Symantec Endpoint Security Overview

Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities, hackers attacks like ransomware attack. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your client computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware, malware etc.. Symantec Endpoint Protection provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, ransomware and spyware that mutates.

 

In this video Series we cover all aspects of symantec endpoint protection manages, clients and liveupdate.

 

Like as

 

  1. Brief Introduction.

 

2.Download location.

 

  1. Symantec manager and client installation and deployment.

 

  1. Policy management,

 

  1. Licensing

 

  1. Monitoring, reporting, and enforcing

 

compliance

 

  1. Database manage, backup, restore.

 

  1. Replication, Recovery

 

  1. Troubleshooting

 

  1. And more.

 

We trying to cover the all thing that protect your production environment and digital life.

key tasks:

 

■ Protects your endpoints from malware and maximizes system uptime.

■ Enforces protection policies and compliance on the endpoint.

■ Responds to threats and incidents effectively by quickly quarantining and

removing malware from endpoints.

■ Monitors and tracks risk exposure across platforms, devices, remote locations, and in physical, virtual or hybrid environments.

Symantec Endpoint Protection uses layers to protect computers

1: Network-based protection

Network Threat Protection:

■ Firewall

■ Protocol-aware IPS

Virus and Spyware Protection:

■ Browser protection

2: File-based protection

Virus and Spyware Protection:

■ Antivirus engine

■ Auto-Protect

■ Bloodhound

3: Reputation-based Protection

Virus and Spyware Protection:

■ Domain reputation score

■ File reputation (Insight)

4: Behavioral-based Protection

■ Proactive Threat Protection (Virus

and Spyware Protection policy):

SONAR

5: Repair and remediation Tools

Power Eraser:

■ Boot to clean operating system

■ Power Eraser uses aggressive heuristics

■ Threat-specific tools

6: Exploit mitigation

■ Generic Exploit Mitigation

Other Tools

■ System Lockdown

■ Application control

■ Device control

 

Components of Symantec Endpoint Protection

■Symantec Endpoint Protection Manager

■Symantec Endpoint Protection client

■LiveUpdate Administrator

 

Minimum Requirement

Operating System

                ■ Windows Server 2008 (64-bit)

■ Windows Server 2008 R2

■ Windows Server 2012

■ Windows Server 2012 R2

■ Windows Server 2016

Processor

■Intel Pentium Dual-Core or equivalent minimum, 8-core or greater recommended

Note: Intel Itanium IA-64 processors are not supported.

Memory

2 GB RAM available minimum; 8 GB or more available recommended

Note: Your Symantec Endpoint Protection Manager server may require additional RAM depending on the RAM requirements of other applications that are already installed.

For example, if Microsoft SQL Server is installed on the Symantec Endpoint Protection Manager server, the server should have a minimum of 8 GB available.

Physical RAM

Display

1024 x 768 or larger

With an embedded database or a local SQL Server database:

■ 40 GB available minimum (200 GB recommended) for the management server and database With a remote SQL Server database:

■ 40 GB available minimum (100 GB recommended) for the management server

■ Additional available disk space on the remote server for the database

 

 

Reference and Help:-

Symantec Endpoint Protection – Wikipedia

https://en.wikipedia.org/wiki/Symante…

 

What is Symantec Endpoint Protection? – Symantec Support

https://support.symantec.com/us/en/ar…

Here is list of all Symantec Endpoint Protection Video Series

 

Symantec Endpoint Protection 14

…………………………….

Symantec Endpoint Security Overview | Symantec Endpoint Protection

 

Symantec Suits Download | Symantec Endpoint Protection

 

Installation of Symantec Management Server Installation | Symantec Endpoint Protection

 

Symantec Client Deployment | Symantec Endpoint Protection

 

Customization of Package, Install Settings and Feature Set | Symantec Endpoint Protection

 

Policy management in Endpoint Protection Manager | Symantec Endpoint Protection

 

Antivirus and Antispyware Policies | Symantec Endpoint Protection

Symantec Firewall Policy | Symantec Endpoint Protection

 

Symantec Intrusion Prevention Policy | Symantec Endpoint Protection

 

Symantec Application and Device Control Policy | Symantec Endpoint Protection

Symantec Host Integrity Check | Symantec Endpoint Protection

Symantec LiveUpdate Policy | Symantec Endpoint Protection

 

Symantec Memory Exploit Mitigation Policy | Symantec Endpoint Protection

How to Manage user account and set access rights | Symantec Endpoint Protection

How to add domain and edit domain properties | Symantec Endpoint Protection

Symantec Live Administrator settings and download definitions | Symantec Endpoint Protection

External Logging settings and log event for Endpoint Protection Manager

Symantec Endpoint Protection Manager Server Properties | Symantec Endpoint Protection

 

Symantec Help and Support

https://support.symantec.com/us/en/pr…

2 Comments

  1. 5mg cialis

    Hello, blame you in regard to facts! I repost in Facebook

  2. smoretraiolit

    Hello.This post was really fascinating, particularly because I was searching for thoughts on this matter last couple of days.

Comments are closed.