional
Note: Use ReallySuppress to suppress a restart when you perform a silent uninstallation
of Symantec Endpoint Protection client.
ADDLOCAL= feature Select the custom features to be installed, where feature is a specified component or
list of components. If this property is not used, all applicable features are installed by
default, and Auto-Protect email clients are installed only for detected email programs.
To add all appropriate features for the client installations, use the ALL command as in
ADDLOCAL=ALL.
Optional
REMOVE=feature Uninstall the previously installed program or a specific feature from the installed
program, where feature is one of the following:
Feature: Uninstalls the feature or list of features from the target computer.
ALL: Uninstalls the program and all of the installed features. All is the default if a
feature is not specified.
Optional
Note: These properties apply to Windows XP Service Pack 3 only. They do not
apply to clients that run Windows Vista, or Windows 7 or later, except for the
WSCAVUPTODATE property.
Windows Security Center was renamed to Action Center in Windows 7/8 and
Security and Maintenance in Windows 10.
Property Description
WSCAVALERT=val Configures the antivirus alerts for WSC where val is one of the following values:
0: Enable.
1: Disable (default).
2: Do not control.
WSCFWALERT=val Configures the firewall alerts for WSC where val is one of the following values:
0: Enable.
1: Disable (default).
2: Do not control.
WSCAVUPTODATE=val Configures the WSC out-of-date time for antivirus definitions where val is one of the
following values:
DISABLEDEFENDER=val Determines whether to disable Windows Defender during installation, where val is one
of the following values:
Silently install all of the Symantec Endpoint Protection msiexec /I SEP.msi PRODUCTINSTALLDIR=C:\SFN
client components with default settings to the directory SYMREBOOT=ReallySuppress /qn /l*v
C:\SFN. c:\temp\msi.log
Suppress a computer restart, and create a verbose log
file.
Note: This topic also applies to Microsoft Systems Management Server (SMS).
Note: This note applies to SMS version 2.0 and earlier: If you use SMS, turn off the
Show Status Icon On The Toolbar For All System Activity feature on the clients
in the Advertised Programs Monitor. In some situations, Setup.exe might need
to update a shared file that is in use by the Advertised Programs Monitor. If the file
is in use, the installation fails.
Warning: You should use a managed client installation package that you exported
from Symantec Endpoint Protection Manager. If you use the client installation
packages from the product download or the installation file, you deploy unmanaged
clients. Unmanaged clients install with default settings and do not communicate
with a management server.
See Installing clients with Save Package on page 53.
Table B-7 Process for installing the client using Microsoft System Center
Configuration Manager / Systems Management Server
Step Description
Step 2 Create a source directory and copy the Symantec client installation package
into that source directory. For example, you would create a source directory
and copy the Setup.exe file that you exported from Symantec Endpoint
Protection Manager.
Step 3 In SCCM/SMS, create a custom package, name the package, and identify the
source directory as part of the package.
Step 4 Configure the Program dialog box for the package to specify the executable
that starts the installation process, and possibly specify the MSI with parameters.
For more information on using SCCM/SMS, see the Microsoft documentation that
is appropriate for your version.
You should confirm that your DNS server is set up correctly before deployment.
The correct setup is required because Active Directory relies on your DNS server
for computer communication. To test the setup, you can ping the Windows Active
Directory computer, and then ping in the opposite direction. Use the fully qualified
domain name. The use of the computer name alone does not call for a new DNS
lookup. Use the following format:
ping computername.fullyqualifieddomainname.com
Warning: You should use a managed client installation package that you exported
from Symantec Endpoint Protection Manager. If you use the client installation
packages from the product download or the installation file, you deploy unmanaged
clients. Unmanaged clients install with default settings and do not communicate
with a management server.
See Installing clients with Save Package on page 53.
Table B-8 Steps for installing the client software by using Active Directory
Group Policy Object
Step Action
Step 1 Export the managed client installation package with the option Separate
files (required for .MSI).
Step 2 Stage the folder of installation files. For example, copy the managed client
installation package into a shared folder on which you have set the correct
permissions to allow access.
You should also test GPO installation with a small number of computers
before the production deployment. If you do not configure DNS properly,
GPO installations can take an hour or more.
See Uninstalling client software with an Active Directory Group Policy Object
on page 783.
Customizing and deploying the Windows client installation by using third-party tools 780
Installing Windows clients with an Active Directory Group Policy Object (GPO)
9 In the Open dialog box, type the Universal Naming Convention (UNC) path
that points to and contains the MSI package.
