Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection

Size: px
Start display at page:

Download "Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection"

Transcription

1 SYMANTEC TECHNOLOGY NETWORK: SECURITY Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection

2 Purpose of this Whitepaper:... 3 Overview... 4 The SEP Client Interface... 5 Changing Policy Configuration Settings... 5 Accessing the SEP Client Interface... 9 Disabling/Uninstalling the SEP Client from outside the Client Interface Stopping SEP Services...11 Uninstalling the Client...12 Additional Technologies for Protecting the SEP client Tamper Protection Protecting SEP Processes...14 Application Control Protect Client files and registry keys...15 Appendix A One Page Overview / 17

3 Purpose of this Whitepaper: This Whitepaper provides guidance on the different ways to control access to specific parts of the Symantec Endpoint Protection (SEP) client. Many organizations do not allow administrative users to make changes to installed security software. Since the SEP client has many different security technologies in a single client, there are various ways to ensure that administrative users cannot make changes to the client software. This paper provides guidance for administrators who would like to ensure SEP client installations are protected from intended and/or unintended changes. 3 / 17

4 Overview There are different ways that a SEP client can be protected from intentional or unintentional changes. This Whitepaper describes three main approaches to protecting the SEP client and describes details about any limitations. This Whitepaper intends to provide guidance in protecting the SEP client from being tampered with by administrative users with administrative privileges on a system. Throughout this paper, the assumption is that administrative users should be prevented from making changes to the SEP client. By default, a restricted user cannot make changes to the SEP client. In cases where a restricted user can make changes, this will be noted in the document. Accessing the SEP client interface and changing policy configurations Administrators can control which parts of the SEP client interface are accessible or whether to hide it completely. In addition, administrators can control whether or not administrative can make changes to their policy configuration. When protecting a standard configuration from being changed, consider the following Policies: Antivirus and Antispyware policy Firewall Policy Intrusion Prevention Policy Application and Device Control policy LiveUpdate Policy Centralized Exceptions Stopping SEP client services or uninstalling of the SEP Client When the SEP client is installed, there are various ways to prevent administrative users from uninstalling the client, or stopping SEP Client Services. The following services are listed in the Microsoft Windows Services Manager: Symantec Endpoint Protection Symantec Management Client Symantec Event Manager Symantec Settings Manager Additional Technologies for protecting the integrity of the SEP client In addition to configuring Policies and Settings to prevent altering the SEP client, there are additional mechanisms to further protect the client from tampering. Application Control Tamper Protection 4 / 17

5 The SEP Client Interface This section provides an overview of what settings an administrator can set with respect to what a user is allowed to change. It is broken down into two main categories, changing policies, and accessing the User Interface Changing Policy Configuration Settings Please see each individual policy listed here for information on default settings and what needs to be done to lock down settings so they cannot be changed by administrative users. Antivirus and Antispyware policies By default administrative users can change Antivirus policy settings, including disabling Auto- Protect real-time scanning. In order to prevent administrative users from changing Antivirus and Antispyware settings each individual setting in the Antivirus and Antispyware policy must be locked. This is accomplished by clicking on the lock icon next to a given setting as shown in the screenshots below. Enable File System Auto-Protect unlocked (default setting) Enable File System Auto-Protect locked after clicking on lock icon A client with a locked Antivirus and Antispyware policy setting will still display the setting in the client User Interface but it will be grayed out and the user will not be able to change it. In order to lock all settings, each lock icon must be closed as shown in the screenshots above. The above example displays how to prevent administrative users from disabling Antivirus and Antispyware File System Auto-Protect. 5 / 17

6 Truscan Proactive Threat Protection Truscan Proactive Threat can be locked within the Antivirus and Antispyware policies. Truscan is the behavioral scanning component in Symantec Endpoint Protection. To lock administrative users from disabling Truscan Proactive, edit the Antivirus and Antispyware policy and configure as shown in the screenshot below. 6 / 17

7 Firewall Policies By default, Firewall policies rules and configurations cannot be changed in the Client Interface. By default, administrative users can disable Network Threat Protection (by right-clicking the tray icon and selecting Disable Symantec Endpoint Protection ). In order to prevent administrative users from disabling Network Threat Protection do the following steps in the SEPM. 1. Go to the Clients page and select the Policies tab. 2. Expand Location-specific Settings and click Client User Interface Control Settings. 3. Ensure the Server-Control radio button is selected and click Customize. 4. Uncheck the box next to Allow administrative users to enable or disable Network Threat Protection as shown below. Note: In order for this setting to take effect, it is required to block administrative users from disabling Antivirus and Antispyware Auto-Protect scanning and Truscan Proactive threat scanning through the configurations shown above. 7 / 17

8 Intrusion Prevention Policies Intrusion Prevention policies cannot be changed in the Client Interface by default. By taking the above steps to prevent administrative users from disabling Network Threat Protection, administrative users are prevented from disabling Intrusion Prevention scanning. Application and Device Control Policies Application and Device Control policies cannot be changed or disabled in the Client Interface by default. LiveUpdate Policies By default LiveUpdate policies cannot be changed in the Client Interface. Administrative users are also not allowed to run LiveUpdate manually from the user interface. If administrative users should be allowed to run LiveUpdate manually or change the LiveUpdate schedule this is done in the LiveUpdate Settings policy under the Advanced dialogue. Centralized Exceptions Policies By default, administrative users are able to add Exceptions to exclude files, folders, or threats from being scanned. In order to prevent administrative users from adding exceptions you must create a Centralized Exception policy and explicitly not allow administrative users to add their own exceptions as shown below. 8 / 17

9 Accessing the SEP Client Interface Administrators can control to what extent a user has access to the SEP Client interface. It is possible to provide granular control to administrative users using Mixed Control mode, however in this paper, only the option to hide the UI and/or System Tray icon completely will be discussed. By default a restricted user can open the SEP client interface. To access settings to configure access to the SEP client interface do the following steps: 1. Go to the Clients Page and select the Policies Tab. 2. Expand Location-specific Settings and click Client User Interface Control Settings. 3. Ensure the Server-Control radio button is selected and click Customize. This will show the below dialogue with options to hide the Tray icon and/or hide the Client Interface completely. Each option is described below. 9 / 17

10 Display the Client: By default, the SEP Client Interface will be shown if launched from the Tray icon or from the Start>Programs group. To hide the client, uncheck the box next to Display the Client. If the user tries to launch the SEP Client from Start>Programs>Symantec Endpoint Protection, they will get the following dialogue: ). Double- Display the notification area icon: By default the System Tray icon is shown ( clicking the icon launches the SEP User Interface. In order to hide the icon, uncheck the box next to Display the notification area icon. The SEP tray icon will not be displayed. 10 / 17

11 Disabling/Uninstalling the SEP Client from outside the Client Interface Aside from disabling the client through configurations in the interface many organizations wish to prevent the disabling of SEP via other methods (Task Manager, Services Manager., etc... ) or even uninstalling the client completely. Stopping SEP Services SEP client services can be seen in the Windows Services Control Manager. At this time the only service that can be prevented from being stopped manually is the Symantec Management Client. Although other services can be stopped, these do not disable antivirus protection because Auto- Protect is still active. It is important to note that restricted users cannot stop Windows services. It is best practices to provide employees with restricted user access unless it is necessary to allow administrative privileges. Administrative users can disable services within the Windows Service Control Manager because an Administrative user has root access to the Operating System. Here is an overview of SEP client services along with descriptions as to why stopping some services does not impact Antivirus protection: Symantec Endpoint Protection (rtvscan.exe) User mode antivirus functions (notifications, logging). There is no way to prevent administrative users from stopping this service. However, stopping this service does not disable Auto-Protect! Symantec Management Client (smc.exe) Network Threat Protection and client server communication functions. By default, it is not possible to stop this service in the Services Manager. If a user disables the service in the Services Control Manager, on shutdown the service will automatically be reset to Automatic. By default, Administrator administrative users can stop smc.exe by command line. In order to require a password for administrator administrative users to stop smc.exe by command line, do the following steps: 1. Go to the Clients page and select the Policies Tab. 2. Click General Settings and select the Security Settings tab. 3. Place a check in the box next to Require a password to stop the client service as shown in the screenshot below: 11 / 17

12 Symantec Event Manager (ccsvchst.exe) Common client component for Event Manager. There is no way to prevent administrative users from stopping this service. However, stopping this service does not affect Auto-Protect! Symantec Settings Manager (ccsvchst.exe) Common client component for Settings Manager. There is no way to prevent administrative users from stopping this service. However, stopping this service does not affect Auto-Protect! Additional protection for preventing SEP client services from being disabled by malicious programs is available in Tamper Protection, and is described below. Uninstalling the Client To prevent an administrative user from uninstalling the SEP client it is possible to require a password when uninstalling the client. To require a password do the following steps: 1. Go to the Clients page and select the Policies Tab. 2. Click General Settings and select the Security Settings tab. 3. Place a check in the box next to Require a password to uninstall the client as shown in the screenshot below: 12 / 17

13 13 / 17

14 Additional Technologies for Protecting the SEP client In addition to the steps listed above to protect the SEP client, there are technologies that provide additional ways of protecting the SEP client. Note that both of these features currently do not support 64 bit operating systems. Tamper Protection Protecting SEP Processes Tamper protection is a process that monitors SEP processes and prevents them from being shutdown forcefully from an external source, such as malicious code. By default this feature is enabled but set to log only and does not block processes. In order to activate Tamper Protection to block attempts to terminate SEP client services do the following stesp: 1. Go to the Clients page and select the Policies tab. 2. Click General Settings. 3. On the Tamper Protection tab, select Block it and log the event from the drop down box. 4. Click the Lock icon to prevent administrative users from disabling Tamper Protection as shown in the screenshot below: Note: Before configuring to block applications, be sure to monitor Tamper Protection logs to ensure that legitimate programs, such as software distribution software, doesn t stop SEP services for legitimate purposes. It is possible to exclude certain processes from triggering Tamper Protection. 14 / 17

15 Application Control Protect Client files and registry keys Symantec provides a pre-configured rule in Application Control policies to protect the client files and registry keys. When this rule is enabled, administrative users cannot manually delete SEP client files and/or registry keys. Enable this Application rule by creating an Application and Device Control policy and enabling as shown below: Note: This Application control rule is active on the local system. It does not prevent files from being deleted remotely. 15 / 17

16 Appendix A One Page Overview This check-list provides a summary of the components that organizations may wish to secure when hardening a client. Some options, such as hiding the Client User Interface completely, may not be a desired setting but is included here to provide an overview of available options. Preventing Administrative users from changing policies Lock Policies Manual Steps Required to lock policies? Antivirus and Antisypware Yes Firewall No IPS No Application and Device Control No LiveUpdate Policy No Centralized Exceptions Yes Disabling/uninstalling the SEP Client from outside the Client Interface Hardening Step Manual Steps Required? Require Password to open User Yes Interface Require Password when Yes uninstalling SEP Client Require Password when Yes stopping SEP service by command line (smc.exe stop) Require Password to import or Yes export a policy Hide System Tray Icon Yes Prevent Administrative users Yes from disabling SEP network threat protection in client UI Prevent Administrative users No from stopping SEP client service in Service Control Manager Prevent Administrative users Not possible at this time. Stopping other services does not from stopping other SEP disable Auto-Protect Antivirus protection Services in Service Control Manager Additional technologies to prevent tampering with the SEP Client Hardening Step Manual Steps Required? Tamper Protection Yes Application Control Default Rule to protect client files and registry keys. Yes 16 / 17

17 About Symantec Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call tollfree Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA / 17 Symantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation. Other brands and products are trademarks of their respective holder/s. Any technical information that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical information is being delivered to you as-is and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the Symantec technical Technology documentation Network or the information contained herein is at the risk of the user. Copyright 2007 Symantec Corporation. All rights reserved. 09/

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010 W H I T E P A P E R : T E C H N I C A L S E C U R I T Y S O L U T I O N S Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper Updated 7/20/2010 White Paper: Symantec

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

To install antivirus software on the Selenia Dimensions product. This document provides instructions for the following products.

To install antivirus software on the Selenia Dimensions product. This document provides instructions for the following products. 1.1 Introduction 1.1.1 Purpose 1.1.2 Scope To install antivirus software on the Selenia Dimensions product. This document applies to all Dimensions products with version 1.6.2 software and above. 1.1.3

More information

11.0. Symantec Endpoint Protection 11.0 Reviewer s Guide

11.0. Symantec Endpoint Protection 11.0 Reviewer s Guide TECHNOLOGY BRIEF: ENDPOINT Symantec PROTECTION endpoint protection 11.0 11.0 Symantec Endpoint Protection 11.0 Reviewer s Guide Technology Brief: Symantec Endpoint Protection Symantec Endpoint Protection

More information

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

How To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa (

How To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa ( Using Symantec AntiVirus Corporate Edition Version 9.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1613M-A (12/04) Contents Using Symantec AntiVirus Corporate Edition 9.0 Software.....................................................................5

More information

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0 Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010 S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...

More information

Symantec Client Security Administrator s Guide

Symantec Client Security Administrator s Guide Symantec Client Security Administrator s Guide Symantec Client Security Administrator s Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

To install anti virus software on the Selenia 5.x product. This document applies to all Selenia 5.x products with version 5.2 software and above.

