Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities, hackers attacks like ransomware attack. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your client computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware, malware etc.. Symantec Endpoint Protection provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, ransomware and spyware that mutates.
In this video Series we cover all aspects of symantec endpoint protection manages, clients and liveupdate.
Like as
- Brief Introduction.
2.Download location.
- Symantec manager and client installation and deployment.
- Policy management,
- Licensing
- Monitoring, reporting, and enforcing
compliance
- Database manage, backup, restore.
- Replication, Recovery
- Troubleshooting
- And more.
We trying to cover the all thing that protect your production environment and digital life.
key tasks:
■ Protects your endpoints from malware and maximizes system uptime.
■ Enforces protection policies and compliance on the endpoint.
■ Responds to threats and incidents effectively by quickly quarantining and
removing malware from endpoints.
■ Monitors and tracks risk exposure across platforms, devices, remote locations, and in physical, virtual or hybrid environments.
Symantec Endpoint Protection uses layers to protect computers
1: Network-based protection
Network Threat Protection:
■ Firewall
■ Protocol-aware IPS
Virus and Spyware Protection:
■ Browser protection
2: File-based protection
Virus and Spyware Protection:
■ Antivirus engine
■ Auto-Protect
■ Bloodhound
3: Reputation-based Protection
Virus and Spyware Protection:
■ Domain reputation score
■ File reputation (Insight)
4: Behavioral-based Protection
■ Proactive Threat Protection (Virus
and Spyware Protection policy):
SONAR
5: Repair and remediation Tools
Power Eraser:
■ Boot to clean operating system
■ Power Eraser uses aggressive heuristics
■ Threat-specific tools
6: Exploit mitigation
■ Generic Exploit Mitigation
Other Tools
■ System Lockdown
■ Application control
■ Device control
Components of Symantec Endpoint Protection
■Symantec Endpoint Protection Manager
■Symantec Endpoint Protection client
■LiveUpdate Administrator
Minimum Requirement
Operating System
■ Windows Server 2008 (64-bit)
■ Windows Server 2008 R2
■ Windows Server 2012
■ Windows Server 2012 R2
■ Windows Server 2016
Processor
■Intel Pentium Dual-Core or equivalent minimum, 8-core or greater recommended
Note: Intel Itanium IA-64 processors are not supported.
Memory
2 GB RAM available minimum; 8 GB or more available recommended
Note: Your Symantec Endpoint Protection Manager server may require additional RAM depending on the RAM requirements of other applications that are already installed.
For example, if Microsoft SQL Server is installed on the Symantec Endpoint Protection Manager server, the server should have a minimum of 8 GB available.
Physical RAM
Display
1024 x 768 or larger
With an embedded database or a local SQL Server database:
■ 40 GB available minimum (200 GB recommended) for the management server and database With a remote SQL Server database:
■ 40 GB available minimum (100 GB recommended) for the management server
■ Additional available disk space on the remote server for the database
Reference and Help:-
Symantec Endpoint Protection – Wikipedia
https://en.wikipedia.org/wiki/Symante…
What is Symantec Endpoint Protection? – Symantec Support
https://support.symantec.com/us/en/ar…
Here is list of all Symantec Endpoint Protection Video Series
Symantec Endpoint Protection 14
…………………………….
Symantec Endpoint Security Overview | Symantec Endpoint Protection
Symantec Suits Download | Symantec Endpoint Protection
Installation of Symantec Management Server Installation | Symantec Endpoint Protection
Symantec Client Deployment | Symantec Endpoint Protection
Customization of Package, Install Settings and Feature Set | Symantec Endpoint Protection
Policy management in Endpoint Protection Manager | Symantec Endpoint Protection
Antivirus and Antispyware Policies | Symantec Endpoint Protection
Symantec Firewall Policy | Symantec Endpoint Protection
Symantec Intrusion Prevention Policy | Symantec Endpoint Protection
Symantec Application and Device Control Policy | Symantec Endpoint Protection
Symantec Host Integrity Check | Symantec Endpoint Protection
Symantec LiveUpdate Policy | Symantec Endpoint Protection
Symantec Memory Exploit Mitigation Policy | Symantec Endpoint Protection
How to Manage user account and set access rights | Symantec Endpoint Protection
How to add domain and edit domain properties | Symantec Endpoint Protection
Symantec Live Administrator settings and download definitions | Symantec Endpoint Protection
External Logging settings and log event for Endpoint Protection Manager
Symantec Endpoint Protection Manager Server Properties | Symantec Endpoint Protection
Symantec Help and Support
https://support.symantec.com/us/en/pr…
Hello, blame you in regard to facts! I repost in Facebook
Hello.This post was really fascinating, particularly because I was searching for thoughts on this matter last couple of days.