Symantec Secure Proxy Administration Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Symantec Secure Email Proxy Administration Guide"

Transcription

1 Symantec Secure Proxy Administration Guide

2 Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ( Third Party Programs ). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

3 Symantec Corporation 350 Ellis Street Mountain View, CA

4 Technical Support Contacting Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s support offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services For information about Symantec s support offerings, you can visit our website at the following URL: All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Customers with a current support agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information

5 Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Customer service information is available at the following URL: Customer Service is available to assist with non-technical questions, such as the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs, DVDs, or manuals

6 Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America

7 Setting up an proxy for Symantec App Center This document includes the following topics: Restricting mobile device access to organizational Setting up the proxy Selecting your proxy deployment model Installing and registering the proxy Installing SSL certificates for the proxy Creating, configuring, and managing proxy clusters Testing your proxy Creating device policies that route access through your proxy Blocking access for non-compliant devices Monitoring the health of your proxy Unregistering your proxy Uninstalling your proxy Secure Proxy command line tools Secure Proxy default file locations

8 Restricting mobile device access to organizational 8 Restricting mobile device access to organizational Symantec App Center integrates with the Secure Proxy to manage access to your organization's Exchange ActiveSync mail server. It provides an access control point for traffic to registered devices. When users attempt to access corporate from their devices, the connection requests are routed through the proxy. The proxy verifies the connections come from approved users on registered devices. Supported apps are as follows: Symantec Secure (Mobile device management (MDM ) is optional) Android 4.x ios 7/6 ios Native app (MDM is required) ios 7/6 Next See Setting up the proxy on page 8. Setting up the proxy Follow this workflow to install and set up proxy and integrate it with Symantec App Center. Table 1-1 Phase Task proxy installation and setup workflow Description 1 2 Select a deployment model. Install and register the proxy. Decide how you want to deploy the proxy in your environment. See Selecting your proxy deployment model on page 10. Install and register the proxy through the command line. See Installing and registering the proxy on page 12.

9 Setting up the proxy 9 Table 1-1 Phase Task proxy installation and setup workflow (continued) Description 3 optional optional 7 8 Install SSL certificates. Create and configure clusters. Test the proxy. Create a compliance rule. Create a device policy. Monitor the health of your proxies. You only need to install SSL certificates if you use SSL authentication. See Installing SSL certificates for the proxy on page 13. Clusters let you assign the same configurations to multiple proxies. See Creating, configuring, and managing proxy clusters on page 15. Before you deploy the proxy in your environment, test it first. See Testing your proxy on page 17. You can create rules to block access when a device is non-compliant. See Blocking access for non-compliant devices on page 22. Your device policy must specify the Exchange ActiveSync host name or IP address of your proxy server or load balancer. It must also specify which apps are supported and if MDM is required. See Creating device policies that route access through your proxy on page 19. You can monitor the health of your proxies from the Admin Console. See Monitoring the health of your proxy on page 22. Click here for the interactive workflow. More information See Restricting mobile device access to organizational on page 8. Get started See Selecting your proxy deployment model on page 10.

10 Selecting your proxy deployment model 10 Selecting your proxy deployment model Before you install Secure Proxy and integrate it with Symantec App Center, you should consider which deployment option best suits your environment. The deployment options are based on where the SSL connection terminates. The proxy must terminate the SSL connection or it receives traffic and clear text. Deployment options are as follows: SSL termination at proxy SSL termination at a load balancer You can stand up multiple proxies behind the load balancer. Each proxy runs independently and communicates with App Center; however, there is no data sharing between proxies. You can add and remove proxies as needed to handle additional loads. The load balancer is expected to handle failover. When you use a load balancer, the recommended setting is to round-robin with persistence. Note: Do not install the Secure App Proxy and Secure Proxy on the same server. Figure 1-1 Typical proxy deployment model Deployment recommendations are as follows: No more than 5,000 connections per proxy.¹

