Symantec Protection for SharePoint Servers 6.0 Implementation Guide
|
|
- Britton Henry
- 7 years ago
- Views:
Transcription
1 Symantec Protection for SharePoint Servers 6.0 Implementation Guide for Microsoft SharePoint 2010
2 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: 6.0 Legal Notice Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ( Third Party Programs ). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
3 Symantec Corporation 350 Ellis Street Mountain View, CA Printed in the United States of America
4 Technical Support Contacting Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s support offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services For information about Symantec s support offerings, you can visit our Web site at the following URL: All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Customers with a current support agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level
5 Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Licensing and registration Customer service Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Customer service information is available at the following URL: Customer Service is available to assist with non-technical questions, such as the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs, DVDs, or manuals
6 Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America
7 Contents Technical Support... 4 Chapter 1 Chapter 2 Introducing Symantec Protection for SharePoint Servers About Symantec Protection for SharePoint Servers What's new Components of Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works About real-time scanning About scheduled scanning and manual scanning What happens when a file is scanned About scanning policies in the Symantec Scan Engine About logging and notifications About on-demand reports and scheduled reports About handling large scanning volumes About deployment options (stand-alone and farm environments) About deploying Symantec Protection for SharePoint Servers in a stand-alone SharePoint environment About deploying Symantec Protection for SharePoint Servers in a farm environment About supported platforms How Symantec Scan Engine protects against viruses Where to get more information Installing Symantec Protection for SharePoint Servers Before you install About protecting the servers that are running the Symantec Protection for SharePoint Servers components About preventing conflicts with other products About stopping IIS during installation System requirements System requirements for Symantec Protection for SharePoint Servers integrated installation... 30
8 8 Contents System requirements for Symantec Protection for SharePoint console only System requirements for Symantec Scan Engine About installing Symantec Protection for SharePoint Servers About the installation options About installing Symantec Protection for SharePoint Servers (integrated installation) Installing only Symantec Scan Engine using the installation wizard About installing only the Symantec Protection for SharePoint console About repairing or modifying Symantec Protection for SharePoint Servers or its components Post-installation tasks Starting the Central Administration service in a farm environment Uninstalling Symantec Protection for SharePoint Servers Uninstalling the Symantec Protection for SharePoint console Uninstalling Symantec Scan Engine Chapter 3 Chapter 4 Using the Symantec Protection for SharePoint console About the Symantec Protection for SharePoint console Accessing the console Changing the service logon account information About the console home page Navigation links Feature links Status pane Configuring Symantec Protection for SharePoint Servers About configuring Symantec Protection for SharePoint Servers Configuring a password for the console About SharePoint Server Farm overview Configuring real-time scanning About manual scans and scheduled scans About configuring global manual and scheduled scanning options Scheduling scans Performing manual scans... 81
9 Contents 9 About importing and exporting settings Importing settings from a SharePoint deployment Exporting settings from a SharePoint deployment Registering Symantec Scan Engine with Symantec Protection for SharePoint Servers About adding, removing, editing, and viewing registered Symantec Scan Engines Specifying the scanning mode for load balancing Checking for the latest virus definitions Chapter 5 Configuring Symantec Scan Engine Accessing the Symantec Scan Engine console About communication protocol settings Configuring ICAP-specific settings Ways to control which file types are scanned About licensing Symantec Scan Engine About license activation If you do not have a serial number Obtaining a license file Installing the license file About keeping your product and protection up-to-date About definition updates About LiveUpdate Configuring LiveUpdate to occur automatically Performing LiveUpdate on demand About Rapid Release Configuring Rapid Release updates to occur automatically Performing Rapid Release updates on demand About enabling security risk detection Chapter 6 Monitoring Symantec Protection for SharePoint Servers activity Ways to monitor Symantec Protection for SharePoint Servers activity About the status pane About SMTP logging Configuring SMTP logging Customizing SMTP messages About monitoring scanning activity Configuring the log file folder location Setting the logging level for each event source Setting the maximum storage time for log files
10 10 Contents Generating an on-demand report Scheduling a report About quarantine management Restoring quarantined files Deleting quarantined files Chapter 7 Troubleshooting Symantec Protection for SharePoint Servers About troubleshooting common issues Symantec Protection for SharePoint Servers link is missing from the SharePoint Central Administration site Unable to access the Symantec Scan Engine console Symantec Scan Engine registration fails Slow server response or high server load No reports are generated Connection failed error message Failure sending mail error message Unable to remember the console password Error 1722 when installing Symantec Scan Engine Scanning process error messages Unable to view information on the SharePoint Server Farm overview page Appendix A Error codes About error codes and messages Index
11 Chapter 1 Introducing Symantec Protection for SharePoint Servers This chapter includes the following topics: About Symantec Protection for SharePoint Servers What's new Components of Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works About deployment options (stand-alone and farm environments) How Symantec Scan Engine protects against viruses Where to get more information About Symantec Protection for SharePoint Servers Symantec Protection for SharePoint Servers provides virus scanning and repair services for the following SharePoint products: Windows SharePoint Services 2.0 (WSS 2.0) Windows SharePoint Services 3.0 (WSS 3.0) SharePoint Portal Server 2003 (SPS 2003) Microsoft Office SharePoint Server 2007 (MOSS 2007) Microsoft SharePoint Foundation 2010
