Insight. Security Response. Deployment Best Practices

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Insight. Security Response. Deployment Best Practices"

Transcription

1 Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users to automatically discover and classify every single software file, good or bad, on the Internet. Based on advanced data mining techniques, Insight seeks out mutating code separating out risky, low-reputation files from those that are safe. Symantec Endpoint Protection (SEP) uses reputation-based technology to protect you in three ways: First, SEP uses Insight to evaluate new files before they are introduced to a protected machine. This feature, called Download Insight, enables SEP to block all low-reputation files when they are introduced and before they can take root and cause damage. Since most malware is introduced via Web surfing, instant messaging, or , by checking the reputation of all such files/attachments before they are saved and used drastically reduces infections on endpoints. Contents Overview... 1 Creating Effective Insight Policies... 2 False Positive Prevention Correcting a False Positive Second, all of SEP s security technologies (such as SONAR behavioral protection and Malheur heuristics) now leverage Insight reputation data as a second opinion to improve their accuracy. Just as you would want to get a second opinion from another physician about a potential medical problem, Insight provides a second, community-based assessment to our other security technologies to improve their detection rate and reduce false positives.

2 Third, since Insight can identify trusted, high-reputation files (as well as low-reputation bad files), our product now uses this data to avoid scanning highly-trusted programs, unless they are modified or change. This typically results in a reduction of percent of scanning overhead while maintaining a higher level of security than previous products. This document is separated into three key areas of recommended practices: Creating Effective Insight Policies False Positive Prevention Correcting a False Positive The Creating Effective Insight Policies section provides specific advice on recommended Insight configurations based on your corporation s specific tolerance for risk. The False Positive Prevention section is designed primarily to provide recommendations on how to proactively make sure your files and files from your trusted vendors have a good reputation. The Correcting a False Positive section helps provides information on how to submit a false positive to Symantec for correction or to create Exceptions Policies to eliminate known false positives. Creating Effective Insight Policies There are three main functionalities configurable by administrators and users in the Symantec Endpoint Protection Manager (SEPM): 1. Download Insight Configuration: The Download Insight feature helps prevent your users from downloading low-reputation software onto their machines. 2. Insight Performance Improvements: This SEP feature uses reputation data to prevent wastefully scanning files with good reputation. This reduces the overhead of the security product without compromising security. 3. Insight Submissions: By submitting anonymous application adoption data to Symantec, you help increase the accuracy and precision of our reputation system. 1. Download Insight Configuration What does Download Insight check? Download Insight is only applied to software files at the time of their introduction (i.e., at the time of download and attempted installation) through typical Internet activities. Download Insight checks: New software files as they are downloaded by Internet Explorer, Firefox, Chrome, etc. Both user-downloaded files and drive-by downloads (not initiated by the user) are checked File attachments in s when users save and/or launch these files from their readers Files sent over Instant Messaging before users can save and launch these files on their computers Files downloaded over popular file-sharing programs (e.g., Micro Torrent) before users can save and launch these files on their computers Download Insight does not check other software on protected machines, such as actively running applications that are already installed and running. It only checks new software at the time it is introduced to a machine (e.g., downloaded). Its goal is to block a high percentage of new malware before it ever has a chance to run, with minimal false positive implications. You may specify a single Download Insight policy for your entire enterprise OR you may create multiple Download Insight policies for different corporate divisions (or even for individuals) if your different divisions have different risk tolerances. Page 2

3 How-to: Download Insight configuration settings can be accessed in the SEPM by clicking on Computers -> Policies tab -> Virus and Spyware Protection Policy -> Download Protection (see Figure 1). Figure 1 Page 3

4 Protection Level Setting Use this setting to control the file reputation level that Download Insight should consider to be malicious. In general, a lower protection level will yield both a lower false positive rate and a lower detection rate, while higher protection levels provide better protection but tend to have a higher rate of false positives on unknown/new files that have yet to build up a good reputation. Please follow the guide below to change the protection level slider setting. Levels Description 1-3 Appropriate for highly FP-averse divisions or test environments that cannot tolerate the blocking of newly downloaded good files that are still building reputation (e.g., new files from little-known publishers). At these levels, malware that is still building reputation may evade detection, but the system is highly unlikely to convict good files at download time. 4-6 Appropriate for most desktop users downloading normal software. These levels balance FP risk and detection to capture most malware with low FPs. Level 5 is the appropriate threshold for a majority of users and we discourage users from changing the value unless advised by Symantec support personnel. 7-9 Appropriate for highly secure environments where you wish to lock-down a server or desktop that does not frequently install new or unproven software. FPs on newly downloaded good files that lack a higher reputation will occur at this level, but very little malware will evade detection. NOTE: For most enterprises, we recommend the preset default configuration at Protection Level 5. This will block lowreputation software and software still without a reputation (e.g., software that is new and not from a trusted vendor) in addition to blocking files that trigger classic fingerprints or heuristics. Age & Prevalence Setting The Download Insight feature also provides administrators the ability to restrict the Age and Prevalence of downloaded files. We call this feature Policy-Based Lockdown (see Figure 1). TIP: You may want to institute prevalence/age blocking policies for departments that require a high level of security. For example, you could block Finance employees from downloading software unless it had at least 1000 users and had been in the field at least two weeks. Such a policy limits these users to using only proven software. You may also allow files with lower prevalence/age to reach your IT/Helpdesk department if your IT staff needs to download more arcane tools to do their jobs. The Age/Prevalence values that you specify in these fields will differ according to the risk profile and the nature of applications typically downloaded by each organization or division. These Age and Prevalence policies only apply to downloaded files (at the time of download), and they only apply to untrusted software that is not from Symantec-trusted software vendors. This means that software from vendors such as Microsoft, Symantec, Oracle, etc. will not be filtered due to Age or Prevalence criteria. This prevents false positives on downloads from trusted software vendors while ensuring that unproven software from untrusted vendors is blocked. We also highly recommend that you enable the option to automatically trust any files downloaded from your company s Intranet websites (see Figure 1). This option allows the Download Insight feature to automatically trust downloads that come from the domains, URLs and IPs published in your organization s trusted domain/intranet site list. (These sites are specified in your Trusted Zones list in Internet Explorer; if this option is set, the trusted zone list is automatically imported and used by Download Insight). Page 4

5 Actions Setting The next step is to configure the actions you want Download Insight to take if it detects a malicious or unknown file being downloaded. The options can be configured through the Actions tab under Download Protection window (see Figure 2). Figure 2 Recommended settings: We recommend leaving the action setting for malicious files (files with the lowest reputation) at its recommended default of Quarantine. We recommend leaving the action setting for unproven files (i.e., files that still lack a reputation) at the default Prompt value. This will warn users against downloading files that lack a solid reputation. SEP will warn users with a message that you may customize. Users can then decide if they should allow the file onto their systems. TIP: You can customize the Download Insight warning message to suit your company s needs. For example: This file may violate company policy. If the file is necessary for business purposes and you believe this message is in error, you may proceed and use the file. Otherwise, using this file may violate company policy and result in disciplinary action. Page 5

6 If you would prefer to simply quarantine/block unproven files, you can change the action taken for the unproven files to Quarantine. For example, while you might allow your HelpDesk team to use unproven files (with a warning), you may want to make sure that your Finance department employees can only install files with a known-good reputation. Therefore, you can set the unproven file option to Quarantine for your Finance department, while leaving this option at Prompt for the HelpDesk department. NOTE: If you set the option for unproven files to Quarantine or Delete then the small subset of files that are still building reputation in the Symantec community will be blocked at download time. Note that files authored vendors trusted by Symantec will not be given an unproven rating and will never fall into this category. As mentioned above, the SEPM console enables the administrator to provide custom warning text to the end user for the Prompt option. Typical information filled in this area includes admin contact details and a warning on the enterprise policy. The same warning will also be displayed if the end user decides to restore a file from the Quarantine. The text can be entered in the Notifications tab under Download Protection as shown in Figure 3, below. Figure 3 Page 6

7 2. Insight Performance Improvements The Insight ( scan-less ) feature reduces the overhead of SEP by enabling it to skip the real-time scanning of extremely high-reputation files, such as Word, Excel, Windows kernel files, and other files that are discovered to have a sterling reputation. On a typical system, when enabled, this prevents scanning of 70 to 80 percent or more of the applications on a system, dramatically reducing the overhead of the SEP product when compared with other endpoint security solutions. Should such a trusted file change even a flip of a single bit from a 1 to a 0 value, for example then the file immediately becomes untrusted and is scanned using all available protection technologies. HOW-TO: The ( scan-less ) feature can be configured in SEPM through the management console by clicking on Computers -> Policies tab -> Virus and Spyware Protection Policy -> Global Scan Options (see Figure 4). Figure 4 Recommended settings: We encourage you to leave the default option set at Symantec Trusted for the best performance and security. Page 7

