This article describes how to add features to, or remove features from, existing Symantec Endpoint Protection (SEP) clients without uninstalling and re-installing them. For example, only virus and spyware protection is installed on the clients, and now it is necessary to add Network Threat Protection (NTP), Proactive Threat Protection (PTP), Intrusion Prevention System (IPS) or Application and Device Control (ADC).
SEP's PTP, Firewall, and IPS components can effectively block an attacker who is able to compromise a computer defended by SEP's antivirus alone.
For managed clients, the installation features can be modified for an entire group through the Symantec Enpoint Protection Manager (SEPM) (enterprise edition only).
For unmanaged clients, or to change a managed client on an individual basis local to that managed client, use Add or Remove Programs (or Programs and Features) to change the installation.
Note: If the client resides in a group that has had a feature set assigned to it, it will revert to that feature set upon the next successful heartbeat.
As each existing SEP client already contains all components (whether or not they are installed) and the version is not being upgraded, no installation files are actually sent over the network. No network bandwidth or traffic spikes should occur when changing the installed feature set.
Because of the rise of drive-by threats and compromises of trusted Web sites, Symantec strongly recommends running Intrusion Prevention System (IPS) on all clients. For more information, read Intrusion Prevention System technology best practices.
Administrators sometimes deploy SEP with only the traditional signature-based AntiVirus component. The additional optional components (Network Threat Protection, Intrusion Prevention System, Application and Device Control, Proactive Threat Protection) greatly enhance SEP's ability to defend against today's sophisticated threats. SEP's Insight technology is particularly effective against the very latest threats for which no AntiVirus signatures yet exist. Unless there is a compelling reason to, each of these additional components should be deployed throughout the organization.