12 12 Introducing Symantec Protection for SharePoint Servers What's new What's new Microsoft Office SharePoint Server 2010 In addition to virus scanning and repair services, Symantec Protection for SharePoint Servers provides logging, monitoring, and reporting of infected documents on the SharePoint server. Table 1-1 describes the new features in Symantec Protection for SharePoint Servers. Table 1-1 Feature New features Description Enhanced User Interface Quarantine Mangement Symantec Protection for SharePoint Servers now has an enhanced User Interface. You can manage all the quarantined files from a single location. Based on your requirements, you can either restore or delete the quarantined files. See About quarantine management on page 137. Import/Export Settings You can import Symantec Protection for SharePoint Servers settings from one SharePoint deployment to another SharePoint deployment when you have multiple SharePoint deployments on your network. See About importing and exporting settings on page 81. Integration with the latest Symantec Scan Engine 5.2 Symantec Protection for SharePoint Servers has the latest version of Symantec Scan Engine 5.2 for virus scanning and repair services. Symantec Scan Engine 5.2 includes new features like support for up to 80 scan engines, Rapid Release update of definitions and so on. For more information, see the Symantec Scan Engine Implementation Guide. Components of Symantec Protection for SharePoint Servers Symantec Protection for SharePoint Servers includes the following components, which you can install and configure separately:
13 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 13 Symantec Scan Engine Symantec Protection for SharePoint console Provides virus scanning and repair services You can install Symantec Scan Engine on the SharePoint server. You can also install Symantec Scan Engine on a separate server that is not running SharePoint. This lets you move antivirus processing off-box, thereby reducing the CPU load on the SharePoint server. The latest version of Symantec Scan Engine 5.2 is included in the software package. Provides a means for users to configure how Symantec Scan Engine and the SharePoint server should communicate with each other, handle infected files, and monitor scanning activity. The Symantec Protection for SharePoint console refers to the administrative console of Symantec Protection for SharePoint Servers. You can configure how Symantec Protection for SharePoint Servers handles the communication between the Symantec Scan Engine and the SharePoint server through this console. Symantec Protection for SharePoint Servers also interprets the results that are returned from the scan engine after scanning. See About deploying Symantec Protection for SharePoint Servers in a stand-alone SharePoint environment on page 22. See About deploying Symantec Protection for SharePoint Servers in a farm environment on page 23. See About deployment options (stand-alone and farm environments) on page 22. How Symantec Protection for SharePoint Servers works Symantec Protection for SharePoint Servers provides the following types of scanning: Real-time scanning of files as they are uploaded and downloaded from the SharePoint server See About real-time scanning on page 14. Scheduled scans and manual scans of files that are stored on the SharePoint server See About scheduled scanning and manual scanning on page 16. In addition to scanning, Symantec Protection for SharePoint Servers does the following: Monitors scanning activity by its logging and notification feature
14 14 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works About real-time scanning See About logging and notifications on page 19. Generates on-demand reports and schedules distribution of reports by mail See About on-demand reports and scheduled reports on page 20. Files are scanned in real time as they are uploaded and downloaded from the SharePoint server. You can configure to scan files on upload, download, or both. All files that are uploaded or downloaded are submitted for scanning, regardless of file type. Symantec Protection for SharePoint Servers also supports scanning of files uploaded to document library, calendars, contacts, lists, and so on. Note: If scanning fails for any reason during a real-time scan (for example, if the Symantec Scan Engine goes offline or reaches its scanning threshold), the scan is terminated. The scan request is not re-submitted until a user tries to upload or download the file. You can configure the following options for real-time scanning: Scan documents on upload. Scan documents on download. Allow users to download infected documents. Attempt to clean infected documents. You must set up real-time scanning to ensure protection of your SharePoint server before you let users to start uploading or downloading files. For the most secure configuration, select the Scan documents on upload, Scan documents on download, and Attempt to clean infected files options. Warning: Selecting the option Allow users to download infected documents can put your organization at risk. Irreparable files might contain viruses that can infect your computer. SharePoint security ensures that only administrators can download the irreparable files if this option is not enabled. See Configuring real-time scanning on page 66. How caching works on the SharePoint server The SharePoint server caches the scanning results for each stored file. The cached information includes the date and revision number of the virus definitions that
15 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 15 were used to perform the scan. The cached information also includes the status of the file (whether the file is clean or infected). In real-time scanning, all files that are uploaded or downloaded are submitted for scanning. On download, the SharePoint server evaluates the status of the file and the virus definition that were used to determine whether the file must be scanned. If another user requests access to that same file and the virus definitions have not changed, a redundant scan is avoided. Individual cache entries are updated whenever a stored file is changed. What happens when a file is uploaded When you try to upload a file to the SharePoint server, the file is submitted first to Symantec Scan Engine for scanning. If the file contains a virus that cannot be repaired, the file is not stored on the SharePoint server. You receive a notification that the file is infected and cannot be uploaded. If you configure the SharePoint server to attempt to clean infected files and if the infected file is a repairable file, then the infected file is repaired and uploaded to the SharePoint server. What happens when a file is downloaded When you try to download a stored file, Symantec Protection for SharePoint Servers verifies the following information about the file: If the file was scanned on upload The status of the file (for example, if the file is clean) Whether the virus definition that were used during the latest scan are the most current If the file is infected, or if the virus definitions are not the most current, the file is submitted to Symantec Scan Engine for scanning. Based on the scan results, the file is handled according to the settings that you specify. See Configuring real-time scanning on page 66. If the file is clean and was scanned with the latest definitions, the file is not rescanned. It is automatically downloaded to you. If you configure the SharePoint server to attempt to clean infected files and if the infected file is a repairable file, then the infected file is repaired and downloaded to the server. If the file contains a virus that cannot be repaired, the file is not downloaded to the user. You receive a notification that the file is infected and cannot be downloaded. (You can configure Symantec Protection for SharePoint Servers to permit users to download infected files. However, the most secure configuration is to disable this option. Files that contain viruses pose a risk to your organization. You are denied access to infected files by default.)