To install anti virus software on the Selenia 5.x product. This document applies to all Selenia 5.x products with version 5.2 software and above. 1.0 Introduction 1.1 Purpose To install anti virus software on the Selenia 5.x product. 1.2 Scope This document applies to all Selenia 5.x products with version 5.2 software and above. 1.3 Estimated Time

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Windows Rootkit Overview

Windows Rootkit Overview WHITE PAPER: SYMANTEC SECURITY RESPONSE Windows Rootkit Overview White Paper: Symantec Security Response Windows Rootkit Overview Contents Introduction...4 User Mode Rootkits...4 Kernel Mode Rootkits...5

More information

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2. Preface 1 Virus scanner administration 2 SIMATIC Configuration 3 Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Commissioning Manual 04/2013 A5E03874574-02 Legal information

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Endpoint Protection 11.0

Symantec Endpoint Protection 11.0 SYMANTEC TECHNOLOGY NETWORK: SECURITY Symantec Endpoint Protection 11.0 Terminal Server and Citrix Best Practices White Paper Contents Scope... 4 Executive Summary... 4 What is Windows Terminal Services...

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Insight. Security Response. Deployment Best Practices

Insight. Security Response. Deployment Best Practices Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users

More information

HP ThinShell. Administrator Guide

HP ThinShell. Administrator Guide HP ThinShell Administrator Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of the Microsoft group of companies. Confidential computer

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

SIDEKICK PC SETUP AND ACTIVATION ISSUES

SIDEKICK PC SETUP AND ACTIVATION ISSUES SIDEKICK PC SETUP AND ACTIVATION ISSUES 19 TH MAY 2009 2009 Electrolux Italia S.p.A., All rights reserved TABLE OF CONTENTS 1. THE SQL SERVER 2005 SETUP PROGRAM MAY TAKE A VERY LONG TIME TO COMPLETE...3

More information

Norton AntiVirus 9.0 for Macintosh

Norton AntiVirus 9.0 for Macintosh Norton AntiVirus 9.0 for Macintosh Upgrade Overview Overview Norton AntiVirus 9.0 for Macintosh is the latest release of Symantec s awardwinning Norton AntiVirus product line. This document explains the

More information

Symantec Endpoint Protection Analyzer Report

Symantec Endpoint Protection Analyzer Report Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...

More information

Symantec Client Security Administrator's Guide

Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who

More information

Symantec AntiVirus Business Pack Administrator s Guide

Symantec AntiVirus Business Pack Administrator s Guide Symantec AntiVirus Business Pack Administrator s Guide Symantec AntiVirus Business Pack Administrator s Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 13740352 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Norton Personal Firewall for Macintosh

Norton Personal Firewall for Macintosh Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for

More information

Symantec AntiVirus Corporate Edition Administrator's Guide

Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Endpoint Protection Small Business Edition Implementation Guide

Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide The software described in this book is furnished under

More information

UP L13: Leveraging the full protection of SEP 12.1.x

UP L13: Leveraging the full protection of SEP 12.1.x UP L13: Leveraging the full protection of SEP 12.1.x Martial RICHARD Principal Field Enablement Manager Endpoint Security UP L13 1 Threat landscape (ISTR Vol.18 April 2013) http://www.symantec.com/threatreport/

More information

MDM Mass Configuration Tool User s Manual

MDM Mass Configuration Tool User s Manual User s Manual First Edition, October 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. User s Manual The software described in this manual is

More information

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents

More information

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No

More information

Symantec Endpoint Protection End-User Guide For MacOS X

Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection (SEP) is the evolutionary successor to Symantec Anti-Virus (SAV). SEP provides the anti-virus protection of SAV and

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA All Information provided in this document and in the accompanying software is subject to change without notice and does not represent a commitment on the part of RamSoft. RamSoft assumes no responsibility

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

Important Notes for WinConnect Server ES Software Installation:

Important Notes for WinConnect Server ES Software Installation: Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Manual niwis SEP Event Monitor NSEPEM. English

Manual niwis SEP Event Monitor NSEPEM. English Manual niwis SEP Event Monitor NSEPEM English https://www.niwis.com Attention Please read this first: Requirements: Windows XP, Windows 7, SEP 12.1x After a configuration change in the windows registry,

More information

Enabling Backups for Windows and MAC OS X

Enabling Backups for Windows and MAC OS X Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA

More information

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server.

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LEPIDE SOFTWARE Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LepideAuditor Suite Lepide Software Private Limited, All

More information

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008 StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008 www.starwindsoftware.com Copyright 2008-2012. All rights reserved. COPYRIGHT Copyright 2008-2012. All rights reserved.

