Symantec Drive Encryption for Windows

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Symantec Drive Encryption for Windows"

Transcription

1 Symantec Drive Encryption for Windows Technical Note 10.3

2

3 Released January Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton Zone, PGP, Pretty Good Privacy, and the PGP logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Java is a registered trademark of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ("Third Party Programs"). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Licensed Software does not alter any rights or obligations you may have under those open source or free software licenses. For more information on the Third Party Programs, please see the Third Party Notice document for this Symantec product that may be available at the Third Party Legal Notice Appendix that may be included with this Documentation and/or Third Party Legal Notice ReadMe File that may accompany this Symantec product. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED"AS IS"AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , et seq. Commercial Computer Software and Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA Symantec Home Page (

4

5 Contents Introduction 1 Scenario 1: Troubleshooting common Windows issues 1 Scenario 2: Booting and accessing the server 1 System Requirements 3 Recommended Best Practices 5 Perform regular backups and back up the disk before you encrypt it 5 Ensure the health of the disk before you encrypt it 5 Know your RAID hardware and software 5 Maintain separate test and production servers, and production processes and procedures 6 Build and test recovery procedures 6 Be certain that you will have AC power throughout the encryption process 7 Follow installation procedures to install only the Symantec Drive Encryption drivers 8 Run a pilot test to ensure software compatibility 8 Understand how performance is affected 9 Perform disk recovery on decrypted disks 9 Remote rebooting of the Windows Server 9

6

7 1 Introduction The purpose of this document is to define best practices for server system administrators before they install Symantec Drive Encryption on Microsoft Windows Servers. Symantec Drive Encryption for Windows Servers is intended for servers that are located in risky locations, such as kiosks or remote offices where server theft is possible. As an overall best practice, encrypt your Windows Server with Symantec Drive Encryption, to protect your operating system and file system. An encrypted server requires changes to normal operational, maintenance, and recovery procedures. Two scenarios follow that highlight some of those changes, in the areas of fixing typical Windows issues and rebooting and accessing the server. In the Recommended Best Practices (on page 5) chapter, specific tasks that are related to encrypted servers are described. Scenario 1: Troubleshooting common Windows issues On an unencrypted server: 1 Change a registry value or driver 2 Make file system changes For an encrypted server: 1 Before encryption, create a customized Microsoft Windows Preinstallation Environment (Windows PE) disc with the Symantec Drive Encryption drivers loaded. 2 After encryption, use the customized Windows PE disc to authenticate to the disk. Authentication gives you access to the encrypted file system. 3 Modify the registry values or drivers. Note: For information on how to create a Windows PE disc, go to the Symantec Knowledgebase ( and search for TECH149060, Windows Preinstallation Environment & BartPE Tools. Scenario 2: Booting and accessing the server For an unencrypted server: 1 Install a service pack or updated driver. 2 Reboot. For an encrypted server:

8 2 Introduction Scenario 2: Booting and accessing the server 1 Authenticate at the PGP BootGuard login screen prior to starting the Windows Server OS. 2 Install a service pack or updated driver. 3 Reboot. Note: For remote access, use the provided PGP WDE Command Line "Boot Bypass" feature. This feature lets you reboot a system one or more times without authenticating. For more information, see Remote Booting of the Windows Server (see "Remote rebooting of the Windows Server" on page 9).

9 2 System Requirements Symantec Drive Encryption is supported on the following Windows Server versions: Windows Server 2012 R2 64-bit Edition with internal RAID 1 and RAID 5 Windows Server bit Edition with internal RAID 1 and RAID 5 Windows Server 2008 R2 64-bit Edition with internal RAID 1 and RAID 5 Windows Server bit Edition (Service Pack 1 and Service Pack 2) with internal RAID 1 and RAID 5 Note: Dynamic disks and software RAID are not supported. A broad array of other hardware may work well with Symantec Drive Encryption. However, Symantec Drive Encryption has been tested and is compatible with the hardware that is listed in this table: OS tested RAID version Hardware tested Windows Server 2012 R2 RAID 1 and RAID 5 LSI M1015 RAID controller on IBM X3650 M3 server Windows Server 2012 RAID 1 and RAID 5 LSI M1015 RAID controller on IBM X3650 M3 server Windows Server 2008 R2 RAID 5 PERC 6i integrated RAID controller Windows Server 2008 Service Pack 2 RAID 1 LSI M1015 RAID controller on IBM X3650 M3 server

