Symantec Endpoint Security Overview

Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities, hackers attacks like ransomware attack. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your client computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware, malware etc.. Symantec Endpoint Protection provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, ransomware and spyware that mutates.


In this video Series we cover all aspects of symantec endpoint protection manages, clients and liveupdate.


Like as


  1. Brief Introduction.


2.Download location.


  1. Symantec manager and client installation and deployment.


  1. Policy management,


  1. Licensing


  1. Monitoring, reporting, and enforcing




  1. Database manage, backup, restore.


  1. Replication, Recovery


  1. Troubleshooting


  1. And more.


We trying to cover the all thing that protect your production environment and digital life.

key tasks:


■ Protects your endpoints from malware and maximizes system uptime.

■ Enforces protection policies and compliance on the endpoint.

■ Responds to threats and incidents effectively by quickly quarantining and

removing malware from endpoints.

■ Monitors and tracks risk exposure across platforms, devices, remote locations, and in physical, virtual or hybrid environments.

Symantec Endpoint Protection uses layers to protect computers

1: Network-based protection

Network Threat Protection:

■ Firewall

■ Protocol-aware IPS

Virus and Spyware Protection:

■ Browser protection

2: File-based protection

Virus and Spyware Protection:

■ Antivirus engine

■ Auto-Protect

■ Bloodhound

3: Reputation-based Protection

Virus and Spyware Protection:

■ Domain reputation score

■ File reputation (Insight)

4: Behavioral-based Protection

■ Proactive Threat Protection (Virus

and Spyware Protection policy):


5: Repair and remediation Tools

Power Eraser:

■ Boot to clean operating system

■ Power Eraser uses aggressive heuristics

■ Threat-specific tools

6: Exploit mitigation

■ Generic Exploit Mitigation

Other Tools

■ System Lockdown

■ Application control

■ Device control


Components of Symantec Endpoint Protection

■Symantec Endpoint Protection Manager

■Symantec Endpoint Protection client

■LiveUpdate Administrator


Minimum Requirement

Operating System

                ■ Windows Server 2008 (64-bit)

■ Windows Server 2008 R2

■ Windows Server 2012

■ Windows Server 2012 R2

■ Windows Server 2016


■Intel Pentium Dual-Core or equivalent minimum, 8-core or greater recommended

Note: Intel Itanium IA-64 processors are not supported.


2 GB RAM available minimum; 8 GB or more available recommended

Note: Your Symantec Endpoint Protection Manager server may require additional RAM depending on the RAM requirements of other applications that are already installed.

For example, if Microsoft SQL Server is installed on the Symantec Endpoint Protection Manager server, the server should have a minimum of 8 GB available.

Physical RAM


1024 x 768 or larger

With an embedded database or a local SQL Server database:

■ 40 GB available minimum (200 GB recommended) for the management server and database With a remote SQL Server database:

■ 40 GB available minimum (100 GB recommended) for the management server

■ Additional available disk space on the remote server for the database



Reference and Help:-

Symantec Endpoint Protection – Wikipedia…


What is Symantec Endpoint Protection? – Symantec Support…

Here is list of all Symantec Endpoint Protection Video Series


Symantec Endpoint Protection 14


Symantec Endpoint Security Overview | Symantec Endpoint Protection


Symantec Suits Download | Symantec Endpoint Protection


Installation of Symantec Management Server Installation | Symantec Endpoint Protection


Symantec Client Deployment | Symantec Endpoint Protection


Customization of Package, Install Settings and Feature Set | Symantec Endpoint Protection


Policy management in Endpoint Protection Manager | Symantec Endpoint Protection


Antivirus and Antispyware Policies | Symantec Endpoint Protection

Symantec Firewall Policy | Symantec Endpoint Protection


Symantec Intrusion Prevention Policy | Symantec Endpoint Protection


Symantec Application and Device Control Policy | Symantec Endpoint Protection

Symantec Host Integrity Check | Symantec Endpoint Protection

Symantec LiveUpdate Policy | Symantec Endpoint Protection


Symantec Memory Exploit Mitigation Policy | Symantec Endpoint Protection

How to Manage user account and set access rights | Symantec Endpoint Protection

How to add domain and edit domain properties | Symantec Endpoint Protection

Symantec Live Administrator settings and download definitions | Symantec Endpoint Protection

External Logging settings and log event for Endpoint Protection Manager

Symantec Endpoint Protection Manager Server Properties | Symantec Endpoint Protection


Symantec Help and Support…


  1. 5mg cialis

    Hello, blame you in regard to facts! I repost in Facebook

  2. smoretraiolit

    Hello.This post was really fascinating, particularly because I was searching for thoughts on this matter last couple of days.

Comments are closed.