16 16 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works About scheduled scanning and manual scanning You can schedule periodic scans of the documents that are stored on the SharePoint server. Schedule periodic scans of the document library to ensure that all files have been scanned for viruses. These scans ensure that files that have not been previously scanned are scanned in a timely manner. Regular scans also ensure that scanning is kept up to date as virus definitions change. Scheduled scans occur at the time and frequency that you specify. You can force an immediate (manual) scan of the documents that are stored on the server. The options of Exclusion List, Optional Settings, and Infected File Detection Rules that you configure for scheduled scans also apply to manual scans. You can either perform a manual scan or a scheduled scan along with real-time scanning without any adverse effects. See About manual scans and scheduled scans on page 70. During scheduled scans and manual scans, all files are submitted for scanning, regardless of whether they were scanned previously or not. Only files in the Exclude folders list and the File extension exclude list are omitted from scanning. If a scan request fails because the scan engine is unavailable, the scan request is sent to the next available registered scan engine. You can configure the following options for manual scans and scheduled scans: Excluding files with specific extensions from being scanned See Excluding files with specific extensions from being scanned on page 72. Excluding folders from being scanned See Excluding folders from being scanned on page 73. Specifying the number of threads for scanning See Specifying the number of threads for scanning on page 73. Scanning all file versions in the document library See Scanning all file versions in the document library on page 74. Scanning only those files that were added or modified from the last scan See Scanning those files that have been added or modified since the last completed scan on page 74. Specifying the location for quarantined documents See Specifying the location for quarantined documents on page 75. Specifying file handling rules See Specifying file handling rules on page 76. Reviewing scan statistics See Reviewing scan statistics on page 78.
17 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 17 Preserving bandwidth and time during manual and scheduled scans You can designate which directories on the SharePoint server are scanned during scheduled scans and manual scans. You can scan all directories on the SharePoint server, or you can exclude certain directories from scanning. You can also control which file types are scanned during manual scans and scheduled scans by specifying which file types are passed to Symantec Scan Engine. You can save bandwidth and time by excluding those files types that are not likely to contain viruses and can be excluded from scanning. Symantec Protection for SharePoint Servers makes an initial determination, based on file extension, about whether to pass a file to Symantec Scan Engine for scanning. You can limit scanning to only those files that have been added or modified since the last manual or scheduled scan. Symantec Protection for SharePoint Servers can compare the time a file was modified or added with the time of the last scan. This feature lets you conserve scanning resources by omitting files from scanning that have not been modified or added since the last scan. When this feature is disabled, all files are scanned during manual scans and scheduled scans. Quarantining infected files Symantec Protection for SharePoint Servers can quarantine infected files that are found during a scheduled scan or manual scan. A copy of each infected item is forwarded to a quarantine directory. You can view a list of all these quarantined files in the Quarantine Management page. You can view, restore, or delete the quarantined file based on your analysis. The default quarantine location is C:\Program Files\Symantec\SharePoint\Quarantine. What happens when a file is scanned After the Symantec Protection for SharePoint console and Symantec Scan Engine are installed and properly configured, files are passed to Symantec Scan Engine for analysis. If Symantec Scan Engine does not find a virus in a file, Symantec Scan Engine indicates that the file is clean. If a virus is detected, Symantec Scan Engine does one of the following actions:
18 18 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works Records a log entry that an infection was found Attempts to repair the infected file Separate logging and alerting features are available through the Symantec Protection for SharePoint console and Symantec Scan Engine. You can activate logging and alerting options in Symantec Scan Engine to supplement those logging and alerting options that are available through the Symantec Protection for SharePoint console. The Symantec Protection for SharePoint console sends an notification and records a log entry when an infection is found. If the file can be repaired, Symantec Scan Engine repairs it and passes a clean file back to Symantec Protection for SharePoint Servers. Configure the SharePoint antivirus settings to accept these repaired files so that infected files are replaced with repaired files on the SharePoint server. Deletes unrepairable infected files from container files See Configuring real-time scanning on page 66. When a container file or archive file is submitted for scanning, Symantec Scan Engine decomposes the container file and scans each embedded file individually. If the container file contains unrepairable files, Symantec Scan Engine deletes the unrepairable files from the container or archive file. The remaining clean contents are forwarded to the SharePoint server. This container file is handled by Symantec Protection for SharePoint Servers as a repaired file. (Configure the SharePoint antivirus settings to accept repaired files so that infected files can be replaced with repaired files.) Note: When a top-level file (a file that is not embedded in a container file) is infected and cannot be repaired, Symantec Scan Engine indicates this to Symantec Protection for SharePoint Servers and the SharePoint server. The SharePoint server denies access to the infected file by default. The file is deleted from the SharePoint server if you have configured it to do so. See Registering Symantec Scan Engine with Symantec Protection for SharePoint Servers on page 83. About scanning policies in the Symantec Scan Engine When Symantec Scan Engine scans a file for viruses, it applies the scanning policies that you configure in the Symantec Scan Engine console. For example, you can limit the resources that Symantec Scan Engine uses by only scanning certain types of files. When an established threshold is met or exceeded during a scan, or a policy is violated, Symantec Scan Engine communicates this information to Symantec Protection for SharePoint Servers. Symantec Protection for SharePoint Servers treats the file as though an unrepairable infection was found. The policies that