8 2. Insight Submissions Symantec highly encourages you to anonymously submit your file usage data to Symantec s secure reputation servers. This feedback enables Symantec s systems to provide you with better protection. The Insight submission system is designed to comply with the Personally Identifiable Information (PII) regulations of all countries to ensure privacy. NOTE: Insight submissions require very little bandwidth. The administrator can enable or disable Insight submissions for SEP client installs via Symantec Endpoint Protection Manager (SEPM) using two methods: Figure 5 1. Set the group policy to enable submissions and include it in the client installation package (see Figure 5). You can ensure that your SEP instances are properly submitting telemetry data by leaving the default File Reputation option enabled, as highlighted below. 2. If the group policy is not included in the client installation package, then the admin can pre-set the client install to enable the submissions (see Figure 6). The submissions are controlled via the Submit reputation information to Symantec Security Response option highlighted in the figure. Page 8

9 Figure 6 Symantec Endpoint Protection Client The Download Insight options may be configured both in SEPM as well as in the client SEP UI. Download Insight can be accessed in the SEP client by clicking on Change Settings -> Global Settings. Recommended settings: We highly recommend that administrators disable Download Insight controls at the endpoints. This will help make sure that the administrator can provide uniform security protection across the organization. Page 9

10 False Positive Prevention SEP 12.1 will not detect known good files as malware. There are several ways to make sure your good files are known as good. The following steps will help prevent false positives when using SEP Step 1 Using Digital Signatures One of the easiest ways to identify that a file is good is to know where it came from and who created it. An important factor in building confidence in a file being good is to check its digital signature. Executable files without a digital signature have a higher chance of being identified as unknown or low-reputation. Custom or home-grown application should be digitally signed with class three digital certificates Customers should insist that their software vendors digitally sign their applications Step 2 - Add to the Symantec White List Symantec has a growing white list of over 25 million good files. These files are used in testing signatures before they are published. Their hash values are also stored online and used to avoid false positives on the SEP client via real-time cloud lookups whenever a file is detected by any of our client security technologies (e.g., SONAR behavioral technology, a fingerprint, etc.). This white list is a powerful tool for avoiding false positives. Customers and vendors can add files to this list. Software vendors can request that their executable be added to the Symantec white list at https://submit. symantec.com/whitelist/ BCS Customers can have their system images submitted to the white-listing program here: https://submit. symantec.com/whitelist/bcs.cgi Symantec provides customers with simple whitelisting tools that can greatly simplify the submission of information on known good files to Symantec. NOTE: Do not use the above links to correct a false positive. See below for instructions on correcting a false positive. Step 3 - Test The initial deployment of SEP 12.1 during beta should include test machines with representative images of the software you run in your environment, including common third-party applications Monitor for potential issues during beta testing Step 4 - Feedback Each security technology in SEP 12.1 can collect data that is sent back to Symantec to measure and mitigate false positives via analysis, heuristic training against collected data sets, and custom generic whitelisting. Enable automated submission of meta data on detections Page 10

11 Correcting a False Positive Symantec wants to know about and correct false positives. Having a submission not only allows Symantec to correct a current issue, it also allows us study the causes of the false positive to avoid similar files from having issues in the future. Step 1 - Submit False positive submissions can be made immediately to Symantec via a Web form. All suspected false positives should be submitted to https://submit.symantec.com/false_positive/. It is critical for resolution of Reputation (Download Insight) false positives that the file or the SHA256 value of the file be included with the submission. (Hash value of a file is also presented in notices on client third-party tools.) False positives should not be submitted via the malware submission system. This is a change in procedure and not specific to SEP The URL above should be used to report false positives, no matter which product involved. Once the submission has been processed and the file whitelisted by Symantec, the quarantine rescan feature will automatically restore the file out of quarantine. Step 2 - Exclude SEP 12.1 supports multiple ways to exclude good files from detection. Exclusions can be performed from the SEP management console to mitigate false positives enterprise-wide. You may exclude files downloaded from known, trusted domains (e.g., your corporation s Web domain or your company s vendors domains) from Download Insight detections (see Chapter 20 of the SEP Implementation Guide) You may add exclusions/exceptions in SEPM for critical files, directories or URLs/IPs Adding Exceptions Administrators can add new exceptions for files (e.g., File X is always safe ) or domains (e.g., All files downloaded from domain are safe ) in two ways: 1. Define Exceptions Policy To add a single or small number of domain/file exclusions, use the Exceptions Policy screens in SEPM. The Exceptions Policy can be used, for example, to add a new exclusion for an internally developed enterprise application. It can also be used to whitelist the domain of a new enterprise vendor that hosts trusted applications used by employees. HOW-TO: To add one or more files/domains to the Exceptions Policy, administrators can do so from SEPM through the management console by clicking on Computers -> Policies tab -> Exceptions -> Add an Exceptions Policy. Exceptions can be created to always trust a File or a Web Domain (see figure 7 and figure 8). Page 11