10

11 3 Recommended Best Practices Symantec Corporation recommends the best practices described in this chapter. They are useful for reviewing your server management operational business practices and for preparing to encrypt your disk with Symantec Drive Encryption. Follow the recommendations to prepare your server environment before encrypting your disk, to protect your data during and after encryption, and then follow them for normal server operations. Perform regular backups and back up the disk before you encrypt it Before you install Symantec Drive Encryption and encrypt your disk, back up your disk. This backup ensures that you will not lose any data if your system is lost, stolen, or you cannot decrypt the disk. Ensure the health of the disk before you encrypt it Cyclic redundancy check (CRC) errors are not uncommon to encounter while you encrypt a hard disk. In standalone installations of Symantec Encryption Desktop, if Symantec Drive Encryption encounters a hard drive or partition with bad sectors, it pauses the encryption process. This pause lets you remedy the problem before you continue with the encryption process, thus avoiding potential disk corruption and lost data. In a Symantec Encryption Management Server managed environment, Symantec Drive Encryption may encounter bad sectors on a hard drive or partition. If this situation happens, Symantec Drive Encryption logs an event in the server logs and the disk encryption continues. Before you run Symantec Drive Encryption, use a third-party scan disk utility that performs a low-level integrity check and repairs any inconsistencies with the drive that can lead to CRC errors. Third-party software, such as SpinRite or Norton Disk Doctor can correct errors that would disrupt the encryption of the disk. Note: As a best practice, highly fragmented disks should be defragmented before you encrypt the disk. Know your RAID hardware and software You are advised to read RAID documentation completely. Understand the RAID rebuilding process based on the hardware you are using, before installing Symantec Drive Encryption on the server.

12 6 Recommended Best Practices Maintain separate test and production servers, and production processes and procedures Before rebuilding RAID, take a backup of the data using a backup utility. Maintain separate test and production servers, and production processes and procedures Maintain a separate test and production environment. Modification of a production server should be strictly limited. Ensure that you use the test system to test software updates, driver updates, and Windows service packs before updating the production server. Build and test recovery procedures Be aware that changes to the normal server operations and maintenance procedures are required, due to encryption of the server file system. You are advised to: 1 Create and test a customized Windows PE disc with Symantec Drive Encryption drivers installed. 2 Create a Symantec Drive Encryption recovery disc. Create a customized Windows PE disc with the Symantec Drive Encryption drivers The Symantec Knowledge Base contains articles with instructions for creating a Windows PE Disc for Symantec Drive Encryption recovery. Creating a customized Windows PE CD or USB flash drive provides a bootable recovery tool that you can use for rescue purposes. For example, you can use the DOS commands to copy, edit, back up, and delete files. The Symantec Knowledge Base contains technical notes with instructions for creating a 32-bit Windows PE disc. While you can use the 32-bit Windows PE disc on a 64-bit system, you cannot create a 64-bit Windows PE disc. For information on how to create and use a Windows PE disc, go to the Symantec Knowledgebase ( and search for TECH149060, Windows Preinstallation Environment & BartPE Tools. Note: The Technical Note includes instructions for customizing the BartPE or BartPE-based tools. Create a recovery disc While the chances are low that a master boot record can become corrupted on a boot disk or partition protected by Symantec Drive Encryption, corruption can happen. Before you encrypt a boot disk or partition using Symantec Drive Encryption create a recovery disc. For information on how to obtain the.iso images and create a recovery disc for Symantec Drive Encryption, go to the Symantec Knowledgebase ( and refer to the KB articles as in the following table:

13 Recommended Best Practices 7 Be certain that you will have AC power throughout the encryption process KB article title TECH19905: Symantec Drive Encryption for Windows Recovery Disk Images KB article link TECH19906: Symantec Drive Encryption for Mac OS X Recovery Disk Images TECH199903: PGP Desktop for Windows Recovery Disk Images TECH197687: PGP Whole Disk Encryption for Mac OS X (PGP Desktop ) Recovery Disk Images TECH176201: PGP Desktop for Windows Recovery Disk Images TECH176187: PGP Whole Disk Encryption for Mac OS X (PGP Desktop ) Recovery Disk Images TECH152604: PGP Desktop 10.0 and 10.1 for Windows Recovery Disk Images TECH152610: Symantec Drive Encryption (formerly known as PGP Whole Disk Encryption) for Mac OS X Recovery Disk Images (versions 10.0.x x) Be certain that you will have AC power throughout the encryption process If loss of power during encryption is a possibility, consider choosing the Power Failure Safety option before starting the disk encryption. Also consider this option if you do not have an uninterruptible power supply for your computer.

14 8 Recommended Best Practices Follow installation procedures to install only the Symantec Drive Encryption drivers Follow installation procedures to install only the Symantec Drive Encryption drivers Symantec Corporation offers a number of product suites that contain Symantec Drive Encryption, Symantec File Share Encryption, and Symantec Desktop . When you install Symantec Encryption client products on your server, ensure that you use the.msi installation switches so that you do not install the Symantec File Share Encryption and Symantec Desktop drivers. Instructions for utilizing the.msi switches are included in the Symantec Knowledgebase. Go to Symantec Knowledgebase ( and search for TECH149282, "PGP Desktop Installation (msi) Switches." An example of the.msi switch is: MsiExec /I pgpdesktop.msi PGP_INSTALL_WDE=1 PGP _INSTALL_MAPI=0 PGP_INSTALL_NOTES=0 PGP_INSTALL_LSP=0 PGP_INSTALL_NETSHARE=0 Installing these drivers can impact the performance of the server and functionality that is hosted on the server. Additionally, you cannot host Symantec File Share Encryption folders on a system that has Symantec File Share Encryption enabled. In a Symantec File Share Encryption environment, these servers are mainly used for hosting shared folders and installing the File Share drivers on the server. Run a pilot test to ensure software compatibility As a security practice, test Symantec Drive Encryption on a test server to ensure that Symantec Drive Encryption does not conflict with other software. Run the test before rolling Symantec Drive Encryption out to a large number of servers. This pre-test is particularly useful in environments that use a standardized Corporate Operating Environment (COE) image. The following software is not compatible with Symantec Drive Encryption: Symantec Endpoint Encryption Full Disk Faronics Deep Freeze (any edition) Utimaco Safeguard Easy 3.x Absolute Software's CompuTrace security and tracking product. Symantec Drive Encryption is compatible only with the BIOS configuration of CompuTrace. Using CompuTrace in MBR mode is not compatible. Hard disk encryption products from GuardianEdge Technologies: Encryption Anywhere Hard Disk and Encryption Plus Hard Disk products, formerly known as PC Guardian products. The following programs co-exist with Symantec Drive Encryption on the same system, but will block the Symantec Drive Encryption feature: Control Break International Safeboot Solo SecureStar Technologies SecureStar SCPP

15 Recommended Best Practices 9 Understand how performance is affected Understand how performance is affected Run performance testing as described in Run a pilot test to ensure software compatibility (on page 8). During testing, Symantec Corporation did not observe any major performance-related issues with RAID 1 or RAID 5. However, performance can vary depending on the processor, memory, drives, and so on. For example, a 500GB RAID 5 system with three disks can take 8-9 hours to encrypt. After initial encryption, performance can be affected slightly. However, performance is dependent upon individual server configurations. Perform disk recovery on decrypted disks If you need to perform recovery activities on a disk that is protected with Symantec Drive Encryption, when possible, decrypt the disk first. Do this by selecting Disk > Decrypt in Symantec Encryption Desktop, using your prepared Symantec Drive Encryption Recovery Disk, or by connecting the hard disk using a USB cable to a second system and decrypting from that system's Symantec Drive Encryption software. Once the disk is decrypted, proceed with your recovery activities. Remote rebooting of the Windows Server WDE Command Line contains the Boot Bypass function. This function lets you configure Symantec Drive Encryption so that PGP BootGuard does not require a passphrase at the next boot. This boot bypass allows remote rebooting of the server without someone being physically present. For more information on Boot Bypass, see Booting and accessing the Server (see "Scenario 2: Booting and accessing the server" on page 1). The Boot Bypass feature lets you reboot a system one or more times without having to authenticate at the PGP BootGuard screen. Boot Bypass can be set for boot disks only. You can configure Symantec Drive Encryption to authenticate automatically at the PGP BootGuard screen and boot the system. Note: You must set up Boot Bypass in advance. Boot Bypass is generally used for remote deployment or upgrade scenarios when a reboot is required; for example, for patch management. Caution: Boot Bypass bypasses the security of a system. Use it sparingly and with caution. The Boot Bypass commands are: --add-bypass: Enables the specified disk for Boot Bypass. --check-bypass: Indicates whether the specified disk is enabled for Boot Bypass.

16 10 Recommended Best Practices Remote rebooting of the Windows Server --remove-bypass: Removes Boot Bypass from a disk where it is enabled.

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.

More information

Yale Software Library

Yale Software Library e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 432-9000 or helpdesk@yale.edu Installation PGP Desktop for Windows Operating Systems Preparing your computer:

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

PGP Whole Disk Encryption Quick Start Guide version 9.6

PGP Whole Disk Encryption Quick Start Guide version 9.6 PGP Whole Disk Encryption Quick Start Guide version 9. What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Symantec Drive Encryption for Windows Quick Start Guide Version 10.3

Symantec Drive Encryption for Windows Quick Start Guide Version 10.3 Symantec Drive Encryption for Windows Quick Start Guide Version 10.3 What is Symantec Drive Encryption? Symantec Drive Encryption is a software tool that provides multiple ways to protect your data on

More information

PGP Whole Disk Encryption for Windows Quick Start Guide Version 10.2

PGP Whole Disk Encryption for Windows Quick Start Guide Version 10.2 PGP Whole Disk Encryption for Windows Quick Start Guide Version 10.2 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect

More information

Patch Assessment Content Update Release Notes for CCS 11.1. Version: 2016-02 Update

Patch Assessment Content Update Release Notes for CCS 11.1. Version: 2016-02 Update Patch Assessment Content Update Release Notes for CCS 11.1 Version: 2016-02 Update Patch Assessment Content Update 2016-02 Release Notes for CCS 11.1 Legal Notice Copyright 2016 Symantec Corporation. All

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

PGP Whole Disk Encryption Quick Start Guide Version 9.8

PGP Whole Disk Encryption Quick Start Guide Version 9.8 PGP Whole Disk Encryption Quick Start Guide Version 9.8 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Enabling Windows Management Instrumentation Guide

Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Endpoint Encryption Device Control Release Notes

Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control 8.2.0 www.symantec.com About Symantec Endpoint Encryption Device Control Symantec Endpoint Encryption

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Symantec Endpoint Encryption Full Disk for Mac OS X

Symantec Endpoint Encryption Full Disk for Mac OS X Symantec Endpoint Encryption Full Disk for Mac OS X User's Guide 8.2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Policy Based Encryption Essentials. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Note: To view the most recent version of this document, go to the Products section on the Symantec Corporation Web site.

Note: To view the most recent version of this document, go to the Products section on the Symantec Corporation Web site. 1 of 5 Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of Symantec Endpoint Encryption Full Disk for Mac OS X. Symantec Corporation

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Quick Start Guide for Symantec Event Collector for ForeScout CounterACT

Quick Start Guide for Symantec Event Collector for ForeScout CounterACT Quick Start Guide for Symantec Event Collector for ForeScout CounterACT Quick Start Guide for Symantec Event Collector for ForeScout CounterACT The software described in this book is furnished under a

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Norton Small Business. Getting Started Guide

Norton Small Business. Getting Started Guide Norton Small Business Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright 2015

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

How Endpoint Encryption Works

How Endpoint Encryption Works WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Endpoint Encryption Full Disk Release Notes

Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk 7.0.6 Symantec Endpoint Encryption Framework 7.0.6 www.symantec.com About SEE Full Disk SEE Full Disk protects

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide Symantec Protection for SharePoint Servers 6.0.4 Getting Started Guide Symantec Protection for SharePoint Servers Getting Started Guide The software described in this book is furnished under a license

