![]() ![]() ![]() There are other things you may want to do, which are:ĭisk space size where SEPMN is installed on (Full disk will prevent from new definitions being downloaded & extracted) Under ‘Endpoint Status’, check to see if there is anything need to be looked at for ‘Out of date’, ‘Disabled’ and also ‘Host Integrity Failed’ – click on the numbers to get the full details. This can also be set up as scheduled reports to be emailed to you so you don’t have to do it manually. If you want ‘in depth’ details of the status of your network, you can use the Reports feature to run some reports to your needs and take action if needed based on the reports you generated. Most of the time, it will be between 1 (Normal) and 2 (Increased alertness) but anything more than 2, you will need to be prepare for any attacks. It will be also helpful to keep your eyes on the ‘Symantec Security Response’ and find out what level it is for the ThreatCon. I then look at under ‘Virus and Risks Activity Summary’ – see if there is anything you need to do, especially under ‘Still Infected’ table – this is where you do some work if it cannot get rid of the virus. You can cross reference the dates & revision number with if needed so you know it’s downloading the definitions without any issue. I make sure that both ‘Latest from Symantec’ and also ‘Latest on Manager’ are up to date. I log on to the console and look at the ‘Home Page’. I will give you an example of what I do first thing in the morning… By doing this, you are making sure your network is in its best of health. It will only take about 10-15 minutes of your time a day, depending on what the issue is. Note: This is based on SEPM v12.1.5 console.ĭoes the clients communicate to the server OK? Are they picking up any viruses/malware? Is it downloading the latest definitions OK? This is where the Day to Day Administration work comes in. While it can ‘run’ itself most of the time, there are some thing you will have to monitor the health of the computers and also the network to ensure you are fully protected. You’ve also deployed the SEP clients to PCs across the network. You’ve installed & set up the SEPM console. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |