Managing SONAR

SONAR is part of Proactive Threat Protection on your client computers and the Virus and Spyware Protection policy in
Symantec Endpoint Protection Manager
Managing SONAR
Learn how SONAR works
Learn how SONAR detects unknown threats. Information about how SONAR works can help you make decisions about using SONAR in your security network. See:
Check that SONAR is enabled
To provide the most complete protection for your client computers you should enable SONAR. SONAR interoperates with some other
Symantec Endpoint Protection
features. SONAR requires Auto-Protect.
You can use the Clients tab to check whether Proactive Threat Protection is enabled on your client computers. See:
Check the default settings for SONAR
SONAR settings are part of a Virus and Spyware Protection policy. See:
Make sure that Insight lookups are enabled
SONAR uses reputation data in addition to heuristics to make detections. If you disable Insight lookups, SONAR makes detections by using heuristics only. The rate of false positives might increase, and the protection that SONAR provides is limited.
You enable or disable Insight Lookups in the
dialog. See:
Monitor SONAR events to check for false positive detections
You can use the SONAR log to monitor events.
You can also view the SONAR Detection Results report (under Risk Reports) to view information about detections. See:
Adjust SONAR settings
You can change the detection action for some types of threats that SONAR detects. You might want to change the detection action to reduce false positive detections.
You also might want to enable or disable notifications for high or low risk heuristic detections. See:
Prevent SONAR from detecting the applications that you know are safe
SONAR might detect the files or applications that you want to run on your client computers. You can use an Exceptions policy to specify exceptions for the specific files, folders, or applications that you want to allow. For the items that SONAR quarantines, you can create an exception for the quarantined item from the SONAR log.
You also might want to set SONAR actions to log and allow detections. You can use application learning so that
Symantec Endpoint Protection
learns the legitimate applications on your client computers. After
Symantec Endpoint Protection
learns the applications that you use in your network, you can change the SONAR action to Quarantine.
If you set the action for high risk detections to log only, you might allow potential threats on your client computers.
For more information, see:
Prevent SONAR from examining some applications
In some cases, an application might become unstable or cannot run when SONAR injects code into the application to examine it. You can create a file, folder, or application exception for the application. See:
Manage the way SONAR detects the applications that make DNS or host file changes
You can use the SONAR policy settings to globally adjust the way SONAR handles detections of DNS or host file changes. You can use the Exceptions policy to configure exceptions for specific applications. See:
Allow clients to submit information about SONAR detections to Symantec
Symantec recommends that you enable submissions on your client computers. The information that clients submit about detections helps Symantec address threats. The information helps Symantec create better heuristics, which results in fewer false positive detections. See: