Are There Any Features or Functions in Symantec AntiVirus 10
Are There Any Features or Functions in Symantec AntiVirus 10
Are There Any Features or Functions in Symantec AntiVirus 10
A different communication model replaces the Virus Definition Transport Method (VDTM) in
Symantec Endpoint Protection. This change can affect firewall administrators (who need to
know new communication ports and protocols) and administrators who used tool sets built
around the Virus Definition Transport Method technology (e.g. using Quarantine Server to
provide updates).
Does Symantec Endpoint Protection support computers with multiple Network Interface
Cards (NIC)?
Yes. You can have multiple NICs on the Symantec Endpoint Protection Manager (SEPM) and
clients.
Will I be able to use the Symantec Endpoint Protection Manager to manage other
Symantec products in the future?
Yes. The ultimate goal is to have the Symantec Endpoint Protection Manager (SEPM) manage
all Symantec Endpoint technologies and products, which includes: Data Leakage Protection
(DLP), Critical System Protection (SCSP), and Symantec AntiVirus for Linux (SAVFL). Refer
to the Symantec Endpoint Security Web Portal for updates to the roadmap.
Note: administration and management of Macintosh clients through the SEPM was
introduced in SEP 11 RU6. For more information on SEP for Macintosh, please
see Symantec Endpoint Protection for Macintosh Frequently Asked Questions. Older SAV
for Mac clients cannot be administered through the SEPM.
Will there be a Symantec Security Information Manager (SSIM) collector for Symantec
Endpoint Protection?
Yes. An SSIM collector released concurrently with Symantec Endpoint Protection.
Does the Group Update Provider replace the secondary management server which was
previously used in Symantec AntiVirus/Symantec Client Security?
The answer depends on how the secondary management server was used in your network. You
must consider the amount of clients that require to retrieve content updates. A Group Update
Provider can provide content for over 10,000 clients assuming some best practice are followed.
For more information, see the following KB article;
http://www.symantec.com/business/support/index?
page=content&id=TECH95353&locale=en_US. In practice, you can replace a secondary
management server with a Group Update Provider, a Symantec Endpoint Protection Manager, a
Symantec Endpoint Protection Manager and Database (site), or consolidate it into an existing
site.
Can I configure where client log files are copied on the Symantec Endpoint Protection
Server?
Yes. Unlike previous versions of Symantec AntiVirus, you can now configure where client logs
are copied to on the Symantec Endpoint Protection Manager.
Protection Features
Does generic exploit blocking scan for Microsoft vulnerabilities only, or other software as
well?
Generic exploit blocking protects mostly against Microsoft vulnerabilities, but there are other
vulnerability signatures included as well.
What does Proactive Threat Protection (PTP) view as good and bad behavior?
Proactive Threat Protection views signed applications as good behavior. Some examples of bad
behavior include several open ports, listening on ports, and unsigned applications.
Does Proactive Threat Scan replace Tamper Protection? Aren't some of their protection
features redundant?
Proactive Threat Scan does not replace Tamper Protection. Instead the two protection features
complement each other. Tamper Protection protects Symantec processes against attack. Proactive
Threat Scan technology protects your computers against unknown vulnerabilities and zero day
attacks.
How has Symantec Endpoint Protection improved scan throttling?
Previously, Symantec AntiVirus set the priority of a scan so that the scan would not interfere
with other processes using system resources. This method proved ineffective, as it was not
necessarily the priority of the scan that degraded performance, but more how many processes
used CPU or I/O activities. Symantec Endpoint Protection now watches for the new and existing
processes that take CPU time, I/O activities, and using memory. When the Symantec Endpoint
Protection scanner sees these types of events, it sleeps for a short period before it checks to see if
system resources were freed. The overall experience for the end user is that their applications are
not interfered with by the scanner and that the scan completes in a timely manner.
Can I use wildcards and system variables when creating centralized exceptions?
For Security Risk Exceptions and Tamper Protection Exceptions, you can use predefined system
variables by specifying a prefix variable along with a file or a folder name.
Wildcards are not supported for Security Risk Exceptions and Tamper Protection Exceptions.
Is Rootkit detection and removal part of the Symantec Endpoint Protection Client?
Yes. The Symantec Endpoint Protection Client protects against rootkits. Additional information
is available in Security Response's January 2012 white paper on Rootkits.
Installation
Can I create a single installation package that includes the Symantec Endpoint Protection
and Symantec Network Access Control clients?
