![Microsoft office home & student 2016](https://cdn1.cdnme.se/5447227/9-3/screenshot_2_64e62946ddf2b36521902657.jpg)
![disable symantec disable symantec](https://cdn.softwarereviews.com/production/data_quadrant_images/category_awards/112/original/Endpoint_Protection_DQ.png)
![disable symantec disable symantec](https://images.sftcdn.net/images/t_app-logo-xl,f_auto/p/84bb13a8-96da-11e6-9f69-00163ec9f5fa/516259146/symantec-endpoint-protection-logo.jpg)
Double-click the icon to open the Symantec Endpoint Protection configuration screen.
![disable symantec disable symantec](https://support.vinsep.com/wp-content/uploads/2019/05/Symantec-Endpoint-Protection-15.jpg)
Server check: From the Symantec Endpoint Protection Management Server, Symantec Endpoint Protection Management Console: Select Clients -> Under Clients -> Select the client to be checked -> Under the Policies tab, Settings -> Select External Communications Settings -> Under the Submissions tab -> Ensure "Let computers automatically forward selected anonymous security information to Symantec" is not selected.Ĭriteria: If "Let computers automatically forward selected anonymous security information to Symantec" is selected, this is a finding.Ĭlient check: Locate the Symantec Endpoint Protection icon in the system tray. Symantec Endpoint Protection 12.1 Managed Client Antivirus Using File Reputation lookup is mandated by US CYBERCOM on DoD systems. This type of protection reduces the threat protection time period from days to milliseconds, increases malware detection rates and reduces downtime and remediation costs associated with malware attacks. With File Reputation lookup, a more real-time response to potential malicious code is realized than with the local-running antivirus software, since querying the cloud-based database when a file appears to be suspicious provides up- to- the minute intelligence. The collective intelligence is constantly being updated, more frequently than the typical daily antivirus signature files. Antivirus software vendors use collective intelligence from sensors and cross-vector intelligence from web, email and network threats to compile scores that reflect the likelihood of whether a file in question is malware.
![Microsoft office home & student 2016](https://cdn1.cdnme.se/5447227/9-3/screenshot_2_64e62946ddf2b36521902657.jpg)