
You must specify the path name and file name.įor example, you can type the following command: The configuration file includes the following management server settings: The client still runs and protects the client computer.Įxports the client’s configuration file to an. This feature is called Memory Exploit Mitigation in subsequent versions. Version 14: smc -disable -gem *Version 14: smc -disable -gem *Įnables/disables the Symantec Endpoint Protection Generic Memory Exploit Mitigation system. Password requirement for -disable as of 14.2 RU1Įnables/disables the Symantec Endpoint Protection Memory Exploit Mitigation system. Using smc to change a device’s tenant or domainĮnables/disables the Symantec Endpoint Protection firewall and Intrusion Prevention System. You download this file from the cloud console. Requires the Symantec_Agent_Setup.exe installation file for the destination cloud domain or tenant.

Moves a client computer from Symantec Endpoint Protection Manager management to cloud console management. Moves a cloud-managed device to another cloud domain or tenant. Smc -cloudmanaged path\to \Symantec_Agent_Setup.exe If this command is password-protected, the client is disabled within one minute after the end user types the correct password.Ĭhecks whether the smc client service is installed.Ĭhecks whether the smc client service is running. Stops the client service and unloads it from memory. Here is the list of parameters you can use for the smc.exe as of Version 14.3: Parameter For languages other than English, click the links that are provided in the table below.The client part of Symantec’s (sorry Broadcom’s) Endpoint Protection can be controlled via command line in various ways.

Note: These attachments are available only in English.

Each release has its own version of the release notes. Some manuals do not change between releases. For example, the 14.2.2 release uses some of the 14.2.1 product manuals. Note: Some product manuals apply to later product releases. Endpoint Protection 14 guides and documentationįor each Version, download the appropriate files that are attached to this article, as shown in the Zip column.
