Semp
Semp
In this section, you will manage the security policies applied to devices
across your network.
Once you configure the Antivirus and Antispyware Policy, you will
need to assign it to a group or groups of computers.
Select the Group(s) that you want to apply the policy to.
After assigning the policy, you should check the status of real-time
protection on all managed devices.
You can verify whether Real-Time Protection is active for each client.
o Go to Status or Overview.
If any devices are out of compliance, you can force an update from
SEPM.
You can create rules to block specific attachments, such as executable files
or suspicious file types (e.g., .exe, .scr, .vbs, etc.), which are commonly used
in phishing or malware attacks.
For phishing detection, you can also configure the Anti-Phishing policy to
identify suspicious links or deceptive emails.
Conclusion:
External devices like USB drives are limited or blocked to prevent data theft
or malware introduction.
Make sure to test these policies on a smaller group of devices before rolling
them out across your entire network to avoid unintended disruptions.
To restrict software installation on client machines using Symantec
Endpoint Protection Manager (SEPM), you can leverage the Application
and Device Control policy to block the installation of unauthorized
software.
In the Policies tab, under the Policy section, locate and select
Application and Device Control.
If you already have a policy, you can modify it. Otherwise, click Add a
New Policy to create one.
o You can specify the path to the applications (e.g., if you want to
block installers, you can specify a path like C:\Program Files\*).
o You can also create a hash rule, where the policy blocks or
allows specific files based on their cryptographic hash value. This
is useful for blocking specific executable files or preventing the
installation of unauthorized software.
Example Rule:
o Action: Block.
In the Policy configuration screen, ensure that you specify the target
groups of computers that this policy should apply to.
o Select the appropriate Group (or groups) that contain the clients
where you want to restrict software installation.
2. Select the server (or group of servers) that contains the client
machines.
4. Choose the newly created policy (or modified policy) and deploy
it.
o You can view alerts and logs from the Monitors tab in SEPM.
Additional Notes: