There are a few of us around here who use SEP 12. What's new in Symantec Endpoint Protection 12.1.2 Table: New features in Symantec Endpoint Protection 12.1.2 describes the new features in the latest version of Symantec Endpoint Protection. System requirements Symantec Endpoint Protection now supports additional new platforms and configurations. You can now install Symantec Endpoint Protection Manager on the following operating systems: •Windows 8 •Windows Server 2012 You can now install the Symantec Endpoint Protection client on the following operating systems: •Windows 8 and Windows Server 2012 •Mac OS X 10.8, Mountain Lion •Mac OS X case-sensitive formatted volumes You can now use Symantec Endpoint Protection Manager from the following browsers: •Microsoft Internet Explorer 10 •Google Chrome For the complete list of system requirements: Virtualization Symantec Endpoint Protection includes the following virtualization improvements: •A VMware vShield-enabled Shared Insight Cache. Delivered in a Security Virtual Appliance, you can deploy the vShield-enabled Shared Insight Cache into a VMware infrastructure on each host. The vShield-enabled Shared Insight Cache makes file scanning more efficient. You can monitor the Security Virtual Appliance and client status in Symantec Endpoint Protection Manager. See What do I need to do to use a vShield-enabled Shared Insight Cache?. •For managing Guest Virtual Machines (GVMs) in non-persistent virtual desktop infrastructures: ◦Symantec Endpoint Protection Manager includes a new option to configure the aging period for offline non-persistent GVMs. Symantec Endpoint Protection Manager removes the non-persistent GVM clients that have been offline longer than the specified time period. ◦Symantec Endpoint Protection clients now have a configuration setting to indicate that they are non-persistent GVMs. You can filter out the offline non-persistent GVMs in the Clients tab view in Symantec Endpoint Protection Manager. See Using Symantec Endpoint Protection in non-persistent virtual desktop infrastructures. Virus and Spyware Protection combats a wide range of threats, including spyware, worms, Trojan horses, rootkits, and adware. File System Auto-Protect continuously inspects all computer files for viruses and security risks. Internet Email Auto-Protect scans the incoming and outgoing email messages that use the POP3 or SMTP communications protocol. Microsoft Outlook Auto-Protect scans incoming and outgoing Outlook email messages. Proactive threat technology includes SONAR, which offers real-time protection against zero-day attacks. SONAR can stop attacks even before traditional signature-based definitions detect a threat. SONAR uses heuristics as well as file reputation data to make decisions about applications or files. Proactive Threat Protection Network Threat Protection includes a firewall and an intrusion prevention system. The rules-based firewall prevents unauthorized users from accessing your computer.