More information

Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines. Regional Product Management Team Endpoint Security

Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines. Regional Product Management Team Endpoint Security Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines Regional Product Management Team Endpoint Security Agenda 1 2 SEPM Architecture and Settings Recommended Client Protection Technologies

More information

Symantec Endpoint Protection and Symantec Network Access Control Client Guide

Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished

More information

NTP Software QFS for NAS, Hitachi Edition

NTP Software QFS for NAS, Hitachi Edition NTP Software QFS for NAS, Hitachi Edition Installation Guide Revision 2.4 - July 2015 This guide details the method for the installation and initial configuration of NTP Software QFS for NAS, Hitachi Edition,

More information

Universal Printer Driver Guide

Universal Printer Driver Guide Universal Printer Driver Guide Brother Universal Printer Driver (BR-Script3) Brother Mono Universal Printer Driver (PCL) Brother Universal Printer Driver (Inkjet) Version B ENG 1 Overview 1 The Brother

More information

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Symantec Endpoint Protection Small Business Edition Client Guide

Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide The software described in this book is furnished under a license agreement

More information

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks Manage the Endpoints Palo Alto Networks Advanced Endpoint Protection Administrator s Guide Version 3.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

How-To: Changing the target IP address for pcanywhere Remote Control

How-To: Changing the target IP address for pcanywhere Remote Control How-To: Changing the target IP address for pcanywhere Remote Control Q: Why is this necessary? A: Because many ISPs (Internet Service Providers) allocate numerical addresses on an asneeded basis especially

More information

Safe internet: Getting Started Guide

Safe internet: Getting Started Guide Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Symantec Mobile Security Manager Administration Guide

Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 9 ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection

More information

Integrating Symantec Endpoint Protection

Integrating Symantec Endpoint Protection Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

MALWAREBYTES PLUGIN DOCUMENTATION

MALWAREBYTES PLUGIN DOCUMENTATION Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...

More information

Windows Policies That Policy Check Verifies

Windows Policies That Policy Check Verifies Windows Policies That Check Verifies - September 26, 2014 Windows Policies That Check Verifies September 2014 The Scanner is a PCI module which verifies whether certain settings on a computer comply with

More information

1 Intel Smart Connect Technology Installation Guide:

1 Intel Smart Connect Technology Installation Guide: 1 Intel Smart Connect Technology Installation Guide: 1.1 System Requirements The following are required on a system: System BIOS supporting and enabled for Intel Smart Connect Technology Microsoft* Windows*

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

LogLogic Symantec Endpoint Protection Log Configuration Guide

LogLogic Symantec Endpoint Protection Log Configuration Guide LogLogic Symantec Endpoint Protection Log Configuration Guide Document Release: September 2011 Part Number: LL60005-00ELS100001 This manual supports LogLogic Symantec Endpoint Protection Release 1.0 and

More information

Symantec Endpoint Protection Evaluation Guide

Symantec Endpoint Protection Evaluation Guide Symantec Endpoint Protection Evaluation Guide Symantec Endpoint Protection Evaluation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

USB 2.0 4-PORT NETWORK HUB. User Manual DA-70251 DA-70252 1

USB 2.0 4-PORT NETWORK HUB. User Manual DA-70251 DA-70252 1 USB 2.0 4-PORT NETWORK HUB User Manual DA-70251 DA-70252 1 Copyright Notice Copyright DIGITUS 2010. All rights reserved. Disclaimer DIGITUS shall not be liable for technical or editorial errors or omissions

More information

W H IT E P A P E R : TE C Symantec Endpoint Protection 11.0: H N Application and Device Control I C Technical Field Enablement Team A Version 1.

W H IT E P A P E R : TE C Symantec Endpoint Protection 11.0: H N Application and Device Control I C Technical Field Enablement Team A Version 1. W H I T E P A P E R : T E C H N I C A L Symantec Endpoint Protection 11.0: Application and Device Control Technical Field Enablement Team Version 1.2 White Paper: Symantec Technical Content Table Content

More information

GFI WebMonitor 2011. Administration and Configuration Manual

GFI WebMonitor 2011. Administration and Configuration Manual GFI WebMonitor 2011 Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

POWERLINK High Power Wireless LAN 802.11b/g/n USB Adapter User Manual

POWERLINK High Power Wireless LAN 802.11b/g/n USB Adapter User Manual Before you proceed with the installation, please notice the following descriptions. Note 1: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000.)

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

Symantec pcanywhere Administrator s Guide

Symantec pcanywhere Administrator s Guide Symantec pcanywhere Administrator s Guide Symantec pcanywhere Administrator s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information