19 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 19 you configure for handling infected files (that is, blocking or deleting files) are applied. The following scanning policies are available through the Symantec Scan Engine console: You can restrict the amount of resources that are used to process large container files. You can establish a mail policy to filter mail and mail attachments based on a number of attributes. Symantec Scan Engine uses a decomposer to extract the embedded files from a container file, scan all of the files, and reassemble the container file once scanning is complete. For overly large container files, this process can require a significant amount of resources. You can use these settings to control the resources that Symantec Scan Engine uses to process large container files and to prevent these overly large container files from being stored on the SharePoint server. You can specify the maximum amount of time spent in decomposing a container file, the maximum file size for individual files in a container file, maximum number of nested levels to be decomposed, and the maximum number of bytes that are read when determining whether a file is MIME-encoded. These mail policy settings are applied to all MIME-encoded messages. If MIME-encoded messages are posted for user access on the SharePoint server, you can use the mail policy settings in Symantec Scan Engine to filter based on attachment file size or file name, message origin, total message size, or message subject line. Note: Mail policy settings do not affect nonmime-encoded file types that are passed to Symantec Scan Engine for scanning. When a mail filter policy is violated, Symantec Scan Engine only applies the action to MIME-encoded messages. For more information, see the Symantec Scan Engine Implementation Guide. About logging and notifications Symantec Protection for SharePoint Servers logs events for the Scan Process, Symantec Scan Engine and System report sources by default. You can specify the logging level for each of these report sources in Log File settings.
20 20 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works See About monitoring scanning activity on page 129. The default location of the log files is <installdir>:\program Files\Symantec\SharePoint\Logfiles. Symantec Protection for SharePoint Servers provides Simple Mail Transfer Protocol (SMTP) logging capabilities. When SMTP logging is configured, an notification is sent to a specified recipient for chosen events. To configure SMTP logging, you must do the following: Enable the notification system. Identify an SMTP server and port number for forwarding the log messages. Provide the default origin and destination information for the SMTP messages. Select the event categories for which SMTP messages should be generated. You can choose separate sender and recipient addresses for each event category. See Configuring SMTP logging on page 115. You can also select the notification level so that Symantec Protection for SharePoint Servers sends an notification only for the events whose level you specify. You can provide separate recipient information for each type of message. Default message text is included, but you can customize individual messages. See Customizing SMTP messages on page 119. About on-demand reports and scheduled reports You can manually generate and analyze reports for a specified date range. You must select a report source (Scan Engines, Scan Processes, or System) and define the log data you to display. You can generate a detailed report of all logs or pie chart reports. Symantec Protection for SharePoint Servers displays a numerical statistical report beneath the pie chart. See Generating an on-demand report on page 131. You can configure Symantec Protection for SharePoint Servers to generate reports and distribute them by to specified recipients at a scheduled time. From the options available, select hourly, daily, weekly, monthly, or once to schedule the reports. Note: You must first configure notifications before you try to schedule a report by .
21 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 21 To schedule reports, you must do the following tasks: Select a schedule. Choose from the default schedules or create a new schedule. Select a report data range. Symantec Protection for SharePoint Servers retrieves data from within this specified date range. Choose a report source (Scan Engines, Scan Processes, or System) and report definition. These options determine the content of your scheduled report. Select a report format. Activate report generation by mail. Specify the sender and recipient's address. See Scheduling a report on page 133. About handling large scanning volumes In a simple Symantec Protection for SharePoint Servers configuration, a single Symantec Scan Engine handles the scanning and repair services for the SharePoint server. However, larger traffic volumes can require multiple scan engines to handle virus scanning. If you are processing large traffic volumes or have multiple clients making virus scanning requests, you can install and configure multiple scan engines to handle the scanning load. If you install multiple scan engines to handle increased loads, you must register each Symantec Scan Engine with Symantec Protection for SharePoint Servers. Each Symantec Scan Engine must be installed on a separate computer on your network. See Registering Symantec Scan Engine with Symantec Protection for SharePoint Servers on page 83. When you use multiple scan engines, you can specify how you want the scanning load to be distributed by selecting a scanning mode. The scanning modes are as follows: Cycle mode Scanning is distributed evenly across all registered Symantec Scan Engines using a continuous repeating sequence. In a Stand-alone environment, this option is available only if multiple scan engines are registered; but in a farm environment, this option is available even if one scan engine is registered.
