

Virus and Spyware threat protection identifies and mitigates the threats that attempt to or have gained access to your computers by using the Symantec signatures. Proactive Threat Protection identifies and mitigates the threats based on the threats’ behavior.

Network and Host Exploit Mitigation protection blocks threats from accessing your computer by using rules and signatures. The layers are Network and Host Exploit Mitigation, Proactive Threat Protection, and V irus and Spyware Protection. Symantec Endpoint Protection protects endpoint computing devices from viruses, threats, and risks, and provides three layers of protection to your endpoint computing devices. What is Symantec Endpoint Protection and Network Threat Protection?
#Microsoft hosted network adapter identifying how to
Before you configure the client firewall, you should understand how the firewall processes rules, how to create rules effectively (protect while maximizing performance), and how the firewall interacts with the other components of Symantec Endpoint Protection. A poorly constructed policy can effectively let attackers in, while preventing trusted sources from accessing necessary resources. The Challenge of Configuring the Client Firewallįirewalls are only as good as the policies they enforce. This paper focuses on the network threat protection (or client firewall) component of Symantec™ Endpoint Protection specifically the client firewall’s purpose, elements of a firewall policy, how firewall rules are processed, and a best practice approach for implementing a firewall policy in your network.

A successful attack can compromise classified information, halt productivity, and consequently destroy reputations and brand value.įirewalls that are installed on endpoint computers protect against such attacks by creating a barrier between the computers and the external networks, including the Internet. While most connections pose no threat to your computer or your network, others may be an attempt to infiltrate your network through unprotected computers. When computers in a private network connect to the Internet, they physically connect their network to countless unknown networks.
