Symantec 10551441 Administration Guide - Page 212

Load An NLM alert, configuring, Ping Discovery Service

Page 212 highlights

212 Index Threat History actions 198 Threat History icons 198 types 194 viewing 197 History and Event Log data, filtering 194 History and Log data, exporting to Microsoft Access 199 I icons Scan History 200 Symantec System Center 17 Threat History 198 infected email message 130 infected files cleaning 199 deleting 200 deleting on creation 101 infections, managing 171 Intelligent Updater 166 Intense Discovery about 23, 26 about Discovery types 20 IP addresses, finding computers using 29 IP Discovery 23 IPX addresses, finding computers using 27 J joke programs 90 L LiveUpdate configuring servers to retrieve from Symantec FTP site 154 setting client policy for 165 using with internal LiveUpdate server 155 LiveUpdate servers, configuring internally for managed clients 163 Load An NLM alert, configuring 70 load balancing for roam servers 186 Load from cache only discovery 20 Local Discovery 20, 22, 26 locking server groups 42 log events, forward 204 log forwarding 203 log type comparisons 197 log unauthorized configuration change attempts 51 Lotus Notes, configuring scans for 96 M managed clients changing to unmanaged clients 58 configuring Continuous LiveUpdate for 164 configuring for internal LiveUpdate servers 163 mobile clients 121 manual scans configuring 110 options 92 Message Box alert, configuring 68 mobile clients, managing 121 N NetWare adding Windows NT/2000 server addresses to cache 151 finding NetWare servers 21 network auditing setting options 34 Nsctop.exe 20 P pager message, entering 74 paging service alerting, configuring 73 paging services, configuring for AMS 74 parent server 46 See also servers passwords cached 43 changing 43 changing for server groups 44 saving or unsaving 43 Ping Discovery Service 20 primary server 37, 46 purge of suspicious files from local Quarantines automatically 174 Q Quarantine forwarding for roaming clients 192 moving files to 200, 202 purging suspicious files from 174

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

212
Index
Threat History actions
198
Threat History icons
198
types 194
viewing 197
History and Event Log data, filtering
194
History and Log data, exporting to Microsoft
Access 199
I
icons
Scan History
200
Symantec System Center
17
Threat History
198
infected email message
130
infected files
cleaning 199
deleting 200
deleting on creation
101
infections, managing
171
Intelligent Updater
166
Intense Discovery
about
23, 26
about Discovery types
20
IP addresses, finding computers using
29
IP Discovery
23
IPX addresses, finding computers using
27
J
joke programs
90
L
LiveUpdate
configuring servers to retrieve from Symantec
FTP site
154
setting client policy for
165
using with internal LiveUpdate server
155
LiveUpdate servers, configuring internally for
managed clients
163
Load An NLM alert, configuring
70
load balancing for roam servers
186
Load from cache only discovery
20
Local Discovery
20, 22, 26
locking server groups
42
log events, forward
204
log forwarding
203
log type comparisons
197
log unauthorized configuration change attempts
51
Lotus Notes, configuring scans for
96
M
managed clients
changing to unmanaged clients
58
configuring Continuous LiveUpdate for
164
configuring for internal LiveUpdate
servers 163
mobile clients
121
manual scans
configuring 110
options 92
Message Box alert, configuring
68
mobile clients, managing
121
N
NetWare
adding Windows NT/2000 server addresses to
cache 151
finding NetWare servers
21
network auditing
setting options
34
Nsctop.exe 20
P
pager message, entering
74
paging service alerting, configuring
73
paging services, configuring for AMS
74
parent server
46
See also
servers
passwords
cached 43
changing 43
changing for server groups
44
saving or unsaving
43
Ping Discovery Service
20
primary server
37, 46
purge of suspicious files from local Quarantines
automatically 174
Q
Quarantine
forwarding for roaming clients
192
moving files to
200, 202
purging suspicious files from
174