Information about deploying Protection Center: the architecture, requirements, appliance creation, and initial setup.
Other languages available:
Deutsch (German), Español (Spanish), Français (French), Italiano (Italian), 日本語 (Japanese), 한국어 (Korean), Português Brasiliero (Brazilian Portuguese), 中文 (简体) (Simplified Chinese), 中文 (繁體) (Traditional Chinese), Русский (Russian), Čeština (Czech), Polski (Polish)
Did this article resolve your issue?
Did this article save you the trouble of contacting technical support?
How can we make this article more helpful?
Email Address (Optional)
Login to Subscribe
Please login to set up your subscription.
Get support for your product, with downloads, knowledge base articles, documentation, and more.
Maximize your product competency and validate technical knowledge to gain the most benefit from your IT investments.
Submit a suspected infected file to Symantec.
Report a suspected erroneous detection (false positive).
Create and manage cases, manage licensing and renewals, submit threats, and enroll with Symantec Rewards.
Customer and Technical Support phone numbers and hours of operation.
User-to-user forums, blogs, videos, and other community resources on Symantec Connect.
Set default language
Do you wish to save this as your future site?