Yes. Although the Symantec Endpoint Protection client is one product and the Symantec
Network Access Control (SNAC) client is another product, you can create an installation
package that installs both products, and manage both products from a single Symantec Endpoint
Protection Manager.
Can I install the Symantec Endpoint Protection Manager on 32-bit Windows XP SP2?
Yes, but NOT recommended. Windows XP SP2 is limited to ten simultaneous connections. The
Endpoint Protection Manager uses Internet Information Service (IIS) for reporting. Therefore,
the number of simultaneous connections is easily reached.
Can I uninstall clients from the Symantec Endpoint Protection Manager Console?
No. You cannot remotely uninstall Symantec Endpoint Protection clients from the Symantec
Endpoint Protection Manager console. You can use Altiris or third party solutions such as SMS
to uninstall clients remotely.
Can the Symantec Endpoint Protection client be deployed over a VPN connection?
While such a method of deployment is feasible, it is not recommended due to the risk of packet
loss, which can result in an incorrect installation. The recommended method is to download the
SETUP.EXE program directly to the computer and then proceed with the installation locally.
Migration
What should I think about in advance before I begin migrating my Symantec AntiVirus
environment to Symantec Endpoint Protection?
Consider several factors before you begin your migration:
Before you begin migration, you must read the migration chapters in the Installation Guide for
Symantec Endpoint Protection and Symantec Network Access Control.
What are the general steps to migrating Symantec AntiVirus to Symantec Endpoint
Protection?
You must complete the following steps to migrate Symantec AntiVirus to Symantec Endpoint
Protection in the order listed:
This procedure is generalized. If you plan on managing endpoints with both Symantec System
Center and Symantec Endpoint Protection Manager, the steps are different. You should consult
the migration chapters in the Installation Guide for Symantec Endpoint Protection and Symantec
Network Access Control for more information.
Should I install the Symantec Endpoint Protection Manager console on the same computer
as Symantec System Center?
You can install the Symantec Endpoint Protection Manager console on the same computer as
Symantec System Center, but it is not required. If you plan on managing a large number of
legacy Symantec clients, a best practice is not to install the Symantec Endpoint Protection
Manager console on the same computer that runs Symantec System Center to avoid performance
and communication problems.
Have there been any changes in this process to limit the problems with bandwidth?
With Symantec Endpoint Protection, you can create installation packages that contain only the
components that are necessary for the targeted clients. Additionally, you can stagger client
deployments to minimize performance issues in your network.
Can I migrate Symantec AntiVirus 8.x and Symantec Client Security 1.x or older versions?
No. The client installation routine blocks the migration for these unsupported versions. You must
uninstall the older version, then install Symantec Endpoint Protection. Before you do so, you
should ensure that Symantec Endpoint Protection supports the operating system platform. If
Symantec Endpoint Protection does not support the operating system, you may want to continue
using Symantec System Center to manage these clients, or consider an upgrade to a supported
operating system.
You should refer to the Installation Guide for Symantec Endpoint Protection and Symantec
Network Access Control for more information on migration best practices.
What kind of success rate should I expect when migrating from Symantec AntiVirus to
Symantec Endpoint Protection?
The more thorough that you perform pre-migration analysis and tasks, the better your success
rate during migration. For example, if you ensure that scheduled scans are disabled on your
clients, the chance that those clients migrate successfully increases. Additionally, if you create a
migration test environment before you migrate to your production environment, you can greatly
increase the migration success rate of your clients.
If supported versions of Sygate and Symantec AntiVirus are installed on the same
computer, does a migration to Symantec Endpoint Protection upgrade both products?
Yes. As long as both Sygate and Symantec AntiVirus versions can be migrated.
Can Symantec Endpoint Protection deny access to a visitor laptop or computer that is not
part of the domain?
Yes. You can use Symantec Network Access Control to deny access based on several
configurable computer attributes. Symantec Network Access Control requires an additional
license.
Is the Symantec Endpoint Protection client compatible with Symantec Gateway Security
Appliances?
Yes. The Symantec Endpoint Protection client should work fine with Symantec Gateway
Security appliances.
Does generic exploit blocking scan for Microsoft vulnerabilities only, or other software as
well?
Generic exploit blocking protects mostly against Microsoft vulnerabilities, but there are other
vulnerability signatures included as well.
What ports do clients use to communicate with the Symantec Endpoint Protection
Manager?
Clients use the default ephemeral ports (1024 to 65535) for TCP for network communications.
