Symantec Endpoint Protection: Difference between revisions

Content deleted Content added
No edit summary
Line 34:
Endpoint Protection scans computers for security threats.<ref name="SearchSecurity20182"/> It is used to prevent unapproved programs from running,<ref name="SearchSecurity20182"/> and to apply firewall policies that block or allow network traffic.<ref>{{Cite web |url=http://www.symantec.com/docs/HOWTO80961 |title=About the Symantec Endpoint Protection firewall |date=28 October 2016 |website=Enterprise Technical Support |publisher=[[NortonLifeLock|Symantec]]}}</ref> It attempts to identify and block malicious traffic in a corporate network or coming from a [[web browser]].<ref>{{Cite web |url=http://www.symantec.com/docs/HOWTO80870 |title=How intrusion prevention works |date=28 October 2016 |website=Enterprise Technical Support |publisher=[[NortonLifeLock|Symantec]]}}</ref> It uses aggregate information from users to identify malicious software.<ref name="scmag" /> As of 2016, Symantec claims to use data from 175 million devices that have installed Endpoint Security in 175 countries.<ref name="scmag" />
 
Endpoint Protection has an administrative console that allows the IT department to modify security policies for each department,<ref name="SearchSecurity20182"/> such as which programs or files to exclude from antivirus scans.<ref name="scmag" /> It does not manage mobile devices directly, but treats them as peripherals when connected to a computer and protects the computer from any malicious software on the mobile devicedevices.<ref name="scmag" />
 
==Vulnerabilities==