22 22 Introducing Symantec Protection for SharePoint Servers About deployment options (stand-alone and farm environments) Priority mode Scanning is distributed to Symantec Scan Engines based on priority. You specify the priority when you register a Symantec Scan Engine with Symantec Protection for SharePoint Servers. See To register a new Symantec Scan Engine on page 86. See To edit a Symantec Scan Engine registration on page 87. If you enable both modes, the priority mode takes precedence. If both the registered scan engines have the same priority, then the cycle mode takes precedence. See Specifying the scanning mode for load balancing on page 88. About deployment options (stand-alone and farm environments) Symantec Protection for SharePoint Servers includes the following components that can be installed separately or together: Symantec Protection for SharePoint console Symantec Scan Engine See Components of Symantec Protection for SharePoint Servers on page 12. See About the installation options on page 37. You must install Symantec Protection for SharePoint Servers and its components in different ways based on the following SharePoint environments: Stand-alone environment Farm environment About deploying Symantec Protection for SharePoint Servers in a stand-alone SharePoint environment In a stand-alone SharePoint environment, you can choose to do a full install of both components of Symantec Protection for SharePoint Servers on the same computer. You can also choose to move antivirus processing off-box by installing Symantec Scan Engine on a separate server. However, ensure that you install the Symantec Protection for SharePoint console on the SharePoint server.
23 Introducing Symantec Protection for SharePoint Servers About deployment options (stand-alone and farm environments) 23 About deploying Symantec Protection for SharePoint Servers in a farm environment In a SharePoint farm environment, based on the SharePoint version used, deploy Symantec Protection for SharePoint Servers on the following servers: Microsoft SharePoint Foundation 2010 Microsoft Office SharePoint Server 2010 Install the Symantec Protection for SharePoint console on each front-end web server in the farm and at least on one server where Central Administration service is running. You can install the Symantec Protection for SharePoint console on the other Application servers in the farm to run on-demand or scheduled scans on these servers, if desired. However, you can run these scans from the front-end servers as well. Symantec Scan Engine, the other component, can be installed on the same server as the Symantec Protection for SharePoint console or on a separate server. About supported platforms You can install the Symantec Protection for SharePoint console on Microsoft Windows Server See System requirements for Symantec Protection for SharePoint console only on page 30. See About installing only the Symantec Protection for SharePoint console on page 43. Symantec Scan Engine runs on the following platforms: Sun Solaris Red Hat Linux Microsoft Windows 2000 Server Microsoft Windows Server 2003 Microsoft Windows Server 2008 You can deploy Symantec Scan Engine in any environment that is running any combination of these platforms. See System requirements for Symantec Scan Engine on page 31.
24 24 Introducing Symantec Protection for SharePoint Servers How Symantec Scan Engine protects against viruses See Installing only Symantec Scan Engine using the installation wizard on page 41. How Symantec Scan Engine protects against viruses Symantec Protection for SharePoint Servers sends files to Symantec Scan Engine for virus scanning and repair. Symantec Scan Engine detects viruses, worms, and Trojan horses in all major file types (for example, Windows files, DOS files, and Microsoft Word and Excel files). Symantec Scan Engine includes a decomposer that handles most compressed and archive file formats and nested levels of files. Symantec Scan Engine provides protection against container files that can cause denial of service attacks (for example, container files that are overly large, that contain large numbers of embedded compressed files, partial container files, or that have been designed to use resources maliciously and degrade performance). Symantec Scan Engine detects security risks such as adware, dialers, hacktools, joke programs, remote access programs, spyware, and trackware. The Symantec Scan Engine also detects mobile code such as Java, ActiveX, and stand-alone script-based threats. Symantec Scan Engine uses Symantec antivirus technologies, for heuristic detection of new or unknown viruses. Where to get more information In addition to this guide, Symantec Protection for SharePoint Servers includes Help topics that you can access through the Help table of contents and index. You can also search for keywords in the Help. Context-sensitive help is available on each page. You can visit the Symantec Web site for more information about your product. The following online resources for Symantec Protection for SharePoint Servers are available: Provides access to the technical support Knowledge Base, news groups, contact information, downloads, and mailing list subscriptions index.jsp Provides product news and updates
25 Introducing Symantec Protection for SharePoint Servers Where to get more information 25 Provides access to the Virus Encyclopedia, which contains information about all known threats; information about hoaxes; and access to white papers about threats index.jsp
26 26 Introducing Symantec Protection for SharePoint Servers Where to get more information
27 Chapter 2 Installing Symantec Protection for SharePoint Servers This chapter includes the following topics: Before you install System requirements About installing Symantec Protection for SharePoint Servers Post-installation tasks Uninstalling Symantec Protection for SharePoint Servers Before you install Do the following tasks before you install Symantec Protection for SharePoint Servers or its components: Provide antivirus protection for the servers on which the Symantec Protection for SharePoint Servers components run. See About protecting the servers that are running the Symantec Protection for SharePoint Servers components on page 28. Exclude certain directories from scanning by any other antivirus product that is running on the computers on which you install the components. See About preventing conflicts with other products on page 28. Plan to install the Symantec Protection for SharePoint console at a time when Microsoft Internet Information Server (IIS) can be stopped temporarily.