12 Figure 7 Figure 8 Page 12

13 2. Use Risk Log to View Recent Download Insight Blocking Events Administrators can also use SEPM Risk Log to review Download Insight blocking events in order to identify and address recent false positives encountered by their employees. The Risk Log includes every blocking event from every endpoint in the enterprise, and includes files blocked by our classic fingerprint-based antivirus scanner, our SONAR behavioral engine, and our new Insight technology. HOW-TO: To review recent blocking events, administrators can navigate to the Risk Log section of the SEPM console. Click on Monitors -> Logs -> Risk (under Log type) -> View Log button (see Figure 9). You can identify Insight-blocked files can be identified by their WS.Reputation.1 name in the Risk Name column of the table (see Figure 10). For each such Insight-blocked file, SEPM also displays the domain or IP address from where the file was downloaded (e.g., or Figure 9 TIP: If the Risk Logs show many malicious downloads blocked by Insight, you can select to view block events By Application or By Web Domain (see Figure 10). Figure 10 Page 13

14 By Application If you select the view By Application option, you can get a list of all unique files that were blocked across the enterprise as well as the prevalence of each such blocked file. This data helps identify high-prevalence any malware that may be affecting employees. It also lets you identify high-prevalence false positives on good files. You may order this list by the prevalence of each false positive by clicking on the Count tab. This will allow you to quickly identify all high-prevalence false positives that are affecting users. The Risk Log provides a view of blocked files (ordered by prevalence) and enables rapid whitelisting of such high-prevalence false positives. This process will be described in more detail below. HOW-TO: To permanently allow (whitelist) a file across the enterprise, click on the + sign in the Action column for a particular file and select Allow Application from the drop-down list (see Figure 11). Future downloads of the selected file will no longer be blocked. Figure 11 By Web Domain Selecting to view events By Web Domain, will provide a list of domains from which your employees downloaded blocked files. These domains could either be malicious domains or potentially legitimate domains of vendors that host lower-reputation files. This view will also show that many legitimate files from trusted vendors websites are being blocked by Download Insight because they have a low reputation. If so, you might want to whitelist these domains so that Download Insight will no longer block the site. You can easily identify the highest-prevalence false positives by clicking on the Count tab. This will place those domains with the highest number of blocked files first, enabling rapid whitelisting of your important domains. The Risk Log also provides such a view and enables rapid whitelisting of such high-prevalence domains. HOW-TO: To permanently allow downloads from a domain, click the + sign in the Action column for that domain and select Trust Web Domain from the drop-down list (see Figure 12). Future downloads from the selected domain will be no longer be blocked based on Insight reputation. NOTE: Whitelisting a domain will not prevent our other technologies (e.g., fingerprints) from blocking files downloaded from such a domain. This will only override our Insight reputation rating for files downloaded from such a domain. Page 14

15 Figure 12 Page 15

16 Any technical information that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical information is being delivered to you as is and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained herein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Moutain View, Calif., Symantec has operations in more than 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) Symantec Corporation World Headquarters 350 Ellis Street Mountain View, CA USA +1 (650) Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group 2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

Securing the endpoint and your data

Securing the endpoint and your data #SymVisionEmea #SymVisionEmea Securing the endpoint and your data Piero DePaoli Sr. Director, Product Marketing Marcus Brownell Sr. Regional Product Manager Securing the Endpoint and Your Data 2 Safe harbor

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2. Preface 1 Virus scanner administration 2 SIMATIC Configuration 3 Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Commissioning Manual 04/2013 A5E03874574-02 Legal information

More information

Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper

Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper Symantec Endpoint Protection Sizing and Scalability Best Practices White Paper Product version: 12.1.5 Documentation

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Reputation based Security. Vijay Seshadri Zulfikar Ramzan Carey Nachenberg

