Microsoft and Windows are U.S. registered
trademarks of Microsoft Corporation.
Internet Explorer is either a registered
trademark or trademark of Microsoft
Corporation in the United States and/or other
countries.
Intel and Pentium are trademarks of Intel
Corporation in the U.S. and other countries.
The information contained herein is subject
to change without notice.
The only warranties for HP products and
services are set forth in the express warranty
statements accompanying such products
and services. Nothing herein should be
construed as constituting an additional
warranty. HP shall not be liable for technical
or editorial errors or omissions contained
herein.
Symantec™ Endpoint Protection for
Microsoft® Windows Embedded
Standard 2009 (WES) and Windows® XP
Embedded (XPe) User Guide
HP thin clients
Second Edition (March 2009)
First Edition (August 2008)
506030-002
About this book
The software described in this book is furnished under a license agreement and may be used only in
accordance with the terms of the agreement.
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014,
Responding to application messages ................................................................................................. 12
Responding to Trojan horse warnings ................................................................................................ 13
Responding to blocked traffic messages ............................................................................................ 14
v
Responding to permission status messages ...................................................................................... 14
5 Monitoring and logging
About logs .......................................................................................................................................... 15
About the Security log ........................................................................................................ 16
About the Traffic log ........................................................................................................... 17
About the Packet log .......................................................................................................... 18
About the System log ......................................................................................................... 19
Stopping an active response .............................................................................................................. 22
6 Command Line Management
The command-line interface for the client service .............................................................................. 23
Typing a parameter if the agent is password-protected ..................................................................... 24
Index ................................................................................................................................................................... 26
vi
1System requirements
This chapter includes the following topics:
Hardware requirements on page 1
●
Software requirements on page 1
●
Hardware requirements
The agent requires the following minimum hardware:
®
Pentium® 133 MHz or equivalent
Intel
●
256 MB RAM
●
40 MB available hard disk space
●
One Ethernet adapter (with TCP/IP installed)
●
Software requirements
The agent requires the following software:
Windows Embedded Standard 2009 (WES) operating system or
●
Windows XP Embedded (XPe) operating system or
●
Windows Embedded Point of Service operating system
●
Windows Internet Explorer
●
TCP/IP Networking
●
COM Base
●
IP Security Services
●
NDIS & NDSI User-mode I/O Driver
●
OLE Dialog Interfaces
●
User Interface Core
●
®
6.0
Hardware requirements1
2Introducing the agent
This chapter includes the following topics:
About the Symantec Endpoint Protection for WES and XPe on page 2
●
About security policies on page 2
●
Key features of the agent on page 3
●
About the Symantec Endpoint Protection for WES and
XPe
The Symantec Endpoint Protection for WES and XPe (the agent) is security software that is installed
on embedded endpoints, such as ATMs, Point of Service systems, and thin clients, that run the WES,
XPe, or the XPe Point of Service operating system.
The agent provides a customizable firewall that protects the endpoint from intrusion and misuse, whether
malicious or unintentional. It detects and identifies known Trojan horses, port scans, and other common
attacks. In response, it selectively allows or blocks traffic, or various networking services, applications,
ports, and components.
About security policies
The agent uses security policies, which include firewall rules, and security settings. These policies
protect an individual endpoint from network traffic and the viruses that can cause harm. Firewall rules
determine whether your endpoint allows or blocks an incoming or outgoing application or service from
gaining access through your network connection. Firewall rules allow the agent to systematically allow
or block incoming or outgoing applications and traffic from or to specific IP addresses and ports. Security
settings detect and identify common attacks, send e-mail messages after an attack, display
customizable messages, and accomplish other related security tasks. The configuration of firewall rules
with other security and antivirus settings results in a security agent that protects your endpoint.
2Chapter 2 Introducing the agent
Key features of the agent
The agent can be used in the following networking environments:
Directly connected to the local area network or wireless network
●
Remotely connected using Virtual Private Network (VPN) or dial-up
●
Completely disconnected from any network
●
The agent does not support location awareness or host integrity. Host integrity will be supported in a
later release.
Key features of the agent3
3Agent basics
This chapter includes the following topics:
Opening the agent on page 4
●
Navigating the main window on page 4
●
Using the menus and the toolbar on page 5
●
About the notification area icon on page 8
●
Testing your endpoint on page 10
●
Opening the agent
The agent is designed to start automatically when you turn on your endpoint, protecting you immediately.
To configure your agent or review logs of potential attacks on your agent, you open the agent first.
To open the agent
1.On the Windows taskbar, click Start > Programs.
2.Click Symantec > Symantec Endpoint Protection for Windows XP Embedded agent.
Navigating the main window
Once you open the agent, you see the main screen. The main screen provides real-time network traffic
updates, online status, links to logs, and access to various advanced rules, security settings, and
antivirus settings.
The user interface changes depending on the different control modes of the agent, including user mode,
admin mode, or mixed mode. In addition, some icons may not appear, depending on how your system
administrator configured the agent.
The agent is resizable, so you can view it as a full-screen or part-screen image.
4Chapter 3 Agent basics
Loading...
+ 23 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.