11 Selecting your proxy deployment model 11 Install your proxy in a DMZ or behind a firewall. No more than one proxy per Exchange Client Access server (CAS).¹ ¹ Microsoft recommendations Refer to the following table for information about connectivity: Between the proxy and App Center Between the device and the proxy The proxy makes HTTPS requests to App Center by connecting over SSL through port 443. ActiveSync is an HTTP-based protocol and, therefore, the device makes a HTTP/S request to the proxy (HTTPS is recommended). If HTTPS is used, you can install SSL certificates on a load balancer in front of the proxy, on the proxy, or both. You must determine the best point(s) of SSL termination based on your organization's architecture and requirements. While you can configure the proxy to listen on any port regardless of whether you use SSL, standard practices are to configure port 80 for non-ssl traffic and port 443 for SSL HTTP/S traffic. Therefore, the deployment scenario you select determines which ports you should open. You configure the listening port for the proxy during proxy installation. See Installing and registering the proxy on page 12. Note: You can configure the ios native client to connect over any port, but the Secure client always connects over port 443 for HTTPS traffic. Between the proxy and Exchange You can configure CAS servers to listen with or without SSL. Typically, SSL is configured, and the proxy connects to it over port 443. You enable SSL and specify the port in the App Center Admin Console. Next See Creating, configuring, and managing proxy clusters on page 15. See Installing and registering the proxy on page 12. More information Click here for the interactive workflow. Hardening your App Center Secure Proxy See Restricting mobile device access to organizational on page 8.

12 Installing and registering the proxy 12 Installing and registering the proxy After you decide on your deployment model, you're ready to install the proxy and register it with Symantec App Center. What you'll need Server on which to install the proxy The server on which you install the proxy must meet the following minimum system requirements: 4 cores 8-GB RAM 20-GB disk space Physical or virtual machine 64-bit CentOS/RHEL 6.4 See Install libicu on page 13. Java JRE 1.7.0_51 or later Recommend two NICs: one internal facing; one external facing For proxy installation, you'll need the following: IP address and port for receiving incoming connections Proxy name The proxy name is arbitrary, but it must be unique. It's the name by which App Center knows the proxy server. For proxy registration, you'll need the following: Your App Center URL For example: User name and password A user that has admin rights to App Center Download the proxy.iso file In the Admin Console, click Downloads > Download Secure Proxy. Tip: This option appears at the bottom of the Downloads page.

13 Installing SSL certificates for the proxy 13 Install libicu The proxy needs the libicu package. On RHEL 6.4 installations, you may need to install libicu prior to installing the proxy. On the server on which you install Secure Proxy, type the following command: yum install libicu Install and register your proxy 1 Copy the.iso to the server and mount it. 2 Run the following command: #./setup.sh install 3 Follow the installation script. Next The installation script prompts you to register your proxy, but you can also register later through the command line. Important: You must register the proxy for the proxy and App Center to communicate, and it must be registered before it can be added to a cluster. See Secure Proxy command line tools on page 25. Tip: If any installation or registration issues occur, refer to the logs. See Secure Proxy default file locations on page 26. See Installing SSL certificates for the proxy on page 13. More information See Restricting mobile device access to organizational on page 8. See Selecting your proxy deployment model on page 10. Installing SSL certificates for the proxy After you install the proxy and register it with Symantec App Center, you have the option to set up SSL certificates on the proxy server. The SSL certificate chain must begin with the server certificate and the chained-certificate bundle must be concatenated after the server certificate. For more information, see the section on SSL certificate chains at the following Nginx website.

14 Installing SSL certificates for the proxy 14 The certificate file should include all of the certificates in the same order of the certificate chain, starting from the SSL certificate itself down to the root CA (but excluding the root). Set up the SSL certificate on your proxy server 1 Copy the certificate file to the following directory: /usr/local/nginx/certs/ 2 Open the nginx.conf file in the following directory: /usr/local/nginx/conf 3 In the server section in the http configuration block, locate the following text: server { } listen YourIPAddress:YourPort; include /usr/local/nginx/conf/ngao.conf; 4 Add an ssl identifier to the listen directive. For example: server { } listen :443 ssl; include /usr/local/nginx/conf/ngao.conf;

15 Creating, configuring, and managing proxy clusters 15 5 Add the following lines beneath the listen directive: ssl_certificate /usr/local/nginx/certs/yourcert.crt; ssl_certificate_key /usr/local/nginx/certs/yourcertkey.key; For example: server { } listen :443 ssl; ssl_certificate /usr/local/nginx/certs/yourcert.crt; ssl_certificate_key /usr/local/nginx/certs/yourcertkey.key; include /usr/local/nginx/conf/ngao.conf; 6 Type the following command to restart nginx: #service nginx restart Next See Creating, configuring, and managing proxy clusters on page 15. More information Click here for the interactive workflow. See Restricting mobile device access to organizational on page 8. See Installing and registering the proxy on page 12. Creating, configuring, and managing proxy clusters Create proxy clusters to organize and assign proxies common configurations. In Symantec App Center, proxy clusters are for shared configuration only. proxy clusters are not a cluster in the traditional sense of load balancer or failover. You must register your proxies before you can add them to a cluster. You can register your proxy when you install it or later through the command line. See Installing and registering the proxy on page 12. See Secure Proxy command line tools on page 25.

