107
Enforced Client Product Guide Using the Virus and Spyware Protection Service
Managing detections
4
Managing detections
To effectively manage your strategy for virus and spyware protection, we recommend that you
proactively track the types of threats being detected and where they are occurring.
Manage your protection strategy with best practices
Manage quarantined files
Manage potentially unwanted program detections (see Scan for spyware on page 93)
Manage your protection strategy with best practices
1 Check your status emails or the SecurityCenter website for an overview of your account’s
status. (See
Sign up for email notifications on page 62 to request status emails.)
Ensure that your computers are up-to-date.
Ensure that protection services are installed on all computers.
2 Check the Detections report and Unrecognized Programs report regularly to see what is being
detected (see
View detections on page 103 and View unrecognized programs on page 105).
3 Check the Unrecognized Programs report frequently to monitor the programs that users are
allowing on client computers.
4 To centralize management and more easily monitor the types of programs allowed on client
computers, define client security settings in a policy.
5 If particular types of detections are occurring frequently or certain computers appear
vulnerable, update the policy to resolve these issues.
Schedule scans or add exclusions (see Set basic virus protection options on page 95).
Enable advanced scanning options (see Set advanced virus protection options on
page 97).
Ensure that spyware protection is enabled (see Set basic spyware protection options on
page 99).
For maximum protection, set your spyware protection to Protect mode to automatically
clean potentially unwanted programs (see Set basic spyware protection options on
page 99).
Enable all advanced spyware options (see Set advanced spyware protection options on
page 102).
6 Use “learn” mode to identify which programs to add to the Approved Programs list, (see Learn
mode on page 101). This ensures that no required programs are deleted before you have the
opportunity to authorize their use. Then change your protection mode to Protect.
7 View the Detection History report periodically to discover trends specific to your network, and
verify your strategy’s success in reducing detections.
Note
Protect mode is not the default setting. For maximum protection, create a policy that includes
Protect mode.