Use the format as shown in the following example:
\\server name\SharedDir\Sep.msi
10 Click Open.
11 In the Deploy Software dialog box, click Assigned, and then click OK.
The package appears in the right pane of the Group Policy Object Editor window
if you select Software Installation.
To configure administrative templates for the software package
1 In the Group Policy Object Editor window, in the console tree, display and
enable the following settings:
Computer Configuration > Administrative Templates > System > Logon
> Always wait for the network at computer startup and logon
Computer Configuration > Administrative Templates > System > Group
Policy > Software Installation policy processing
User Configuration > Administrative Templates > Windows
Components > Windows Installer > Always install with elevated
privileges
Note: If you enabled User Account Control (UAC) on the client computers,
you must also enable Computer Configuration > Administrative
Templates > Windows Components > Windows Installer > Always
install with elevated privileges to install Symantec client software with a
GPO. You set these options to allow all Windows users to install Symantec
client software.
Note: Packages that are exported with the Symantec Endpoint Protection Manager
console are managed and already include a Sylink.xml file. To export a new
managed package that you can deploy with a Group Policy Object, use the Client
Deployment Wizard. Click Save Package, and check Separate Files (required
for .MSI) when prompted.
See Installing clients with Save Package on page 53.
Note: You should create at least one new group with the management console
before you export the Sylink.xml file. If you do not, the clients appear in the
Default group.
You can also use the installation folder for an unmanaged client package that
you previously exported as separate files.
3 Copy Sylink.xml to the installation folder. Replace the existing Sylink.xml file
when prompted.
Parameter Description
Returns 0, -1
smc -stop* Stops the client service and unloads it from memory.
Returns 0, -1
Command-line options for the Windows client 786
Windows commands for the client service smc
Parameter Description
Returns 0, -3
Returns 0, -4
smc -disable -ntp Disables the Symantec Endpoint Protection firewall and intrusion prevent system.
Returns 0
smc -enable -ntp Enables the Symantec Endpoint Protection firewall and Intrusion Prevention System.
smc -exportconfig* Exports the client's configuration file to an .xml file. The configuration file includes
all the settings on the management server, such as policies, groups, log settings,
security settings, and user interface settings.
You must specify the path name and file name. For example, you can type the
following command:
Parameter Description
where:
log_type is:
0 = System Log
1 = Security Log
2 = Traffic Log
3 = Packet Log
4 = Control Log
For example, you might type the following syntax:
smc -exportlog 2 0 -1 c:\temp\TrafficLog
Where:
0 is the beginning of the file
-1 is the end of the file
You can export only the Control log, Packet log, Security log, System log, and
Traffic log.
output_file is the path name and file name that you assign to the exported file.
Returns 0, -2, -5
smc -exportadvrule* Exports the client's firewall rules to a .sar file. The exported rules can only be imported
into an unmanaged client or a managed client in client control mode or mixed mode.
The managed client ignores these rules in server control mode.
You must specify the path name and file name. For example, you can type the
following command:
You cannot import configuration files or firewall rule files directly from a mapped
network drive.
Command-line options for the Windows client 788
Windows commands for the client service smc
Parameter Description
smc -importadvrule* Adds the imported firewall rules to the client's list of existing firewall rules. These
rules do not overwrite the existing rules. The client lists both existing rules and
imported rules, even if each rule has the same name and parameters.
You can import only firewall rules into an unmanaged client or a managed client in
client control mode or mixed mode. The managed client ignores these rules in server
control mode.
To import firewall rules, you import a .sar file. For example, you can type the following
command:
An entry is added to the System log after you import the rules.
smc -importconfig* Replaces the contents of the client's current configuration file with an imported
configuration file and updates the client's policy. The client must run to import the
configuration file's contents.
You must specify the path name and file name. For example, you can type the
following command:
smc -p [password] Used in conjunction with a command that requires a password, where [password] is
the required password. For example:
smc -report Creates a dump file (.dmp) that includes crashes and logical errors that occurred on
the client. The file is sent automatically to Symantec Technical Support. Call Technical
Support to ask for help in diagnosing the error.
Returns 0
Returns 0
Command-line options for the Windows client 789
Windows commands for the client service smc
Parameter Description
smc -updateconfig Initiates a client-server communication to ensure that the client's configuration file is
up-to-date.
Returns 0
* Parameters that only members of the Administrators group can use if the following
conditions are met:
The client runs Windows Vista or Windows Server 2008, and users are members
of the Windows Administrators group.