The ephemeral port range that is used, however, rarely exceeds 5000.
Does the Symantec Endpoint Protection client rely on the grc.dat file for configuration
settings?
No. Sylink.xml has replaced the grc.dat file. The Symantec Endpoint Protection client relies on
Sylink.xml, which contains information such as the client's management server.
Can the Symantec Endpoint Protection client have no user interface (UI)?
Yes. You can configure UI settings from the Clients Page in the SEPM.
Is the Symantec Endpoint Protection Client for 64-bit a native 64-bit application?
No. The Symantec Endpoint Protection Client is not a native 64-bit application. Some
components are 64-bit, and some are not. Symantec Network Access Control is a native 64-bit
application.
Can I manage legacy Symantec AntiVirus clients from the Symantec Endpoint Protection
Manager console?
No. You must use Symantec System Center to manage legacy Symantec AntiVirus clients and
servers. For example, if you have Netware servers running Symantec AntiVirus, you should
group these servers into a server group and use Symantec System Center to manage them.
Symantec Endpoint Protection does support forwarding reporting data from Symantec AntiVirus
to Symantec Endpoint Protection. This feature lets you view all data from one console.
Can I control the Symantec Endpoint Protection firewall by Group Policy Objects (GPO)
like XP and Vista?
No. Symantec Endpoint Protection integrates with Active Directory, but it does not integrate
with GPOs.
Can I centrally manage both PCs and Macintosh computers from the Symantec Endpoint
Protection Manager Console?
No. However, the capability to centrally manage Macintosh computers and PCs is planned. The
ultimate goal is to have the Symantec Endpoint Protection Manager manage all endpoint security
solutions released by Symantec.
Can I detect unprotected computers from the Symantec Endpoint Protection Manager
console?
Yes. You can use the Find Unmanaged Computers Task and Network Audit from the Clients
page to detect the computers that Symantec Endpoint Protection does not protect.
How can I connect to the Symantec Endpoint Protection Manager console through a
browser?
You can connect to the Symantec Endpoint Protection Manager by entering the following in your
browser: http://(IP address of Symantec Endpoint Protection Manager):9090
Client Deployment
Can Symantec Endpoint Protection components be installed independently of each other?
Yes. You can create installation packages with the following types of protection:
Content Distribution
What is the difference between Push and Pull modes when downloading policies and
content from the management server?
Clients that use the Push mode download policies and content as soon as they become available.
On push mode an open connection is kept so that the manager can contact the client immediately
when data is available. Clients that use the Pull mode download policies and content based on
the Heartbeat interval setting, which is set to 5 minutes by default. Because of the greater
network bandwidth that is used with the push mode, it is recommended more for small and
medium-sized networks.
Does the Group Update Provider need IIS installed on the computer?
No. The Group Update Provider uses a built-in, embedded HTTP server.
Can the Group Update Provider get updates from LiveUpdate as well as the Symantec
Endpoint Protection Manager?
No. The Group Update Provider only receives its updates from the Symantec Endpoint
Protection Manager.
What are the sizes of the various packages that are sent between the Symantec Endpoint
Protection client and manager?
The following are estimates of the size of packages that are sent between the Symantec Endpoint
Protection client and manager:
Reporting
How is legacy data added into the Symantec Endpoint Protection Manager database with a
new schema?
Legacy data is normalized when it is inserted into the database.
Can Symantec Endpoint Protection Reporting gather data from legacy Symantec
AntiVirus Reporting agents?
Yes. You can point the existing reporting agents to the Symantec Endpoint Protection Manager.
Turn on the legacy client data log processing, and then all the data appears in the new console.
Scaling
How many clients can I manage with a single Symantec Endpoint Protection Manager?
Symantec Endpoint Protection Manager can manage 50,000 clients as long as network resources
are available.
Best Practices
What is a best practice for managing clients with Symantec AntiVirus 9.x, 10.x, and 11.x, if
you assume that the clients cannot be upgraded all at the same time?
The best practice for managing a combination of Symantec AntiVirus 9.x/10.x and Symantec
Endpoint Protection 11.x clients is to install the Symantec Endpoint Protection Manager and
Console on different computer than Symantec System Center. You can then migrate your legacy
Symantec AntiVirus clients (that are supported) to Symantec Endpoint Protection 11.x in stages.
You should read the Migration Overview and Sequence section in the Installation Guide for
Symantec Endpoint Protection and Symantec Network Access Control.