28 28 Installing Symantec Protection for SharePoint Servers Before you install See About stopping IIS during installation on page 29. Ensure that the computer on which you plan to install the console and Symantec Scan Engine meets the minimum system requirements. You can install both components together or on separate computers. See System requirements on page 29. Ensure that the ports 9455, 9466, and 9477 are available. Symantec recommends that you back up the web.config file of the SharePoint Central Administration site. About protecting the servers that are running the Symantec Protection for SharePoint Servers components Before you install Symantec Scan Engine and the Symantec Protection for SharePoint console, consider installing additional antivirus protection such as Symantec AntiVirus Corporate Edition to protect the servers on which these components run. By design, Symantec Scan Engine scans only files that are passed to it from Symantec Protection for SharePoint Servers. Symantec Protection for SharePoint Servers does not protect the operating systems of the computers on which Symantec Scan Engine and SharePoint Server run. Because both of these servers potentially handle viruses, they are vulnerable without real-time virus protection. To achieve comprehensive virus protection with Symantec Protection for SharePoint Servers, it is important to protect the Symantec Scan Engine server and the SharePoint server from virus attacks. To protect the host computers, install an antivirus program on these servers in addition to the Symantec Protection for SharePoint Servers components. About preventing conflicts with other products To prevent a conflict between the antivirus product that is running on the host computer and Symantec Protection for SharePoint Servers, configure any other antivirus product that is running on the host computer to exclude certain directories from scanning. Table 2-1 lists the directories to exclude from scanning. Table 2-1 Directories to exclude from scanning Directories Windows:<Installdir>\temp Server The server on which Symantec Scan Engine runs.
29 Installing Symantec Protection for SharePoint Servers System requirements 29 Table 2-1 Directories Directories to exclude from scanning (continued) Server Linux and Solaris : <Installdir>/temp <Installdir>\Program Files\Symantec\ SharePoint\Quarantine These directories are the temporary directories that Symantec Scan Engine uses for scanning. The server on which Symantec Protection for SharePoint console runs. This is the default quarantine directory that is used by Symantec Protection for SharePoint Servers. About stopping IIS during installation System requirements During the installation, the Microsoft Internet Information Server (IIS) must be stopped temporarily. During the time that it takes to complete the installation, no access to IIS services is available. You must plan to install the Symantec Protection for SharePoint console when Microsoft IIS can be stopped temporarily. Microsoft IIS restarts automatically after the installation is complete. You can choose to install both components of Symantec Protection for SharePoint Servers together on the same computer or on different computers. The Symantec Protection for SharePoint console is supported on 32-bit and 64-bit computers for Windows 2008 Server. The Symantec Scan Engine is supported on 32-bit and 64-bit computers for Windows 2003 Server and Windows 2008 Server. See System requirements for Symantec Protection for SharePoint Servers integrated installation on page 30. See System requirements for Symantec Protection for SharePoint console only on page 30. See System requirements for Symantec Scan Engine on page 31.
30 30 Installing Symantec Protection for SharePoint Servers System requirements System requirements for Symantec Protection for SharePoint Servers integrated installation Table 2-2 describes the minimum system requirements to install the Symantec Protection for SharePoint console and Symantec Scan Engine on the same server. Table 2-2 Requirement Hardware requirements Operating System Minimum system requirements for Symantec Protection for SharePoint console and Symantec Scan Engine Details Processor and Memory: As per the requirements of the version of Microsoft SharePoint Disk space: 515 MB 1 network interface card (NIC) running TCP/IP with a static IP address Internet connection to update antivirus definitions Symantec Protection for SharePoint Servers runs on the following platforms: Windows Server bit with Service Pack 2 or later Windows Server bit Standard/Enterprise/Data Center SP2/R2 Software requirements Any of the following Microsoft SharePoint Server editions: Microsoft SharePoint Foundation 2010 Microsoft Office SharePoint Server 2010 Any of the following Web browsers: Microsoft Internet Explorer 7.0 (with the most recent service pack that is available) or higher The following software components: Microsoft.NET Framework 2.0 SP1 or higher Central Admin Site ASP.NET Version 2.0 or higher System requirements for Symantec Protection for SharePoint console only Table 2-3 describes the minimum system requirements to install the Symantec Protection for SharePoint console.