If the client runs Windows Vista and the User Account Control is enabled, the
user automatically becomes a member of both the Administrators group and
Users group.
Parameters that need a password. You password-protect the client in Symantec
Endpoint Protection Manager.
See Password-protecting the client on page 253.
To run the Windows client using the smc command-line interface
1 On the client computer, click Start > Run, and then type cmd.
2 In the MS-DOS prompt, do one of the following tasks:
If the parameter does not need a password, type:
smc -p
Where: p is a parameter
Type the installation path to the smc service before the command. For
example, on a 64-bit Windows system, type:
C:\Program Files (x86)\Symantec\Symantec Endpoint
Protection\smc.exe
Error Description
code
-2 Invalid parameter.
You may have typed the parameter incorrectly, or you may have added an
incorrect switch after the parameter.
See Windows commands for the client service smc on page 785.
Appendix D
Symantec Endpoint
Protection tools
This appendix includes the following topics:
For more information, see: Best Practices for using Quarantine Server in a Symantec
Endpoint Protection environment
CleanWipe
CleanWipe uninstalls the Symantec Endpoint Protection product. Only use
CleanWipe as a last resort after you have unsuccessfully tried other uninstallation
methods, such as the Windows Control Panel.
Uninstall Symantec Endpoint Protection
You can also find this tool in the following location (64-bit): C:\Program Files
(x86)\Symantec\Symantec Endpoint Protection Manager\Tools
ContentDistributionMonitor (SEPMMonitor)
The ContentDistributionMonitor tool helps you manage and monitor multiple Group
Update Providers (GUPs) in your environment. The tool presents a graphical display
of the GUPs' health and content distribution status.
In 12.1.6 and earlier, ContentDistributionMonitor was named SEPMMonitor. In
12.1.5 and earlier, ContentDistributionMonitor was in the NoSupport folder.
See: Symantec Endpoint Protection Content Distribution Monitor tool
Integration (WebServicesDocumentation)
In version 14, the Integration folder was renamed to WebServicesDocumentation.
WebServicesDocumentation (Integration)
ITAnalytics
The IT Analytics Solution software expands the reporting that Symantec Endpoint
Protection offers. It brings multi-dimensional analysis and graphical reporting features
from the data that is contained within the Symantec Endpoint Protection Manager
database(s). This functionality allows users to explore data on their own, without
advanced knowledge of databases or third-party reporting tools.
Symantec Endpoint Protection tools 794
What are the tools included with Symantec Endpoint Protection?
JAWS
The JAWS screen reader program and a set of scripts make it easier to read the
Symantec Endpoint Protection menus and dialogs. JAWS is an assistive technology
that provides compliance with Section 508 product accessibility.
PushDeploymentWizard
You use the Push Deployment Wizard to deploy the Symantec Endpoint Protection
client installation package to target computers. Push Deployment Wizard is the
same as the Client Deployment Wizard in Symantec Endpoint Protection Manager.
You typically use it to deploy to smaller groups of computers or remote computers.
For more information, see: Overview of the Push Deployment Wizard in Symantec
Endpoint Protection
SylinkDrop
The Sylink.xml file includes communication settings between the Windows client
or Mac client and a Symantec Endpoint Protection Manager. If the clients have lost
the communication with Symantec Endpoint Protection Manager, use the SylinkDrop
tool to automatically replace the existing Sylink.xml file with a new Sylink.xml file
on the client computer.
Replacing the Sylink.xml file does the following tasks:
Converts an unmanaged client to a managed client.
Migrates or moves clients to a new domain or management server.
Restores the communication breakages to the client that cannot be corrected
on the management server.
Moves a client from one server to another server that is not a replication partner.
Moves a client from one domain to another.
You can also use this tool for Windows clients only; the tool is located in the following
location (64-bit): C:\Program Files (x86)\Symantec\Symantec Endpoint
Protection Manager\Tools
SymDiag (SymHelp)
In version 14, the SymHelp tool was renamed as Symantec Diagnostic (SymDiag).
SymDiag is a multi-product diagnostic tool that identifies common issues, gathers
data for support-assisted troubleshooting, and provides links to other customer
self-help and support resources. SymDiag also provides licensing and maintenance
status for some Symantec products as well as the Threat Analysis Scan, which
helps to find potential malware.
Virtualization
The virtualization tools improve scan performance for the clients that are installed
in virtual desktop infrastructure (VDI) environments.
SecurityVirtualAppliance (12.1.6 and earlier)
The Symantec Security Virtual Appliance contains the vShield-enabled Shared
Insight Cache for VMware vShield infrastructures.
