HP t5740 User Manual

Symantec™ Endpoint Protection for
®
Microsoft
Windows Embedded Standard 2009 (WES) and Windows (XPe) User Guide
HP thin clients
®
XP Embedded
Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Internet Explorer is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries.
Intel and Pentium are trademarks of Intel Corporation in the U.S. and other countries.
The information contained herein is subject to change without notice.
The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Symantec™ Endpoint Protection for Microsoft® Windows Embedded Standard 2009 (WES) and Windows® XP Embedded (XPe) User Guide
HP thin clients
Second Edition (March 2009)
First Edition (August 2008)
506030-002
About this book
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014,
http://www.symantec.com
iii
iv About this book
Table of contents
1 System requirements
Hardware requirements ........................................................................................................................ 1
Software requirements ......................................................................................................................... 1
2 Introducing the agent
About the Symantec Endpoint Protection for WES and XPe ............................................................... 2
About security policies .......................................................................................................................... 2
Key features of the agent ..................................................................................................................... 3
3 Agent basics
Opening the agent ................................................................................................................................ 4
Navigating the main window ................................................................................................................. 4
Using the menus and the toolbar ......................................................................................................... 5
Viewing traffic history ........................................................................................................... 6
Displaying broadcast traffic .................................................................................................. 6
Viewing currently running applications and services ........................................................... 6
Displaying or hiding the message area ................................................................................ 7
Viewing current security policy and communication status .................................................. 7
About the notification area icon ............................................................................................................ 8
About responding to the flashing icon .................................................................................. 8
Displaying the shortcut menu .............................................................................................. 8
Disabling protection temporarily .......................................................................................... 9
Changing security levels ...................................................................................................... 9
Enabling password protection .............................................................................................. 9
Testing your endpoint ......................................................................................................................... 10
4 Responding to messages and warnings
About message types ......................................................................................................................... 11
Application messages ........................................................................................................ 11
Changed application messages ......................................................................................... 12
Responding to application messages ................................................................................................. 12
Responding to Trojan horse warnings ................................................................................................ 13
Responding to blocked traffic messages ............................................................................................ 14
v
Responding to permission status messages ...................................................................................... 14
5 Monitoring and logging
About logs .......................................................................................................................................... 15
About the Security log ........................................................................................................ 16
About the Traffic log ........................................................................................................... 17
About the Packet log .......................................................................................................... 18
About the System log ......................................................................................................... 19
Viewing logs ....................................................................................................................................... 19
Back tracing logged events ................................................................................................................ 20
Exporting logs ..................................................................................................................................... 21
Filtering logged events ....................................................................................................................... 21
Stopping an active response .............................................................................................................. 22
6 Command Line Management
The command-line interface for the client service .............................................................................. 23
Typing a parameter if the agent is password-protected ..................................................................... 24
Index ................................................................................................................................................................... 26
vi

1 System requirements

This chapter includes the following topics:
Hardware requirements on page 1
Software requirements on page 1

Hardware requirements

The agent requires the following minimum hardware:
®
Pentium® 133 MHz or equivalent
Intel
256 MB RAM
40 MB available hard disk space
One Ethernet adapter (with TCP/IP installed)

Software requirements

The agent requires the following software:
Windows Embedded Standard 2009 (WES) operating system or
Windows XP Embedded (XPe) operating system or
Windows Embedded Point of Service operating system
Windows Internet Explorer
TCP/IP Networking
COM Base
IP Security Services
NDIS & NDSI User-mode I/O Driver
OLE Dialog Interfaces
User Interface Core
®
6.0
Hardware requirements 1

2 Introducing the agent

This chapter includes the following topics:
About the Symantec Endpoint Protection for WES and XPe on page 2
About security policies on page 2
Key features of the agent on page 3

About the Symantec Endpoint Protection for WES and XPe

The Symantec Endpoint Protection for WES and XPe (the agent) is security software that is installed on embedded endpoints, such as ATMs, Point of Service systems, and thin clients, that run the WES, XPe, or the XPe Point of Service operating system.
The agent provides a customizable firewall that protects the endpoint from intrusion and misuse, whether malicious or unintentional. It detects and identifies known Trojan horses, port scans, and other common attacks. In response, it selectively allows or blocks traffic, or various networking services, applications, ports, and components.

About security policies

The agent uses security policies, which include firewall rules, and security settings. These policies protect an individual endpoint from network traffic and the viruses that can cause harm. Firewall rules determine whether your endpoint allows or blocks an incoming or outgoing application or service from gaining access through your network connection. Firewall rules allow the agent to systematically allow or block incoming or outgoing applications and traffic from or to specific IP addresses and ports. Security settings detect and identify common attacks, send e-mail messages after an attack, display customizable messages, and accomplish other related security tasks. The configuration of firewall rules with other security and antivirus settings results in a security agent that protects your endpoint.
2 Chapter 2 Introducing the agent

Key features of the agent

The agent can be used in the following networking environments:
Directly connected to the local area network or wireless network
Remotely connected using Virtual Private Network (VPN) or dial-up
Completely disconnected from any network
The agent does not support location awareness or host integrity. Host integrity will be supported in a later release.
Key features of the agent 3

3 Agent basics

This chapter includes the following topics:
Opening the agent on page 4
Navigating the main window on page 4
Using the menus and the toolbar on page 5
About the notification area icon on page 8
Testing your endpoint on page 10

Opening the agent

The agent is designed to start automatically when you turn on your endpoint, protecting you immediately. To configure your agent or review logs of potential attacks on your agent, you open the agent first.
To open the agent
1. On the Windows taskbar, click Start > Programs.
2. Click Symantec > Symantec Endpoint Protection for Windows XP Embedded agent.

Navigating the main window

Once you open the agent, you see the main screen. The main screen provides real-time network traffic updates, online status, links to logs, and access to various advanced rules, security settings, and antivirus settings.
The user interface changes depending on the different control modes of the agent, including user mode, admin mode, or mixed mode. In addition, some icons may not appear, depending on how your system administrator configured the agent.
The agent is resizable, so you can view it as a full-screen or part-screen image.
4 Chapter 3 Agent basics
Loading...
+ 23 hidden pages