31 Installing Symantec Protection for SharePoint Servers System requirements 31 Table 2-3 Requirement Hardware requirements Operating System Software requirements Minimum system requirements for the Symantec Protection for SharePoint console Details Processor and Memory: As per the requirements of the version of Microsoft SharePoint Disk space: 50 MB (may vary depending on how long you choose to maintain log files) Windows Server bit with Service Pack 2 or later Windows Server bit Standard/Enterprise/Data Center SP2/R2 Any of the following Microsoft SharePoint Server editions: Microsoft SharePoint Foundation 2010 Microsoft Office SharePoint Server 2010 Any of the following Web browsers: Microsoft Internet Explorer 7.0 (with the most recent service pack that is available) or higher The following software components: Microsoft.NET Framework 2.0 SP1 or higher Central Admin Site ASP.NET Version 2.0 or higher System requirements for Symantec Scan Engine You can install Symantec Scan Engine on Windows, Linux, and Solaris. See Windows system requirements on page 31. See Solaris system requirements on page 32. See Linux system requirements on page 33. Windows system requirements The following are the system requirements to install Symantec Scan Engine on Windows: Operating system Windows 2000 Server with the latest service pack Windows Server 2003 (32-bit and 64-bit) Windows Server 2003 R2 (32-bit and 64-bit) Windows Server 2008 (32-bit and 64-bit) Windows Server 2008 R2 (32-bit and 64-bit)
32 32 Installing Symantec Protection for SharePoint Servers System requirements Processor Memory Disk space Hardware Software Pentium 4 processor 1 GHz or higher 1 GB of RAM or higher 500 MB 1 network interface card (NIC) running TCP/IP with a static IP address Internet connection to update definitions 100 Mbit/s Ethernet link (1 Gbit/s recommended) J2SE Runtime Environment (JRE) 5.0 (update 13 or later) or JRE6.0 The most current version of JRE 5.0 and JRE 6.0 at the time of product ship is provided in the software package in the following folder: Java\Win32 Any of the following Web browsers: Microsoft Internet Explorer 6.0 (with the most recent service pack that is available) Use Microsoft Internet Explorer to access the Symantec Scan Engine console from a Windows client computer. Mozilla Firefox 1.5 or later Use Mozilla Firefox to access the Symantec Scan Engine console from a Solaris or Linux client computer. The Web browser is only required for Web-based administration. The Web browser must be installed on a computer from which you want to access the Symantec Scan Engine console. The computer must have access to the server on which Symantec Scan Engine runs. Solaris system requirements The following are the system requirements to install Symantec Scan Engine on Solaris: Operating system Solaris 9 and 10 Ensure that your operating system has the latest patches that are available. Processor Memory Disk space SPARC 1 GB of RAM or higher 500 MB
33 Installing Symantec Protection for SharePoint Servers System requirements 33 Hardware Software 1 network interface card (NIC) running TCP/IP with a static IP address Internet connection to update definitions 100 Mbit/s Ethernet link (1 Gbit/s recommended) J2SE Runtime Environment (JRE) 5.0 (update 13 or later) or JRE 6.0 The most current version of JRE 5.0 and JRE 6.0 at the time of product ship is provided in the software package in the following folder: Java\Solaris If you install the self-extracting JRE, ensure that you note the installation location. You must provide the location of the JRE if the installer is unable to detect it. Any of the following Web browsers: Microsoft Internet Explorer 6.0 (with the most recent service pack that is available) Use Microsoft Internet Explorer to access the Symantec Scan Engine console from a Windows client computer. Mozilla Firefox 1.5 or later Use Mozilla Firefox to access the Symantec Scan Engine console from a Solaris or Linux client computer. The Web browser is only required for Web-based administration. The Web browser must be installed on a computer from which you want to access the Symantec Scan Engine console. The computer must have access to the server on which Symantec Scan Engine runs. Linux system requirements The following are the system requirements to install Symantec Scan Engine on Linux: Operating system Processor Memory Disk space Red Hat Linux Enterprise Server 3 and 4 Red Hat Linux Advanced Server 3 and 4 Red Hat Enterprise Linux 5 SUSE Linux Enterprise Server 9 and 10 Red Hat Enterprise Linux 5 (64-bit) Pentium 4 processor 1 GHZ or higher 1 GB of RAM or higher 500 MB
Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide
Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book
More informationSymantec Protection for SharePoint Servers 6.0.4. Getting Started Guide
Symantec Protection for SharePoint Servers 6.0.4 Getting Started Guide Symantec Protection for SharePoint Servers Getting Started Guide The software described in this book is furnished under a license
More informationSymantec AntiVirus for Network Attached Storage Integration Guide
Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement
More informationSymantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
More informationSymantec Protection Engine for Cloud Services 7.0 Release Notes
Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and
More informationSymantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4
Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is
More informationConfiguring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc
Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described
More informationSymantec LiveUpdate Administrator. Getting Started Guide
Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationSymantec Security Information Manager - Best Practices for Selective Backup and Restore
Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in
More informationSymantec Client Firewall Policy Migration Guide
Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Endpoint Protection Shared Insight Cache User Guide
Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and
More informationConfiguring Symantec AntiVirus for NetApp Storage system
Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used
More informationSymantec Virtual Machine Management 7.1 User Guide
Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in
More informationVeritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1
Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is
More informationSymantec Mobile Management for Configuration Manager
Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software
More informationSymantec NetBackup for Microsoft SharePoint Server Administrator s Guide
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this
More informationSymantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0
Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase
More informationSymantec Security Information Manager 4.8 Release Notes
Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used
More informationVeritas Operations Manager Package Anomaly Add-on User's Guide 4.1
Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a
More informationBackup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0
Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationVeritas Cluster Server Getting Started Guide
Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished
More informationSymantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide
Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software
More informationSymantec Management Platform Installation Guide. Version 7.0
Symantec Management Platform Installation Guide Version 7.0 Symantec Management Platform Installation Guide The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Critical System Protection Configuration Monitoring Edition Release Notes
Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book
More informationSymantec Mobile Management 7.2 MR1Quick-start Guide
Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only
More informationAltiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
More informationSymantec Critical System Protection 5.2.9 Agent Guide
Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in
More informationSymantec Enterprise Security Manager Modules. Release Notes
Symantec Enterprise Security Manager Modules for MS SQL Server Databases Release Notes Release 4.1 for Symantec ESM 9.0.x and 10.0 For Windows 2000/2008 and Windows Server 2003 Symantec Enterprise Security
More informationConfiguring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP
Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software
More informationAltiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished
More informationSymantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
More informationSymantec NetBackup for Microsoft SharePoint Server Administrator s Guide
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this
More informationVeritas Operations Manager Release Notes. 3.0 Rolling Patch 1
Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in
More informationSymantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference
Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license
More informationSymantec Scan Engine Implementation Guide
Symantec Scan Engine Implementation Guide Symantec Scan Engine Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
More informationSymantec NetBackup Vault Operator's Guide
Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may
More informationSymantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide
Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software
More informationSymantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5
Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished
More informationEmail Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationSymantec Protection Center Enterprise 3.0. Release Notes
Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used
More informationSymantec System Recovery 2013 Management Solution Administrator's Guide
Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a
More informationSymantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
More informationSymantec System Recovery 2011 Management Solution Administrator's Guide
Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a
More informationSymantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
More informationSymantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software
More informationSymantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7
TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationSymantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
More informationSymantec AntiVirus for Network Attached Storage 5.1
Getting Started Symantec AntiVirus for Network Attached Storage 5.1 This chapter includes the following topics: About Symantec AntiVirus for Network Attached Storage 5.1 About documentation What s new
More informationSymantec Backup Exec System Recovery Exchange Retrieve Option User's Guide
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under
More informationSymantec Data Center Security: Server Advanced v6.0. Agent Guide
Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and
More informationSymantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide
Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is
More informationSymantec Secure Email Proxy Administration Guide
Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo
More informationSymantec Event Collector for Cisco NetFlow version 3.7 Quick Reference
Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement
More informationSymantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described
More informationSymantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
More informationSymantec Endpoint Protection Integration Component 7.5 Release Notes
Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.
More informationSymantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance
More informationRecovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note
Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.
More informationInstallation Guide for Symantec Endpoint Protection and Symantec Network Access Control
Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in
More informationVeritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server
Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability
More informationSymantec ApplicationHA agent for Internet Information Services Configuration Guide
Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide
More informationSymantec NetBackup for Lotus Notes Administrator's Guide
Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished
More informationAltiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationSymantec Mail Security for Microsoft Exchange
Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license
More informationSymantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1
Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
More informationPGP CAPS Activation Package
PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationVeritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes
Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes November 2012 Veritas Operations Manager Advanced Release Notes The software described in this book is furnished under a license agreement
More informationBackup Exec 15. Quick Installation Guide
Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationSymantec Protection Engine for Cloud Services Getting Started Guide
Symantec Protection Engine for Cloud Services Getting Started Guide Symantec Protection Engine for Cloud Services Getting Started Guide The software described in this book is furnished under a license
More informationGetting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Enterprise Security Manager Patch Policy Release Notes
Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement
More informationSymantec Endpoint Protection Small Business Edition Implementation Guide
Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide The software described in this book is furnished under
More informationSymantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide
Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for
More informationVeritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007
Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows Server 2003, Windows Server 2008 VCS Library Management Pack Veritas Cluster Server Library
More informationSymantec Endpoint Protection Small Business Edition Client Guide
Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide The software described in this book is furnished under a license agreement
More informationSymantec Response Assessment module Installation Guide. Version 9.0
Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationAltiris Asset Management Suite 7.1 from Symantec User Guide
Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may
More informationSymantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
More informationSymantec Security Information Manager 4.7.4 Release Notes
Symantec Security Information Manager 4.7.4 Release Notes Symantec Security Information Manager 4.7.4 Release Notes The software described in this book is furnished under a license agreement and may be
More informationVeritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault
Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Storage Foundation
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up SharePoint Server Archiving 10.0 Symantec Enterprise Vault: Setting up SharePoint Server Archiving The software described in this book is furnished under a license
More informationAltiris Asset Management Suite 7.1 SP2 from Symantec User Guide
Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationSymantec NetBackup for DB2 Administrator's Guide
Symantec NetBackup for DB2 Administrator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for DB2 Administrator's Guide The software described in this book is furnished under a license agreement
More informationSymantec Mail Security for Microsoft Exchange Getting Started Guide
Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationSymantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and
More informationSymantec Protection for SharePoint Servers Implementation Guide
Symantec Protection for SharePoint Servers Implementation Guide 2 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book is furnished under a license agreement
More informationSymantec NetBackup Deduplication Guide
Symantec NetBackup Deduplication Guide UNIX, Windows, Linux Release 7.1 21159706 Symantec NetBackup Deduplication Guide The software described in this book is furnished under a license agreement and may
More informationAltiris Monitor Solution for Servers 7.5 from Symantec User Guide
Altiris Monitor Solution for Servers 7.5 from Symantec User Guide Altiris Monitor Solution for Servers 7.5 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationPGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes
PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP
More informationAltiris Patch Management Solution for Windows 7.1 from Symantec User Guide
Altiris Patch Management Solution for Windows 7.1 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 from Symantec User Guide The software described in this book is furnished under
More informationSymantec NetBackup PureDisk Deduplication Option Guide
Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Protection Engine for Cloud Services Getting Started Guide
Symantec Protection Engine for Cloud Services Getting Started Guide Symantec Protection Engine for Cloud Services Getting Started Guide The software described in this book is furnished under a license
More informationSymantec NetBackup Clustered Master Server Administrator's Guide
Symantec NetBackup Clustered Master Server Administrator's Guide for Windows, UNIX, and Linux Release 7.5 Symantec NetBackup Clustered Master Server Administrator's Guide The software described in this
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.5 21220052 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished
More informationAltiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes
Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes The
More informationSymantec Asset Management Suite 7.5 powered by Altiris technology User Guide
Symantec Asset Management Suite 7.5 powered by Altiris technology User Guide Symantec Asset Management Suite 7.5 powered by Altiris technology User Guide The software described in this book is furnished
More information