What do I need to do to install a Security Virtual Appliance?
Installing a Symantec Endpoint Protection Security Virtual Appliance
SharedInsightCache
Symantec Endpoint Protection tools 797
What are the tools included with Symantec Endpoint Protection?
WebServicesDocumentation (Integration)
In 12.1.6 and earlier, this tool is located in the \Tools\Integration folder.
Symantec Endpoint Protection includes a set of public APIs in the form of web
services to provide support for remote monitoring and management (RMM)
applications. The web services provide functions on the client and on the
management server. All calls to Symantec Endpoint Protection web services are
authenticated using OAuth and allow access only by authorized Symantec Endpoint
Protection administrators. Developers use these APIs to integrate their company's
third-party network security solution with the Symantec Endpoint Protection
management server and client.
Provides the support for remote management and remote monitoring. Remote
management is provided by means of public APIs in the form of web services that
let you integrate your third-party solution or custom console with basic client and
management server functionality. Remote monitoring is provided by means of
publicly supported registry keys and Windows event logging.
Web services for remote management can do the following tasks:
Symantec Endpoint Protection tools 798
What are the tools included with Symantec Endpoint Protection?
Reports the license status and content status on the management server by
web service calls, in addition to reporting the license status to the Windows
Event Log.
Issues commands to the client, such as Update, Update and Scan, and Restart.
Manages the policies that are delivered to the client. Policies can be imported
from another management server, and they can be assigned to groups or
locations at another management server.
CleanWipe
CollectLog
Database Validator
SetSQLServerTLSEncryption (14)
SylinkDrop
Symantec Endpoint Protection Manager API reference (14)
CollectLog
CollectLog.cmd places the Symantec Endpoint Protection Manager logs in a
compressed .zip file. You send the .zip file to Symantec Support or another
administrator for troubleshooting purposes.
You find this tool in the following location (64-bit): C:\Program Files
(x86)\Symantec\Symantec Endpoint Protection Manager\Tools
Database Validator
You use dbvalidator.bat to help Support diagnose a problem with the database that
Symantec Endpoint Protection Manager runs.
You find this tool in the following location (64-bit): C:\Program Files
(x86)\Symantec\Symantec Endpoint Protection Manager\Tools
SetSQLServerTLSEncryption (14)
Symantec Endpoint Protection Manager communicates with the Microsoft SQL
Server over an encrypted channel by default. This tool lets you disable or enable
TLS encryption between the management server and the Microsoft SQL Server
Symantec Endpoint Protection tools 799
What are the tools included with Symantec Endpoint Protection?
vietool
Command-line options for the Virtual Image Exception tool 801
vietool
vietool
vietool Runs the Virtual Image Exception tool
SYNOPSIS
vietool.exe volume: --generate|clear|verify|hash [options ...]
DESCRIPTION
The vietool command marks the base image files on the volume that you specify
by adding an attribute.
OPTIONS
--generate
Runs the Virtual Image Exception tool on all files on the volume specified. You
cannot use this option with --clear.
For example: vietool c: --generate
--verify
Verifies that the Virtual Image Exception is set on all files on the specified
volume. You cannot use this option with --clear.
For example: vietool c: --verify
--clear
Removes the Virtual Image Exception on all files on the volume specified.
For example: vietool.exe c: --clear
To delete a specific file: vietool.exe c:\Users\Administrator\target.file
--clear
You can use a fully qualified path in place of the volume identifier to clear the
Virtual Image Exception on a single file or the contents of a folder. Only one
file name, folder name, or volume identifier per command line is allowed. You
cannot use this command with --generate, --verify, or --hash.
You must restart the client after you run the --clear command.
--hash
Generates the hash value on all files on the volume specified.
Command-line options for the Virtual Image Exception tool 802
vietool
The Virtual Image Exception tool uses the hashes to exclude local files from
future scans. The clients compute file hashes separately to send to the Shared
Insight Cache to store scan results. You cannot use this option with --clear.
For example: vietool.exe c: --generate --hash
--volume arg
Specifies the volume the tool scans.
This option can be a file when you use the --clear option. You must specify
the volume, and it can be specified either with the volume flag or alone. For
example, with the flag vietool.exe --volume c: --generate, or alone
vietool.exe c: --generate.
--verbose
Outputs to the console the maximum amount of program execution information.
--stop
Stops on the first error that the tool encounters. Otherwise the tool writes error
information to the console and continues.
--help
Displays this help message.
Index