Symantec Client Security Small Business 2.0 10025053-IN User Manual

Product codes
10025053-IN
Page of 4
Virus Protection, Antispam, & Content Filtering
SECURITY TECHNOLOGY
KEY POINTS
Protects networked PCs, 
critical systems, and 
remote and mobile users
from unwanted network
intrusions, as well as from
viruses, Trojans, and worms
NEW! Symantec VPN Sentry
assures remote and mobile
users are in full compliance
with corporate policies
NEW! Location awareness
ensures corporate security
policy is adhered to, 
regardless of location
NEW! Client Profiling 
minimises the number of
alerts that the end-user sees
NEW! Threat Tracer identifies
the source of blended threat
attacks that spread via open
file shares such as Nimda
NEW! Outbound email worm
heuristics prevent client 
systems from spreading
worms via email
NEW! Expanded Threat
Detection recognises 
unwanted applications 
such as spyware and adware
NEW! Internet Email
Attachment Scanning of
incoming emails delivered
through POP3 mail clients
such as Microsoft
®
Outlook
®
,
Eudora
®
, and Netscape Mail
NEW! In-Memory 
Scanning detects threats 
and terminates suspect
processes in memory before
they can cause damage
Symantec
Client Security
Threat protection through integrated antivirus, firewall, and intrusion detection for
remote, mobile, and networked client systems
The need for integrated client security
Mobile and remote users increasingly need access to the enterprise network, requiring organisations
to protect critical business assets that reside on networked and remote client systems. Many 
organisations rely on point products dispersed throughout the enterprise, which provide inadequate
protection and are costly to implement and manage. For instance, blended threats (such as Nimda,
Code Red, and Blaster) are difficult to prevent because they are designed to elude the security 
products commonly deployed across the perimeter of today’s enterprises. In addition, security
administrators are challenged to identify and respond to legitimate threats in real time because
these products lack centralised management capabilities.
Symantec Client Security provides integrated antivirus, firewall, and intrusion detection capabilities
managed through a central console to proactively protect against today's evolving blended threats.
Integrated security management
Integrated security management via the Symantec
System Center offers a comprehensive view of
virus protection, firewall, and intrusion detection.  Management capabilities include:
CENTRALISED MANAGEMENT FROM A SINGLE CONSOLE:
Using Symantec System Center, 
administrators can configure, install, manage, and update client virus protection, firewall, and
intrusion detection functions—and configure, implement and enforce corporate network 
policies—from one management console. Administrators can also install Symantec Client
Security and easily move clients between management servers from the central management
console. Centralised logging and alerting for each of the integrated technologies help 
transform security data into actionable information. Manageable content enforcement
ensures systems have the latest client security content updates.
CLIENT SECURITY POLICY CREATION AND DEPLOYMENT:
Merge policy file feature merges firewall
rules, helping administrators avoid manual integration or creation of new rules. A policy 
test button enables client firewall policies to function as created when deployed. Three 
pre-configured firewall policies are included: standard, remote, and hardened. Administrators
can configure and lock down antivirus and client firewall policies to control such activities as
when the real-time scanner is turned on; what occurs when a virus, worm, or Trojan is
detected; and what end-user interaction with the product is permissible, to name a few.
SYMANTEC VPN SENTRY:
Allows the administrator to ensure that mobile and remote systems
connecting to corporate resources via VPN and login script are compliant with security 
policies. Specifically, it checks to ensure that antivirus software is installed and real-time 
protection is turned on; virus definitions are up-to-date; and the client firewall is installed,
enabled, and follows appropriate policy. The administrator can also create policies though the
VPN server that allow non-compliant systems to gain access to network resources that help
address compliancy issues.