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

White Paper: Whole Disk Encryption

White Paper: Whole Disk Encryption How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec Enterprise Vault.cloud Compatibility List. March 13, 2015

Symantec Enterprise Vault.cloud Compatibility List. March 13, 2015 Symantec Enterprise Vault.cloud Compatibility List March 13, 2015 Symantec Enterprise Vault.cloud: Compatibility List Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

IBM Lotus Protector for Mail Encryption

IBM Lotus Protector for Mail Encryption IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

IBM Lotus Protector for Mail Encryption

IBM Lotus Protector for Mail Encryption IBM Lotus Protector for Mail Encryption for Windows User's Guide 2.1.1 Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.1. Released

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Backup Exec Management Plug-in for VMware User's Guide

Symantec Backup Exec Management Plug-in for VMware User's Guide Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 8.0.1 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks

More information

Boundary Encryption.cloud Deployment Process Overview

Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All

More information

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows Symantec Enterprise Vault Technical Note Administering the Monitoring database Windows December 2006 Symantec Enterprise Vault Administering the Monitoring database Copyright 2006 Symantec Corporation.

More information

Symantec ESM Agent For IBM iseries AS/400

Symantec ESM Agent For IBM iseries AS/400 Symantec ESM Agent For IBM iseries AS/400 Version 6.5 Release Notes Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec Enterprise Security

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Using Backup Exec System Recovery's Offsite Copy for disaster recovery

Using Backup Exec System Recovery's Offsite Copy for disaster recovery Using Backup Exec System Recovery's Offsite Copy for disaster recovery The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

PGP Desktop for Windows Quick Start Guide Version 10.0

PGP Desktop for Windows Quick Start Guide Version 10.0 PGP Desktop for Windows Quick Start Guide Version 10.0 What is PGP Desktop? PGP Desktop provides comprehensive security for desktops and laptops, making it possible for enterprises, workgroups, and individuals

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud: Microsoft Exchange Managed Folder Archiving Guide The software described in this book is furnished under

More information

Patch Assessment Content Update Release Notes for CCS 11.1. Version: 2015-10 Update

Patch Assessment Content Update Release Notes for CCS 11.1. Version: 2015-10 Update Patch Assessment Content Update Release Notes for CCS 11.1 Version: 2015-10 Update Patch Assessment Content Update 2015-10 Release Notes for CCS 11.1 Legal Notice Copyright 2015 Symantec Corporation. All

More information

Symantec Encryption Desktop for Mac OS X

Symantec Encryption Desktop for Mac OS X Symantec Encryption Desktop for Mac OS X User's Guide 10.3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Critical System Protection 5.2.9 Agent Guide

Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec AntiVirus for Network Attached Storage Integration Guide

Symantec AntiVirus for Network Attached Storage Integration Guide Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Update 0 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for

More information

Wise Package Studio 8.0 MR1 Release Notes

Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software

More information

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Symantec NetBackup Clustered Master Server Administrator's Guide

Symantec NetBackup Clustered Master Server Administrator's Guide Symantec NetBackup Clustered Master Server Administrator's Guide for Windows, UNIX, and Linux Release 7.5 Symantec NetBackup Clustered Master Server Administrator's Guide The software described in this

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Symantec Secure Email Proxy Administration Guide

Symantec Secure Email Proxy Administration Guide Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

Compatibility with Encryption Products

Compatibility with Encryption Products Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability

More information

SafeGuard Enterprise Tools guide

SafeGuard Enterprise Tools guide SafeGuard Enterprise Tools guide Product version: 5.60 Document date: April 2011 Contents 1 About this guide...3 2 Displaying the system status with SGNState...3 3 Reverting an unsuccessful installation

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec File Share Encryption Quick Start Guide Version 10.3

Symantec File Share Encryption Quick Start Guide Version 10.3 Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share

More information

Symantec ESM agent for IBM AS/400

Symantec ESM agent for IBM AS/400 Symantec ESM agent for IBM AS/400 Version 6.5 Installation Guide 1 Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec Enterprise Security

More information

Symantec NetBackup PureDisk Deduplication Option Guide

Symantec NetBackup PureDisk Deduplication Option Guide Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information