Reputation based Security. Vijay Seshadri Zulfikar Ramzan Carey Nachenberg Reputation based Security Vijay Seshadri Zulfikar Ramzan Carey Nachenberg Agenda Reputation Based Security The Problem Reputation Concept Implementing Reputation Deploying Reputation Conclusion 2 The Problem

More information

Email AntiVirus. Administrator Guide

Email AntiVirus. Administrator Guide Email AntiVirus Administrator Guide Email AntiVirus Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

McAfee Web Reporter Turning volumes of data into actionable intelligence

McAfee Web Reporter Turning volumes of data into actionable intelligence McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

W H I T E P A P E R : T E C H N I C AL

W H I T E P A P E R : T E C H N I C AL W H I T E P A P E R : T E C H N I C AL Using Symantec Endpoint Protection 12.1 to Protect Against Advanced Persistent Threats (APTs) Configuration guidelines for endpoint protection against APTs White

More information

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Symantec Endpoint Security Management Solutions Presentation and Demo for: Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate

More information

Symantec Endpoint Protection Analyzer Report

Symantec Endpoint Protection Analyzer Report Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...

More information

Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection

Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection SYMANTEC TECHNOLOGY NETWORK: SECURITY Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection Purpose of this Whitepaper:... 3 Overview... 4 The SEP Client Interface... 5

More information

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license

More information

End to End Security do Endpoint ao Datacenter

End to End Security do Endpoint ao Datacenter do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Protecting the Infrastructure: Symantec Web Gateway

Protecting the Infrastructure: Symantec Web Gateway Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options

More information

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009 Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Enterprise Vault 11 Feature Briefing

Enterprise Vault 11 Feature Briefing Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or

More information

Integrating MSS, SEP and NGFW to catch targeted APTs

Integrating MSS, SEP and NGFW to catch targeted APTs #SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information

More information

Chief Security Strategist Symantec Public Sector

Chief Security Strategist Symantec Public Sector Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

Best Practices for Deploying Behavior Monitoring and Device Control

Best Practices for Deploying Behavior Monitoring and Device Control Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents

More information

Symantec Protection Suite Add-On for Hosted Email and Web Security

Symantec Protection Suite Add-On for Hosted Email and Web Security Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication

More information

UP L17 Virtualization: Security Without Sacrificing Performance

UP L17 Virtualization: Security Without Sacrificing Performance UP L17 Virtualization: Security Without Sacrificing Performance Hands on lab Description In this hands on lab you will learn how to optimize SEP 12 for your virtual desktops to get maximum protection without

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

UP L13: Leveraging the full protection of SEP 12.1.x

UP L13: Leveraging the full protection of SEP 12.1.x UP L13: Leveraging the full protection of SEP 12.1.x Martial RICHARD Principal Field Enablement Manager Endpoint Security UP L13 1 Threat landscape (ISTR Vol.18 April 2013) http://www.symantec.com/threatreport/

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Email Image Control. Administrator Guide

Email Image Control. Administrator Guide Email Image Control Administrator Guide Image Control Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Email Data Protection. Administrator Guide

Email Data Protection. Administrator Guide Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,

More information

2012 Endpoint Security Best Practices Survey

2012 Endpoint Security Best Practices Survey WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec

More information

Symantec Endpoint Protection Small Business Edition Implementation Guide

Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide The software described in this book is furnished under

More information

GFI WebMonitor 2011. Administration and Configuration Manual

GFI WebMonitor 2011. Administration and Configuration Manual GFI WebMonitor 2011 Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as

More information

Keeping Windows 8.1 safe and secure

Keeping Windows 8.1 safe and secure Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Solution Brief: Enterprise Security

Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Integrating Trend Micro OfficeScan 10 EventTracker v7.x Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0

Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0 Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0 Let me phone a friend Jimmy Sandberg Presale Engineer What s new in Symantec Endpoint Protection 12.1 Unrivaled Security Blazing Performance

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Green House Data Spam Firewall Administrator Guide

Green House Data Spam Firewall Administrator Guide Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...

More information

BitDefender for Microsoft ISA Servers Standard Edition

BitDefender for Microsoft ISA Servers Standard Edition BitDefender for Microsoft ISA Servers Standard Edition Copyright 2006 SOFTWIN Edition 1. How Does It Work? As content entering or leaving your company must meet security policies, it is crucial to choose

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to

More information

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Email Quick Reference. Administrator Guide

Email Quick Reference. Administrator Guide Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Endpoint Protection End-User Guide For MacOS X

Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection (SEP) is the evolutionary successor to Symantec Anti-Virus (SAV). SEP provides the anti-virus protection of SAV and

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information