16 Creating, configuring, and managing proxy clusters 16 Create and configure a cluster 1 Click Settings > Proxy > Create New Cluster. 2 On the General Settings page, specify the cluster settings. Important: In active mode, the proxy enforces rules when the device is registered and in compliance. Otherwise, access is denied. In passive mode, the proxy behaves the same way as active mode. However, the verdict of which connections would have been permitted if the cluster had been in active mode is recorded in the log. This information lets you test the cluster before you make it active. Tip: You may want to initially set a cluster to passive mode until you have tested all of the proxies in the cluster. See Testing your proxy on page Under Traffic Settings, specify the host name, ActiveSync server, and port for the cluster. Also indicate if you want to use SSL. 4 Click Save. The new cluster appears in the Available Clusters table. Add a proxy to a cluster Under Available Proxies, locate and drag one or more proxies to a cluster. Tip: To reassign a proxy to a different cluster, unlink the proxy from the cluster first and then add it to the desired cluster. You can't simply drag a proxy to another cluster. See Remove (unlink) a proxy from a cluster on page 17. Edit an existing cluster 1 In the Available Clusters table, click Edit beside the cluster that you want to edit. 2 Make your desired changes, and click Save. When you make any modifications to a cluster, the services for all of the clusters restart.

17 Testing your proxy 17 Remove (unlink) a proxy from a cluster In the Available Clusters table, click the x beside the name the proxy that you want to remove. Then confirm that you want to unlink the proxy from the cluster. The unlinked proxies appear in the Available Proxies list. When a proxy is no longer part of a cluster, it no longer processes data and stops accepting connections. Proxies that have been removed from a cluster continue to check in with App Center on the regular basis for updates in case it's added back to a cluster. Important: You must unlink every proxy from the cluster before you can delete the cluster. Delete an existing cluster Next When all proxies have been removed from the cluster, in the Available Clusters table, click Delete on the right column of the cluster row that you want to remove. Then confirm that you do want to remove it. See Testing your proxy on page 17. More information Click here for the interactive workflow. See Restricting mobile device access to organizational on page 8. See Installing SSL certificates for the proxy on page 13. See Monitoring the health of your proxy on page 22. See Unregistering your proxy on page 23. Testing your proxy Before you create Symantec App Center device policies to use the Secure Proxy, you should test it in passive mode first. In passive mode, the proxy allows access to your organization's , but also logs activity for you to view for troubleshooting purposes. See Secure Proxy default file locations on page 26.

18 Testing your proxy 18 Configure the cluster to passive mode 1 Click Settings > Proxy. 2 Select the cluster that contains the proxy you want to test, and click Edit. 3 Change the Mode to Passive, change the Logging Level to Information, and click Save. Create a device policy 1 Create a device policy. See Creating device policies that route access through your proxy on page Make sure that the device policy has the highest precedence. See "Prioritizing device policies". Attempt access From a mobile device, attempt to access your organization's . The device that you use to test the policy should... Belong to a person in the target group to whom you've assigned the device policy Meet the device policy compliance rules, if any Contain the app that you permit in your device policy Have MDM enabled if required per the device policy Contain the native App Center App

19 Creating device policies that route access through your proxy 19 Check the proxy logs 1 On the proxy server, access the logs in the following location: /usr/local/nginx/logs 2 View the logs to determine if access would have been permitted. Log file entries in passive mode are prepended with the following: [Passive Mode] Decision in Active Mode will be: Below is an example of what the log files might look like in passive mode: 2014/04/03 14:40:06 [info] 22043#0x00007f872a535700: [ Proxy] [Passive Mode] Decision in Active Mode will be: Request is blocked: [EAS:Applxxxxxxxxxx] key does not exist in Redis. User: domain\user1; DeviceId: Applxxxxxxxxxx PolicyId: xxxxxxxxx; UserAgent: Apple-iPhone3C1/ domain\user1 2014/04/03 14:40:09 [info] 22043#0x00007f872a535700: [ Proxy] [Passive Mode] Decision in Active Mode will be: Request is blocked: [EAS:Applxxxxxxxxxx] is BLOCKED. User: domain\user1; DeviceId: Applxxxxxxxxxx PolicyId: xxxxxxxxx; UserAgent: Apple-iPhone3C1/ domain\user1 Allowed requests: 2014/04/03 15:35:43 [info] 43678#0x00007f01fdbd2700: [ Proxy] [Passive Mode] Decision in Active Mode will be: Request is allowed. User: domain\user1; DeviceId: Applxxxxxxxxx; PolicyId: xxxxxxxx; UserAgent: Apple-iPhone3C1/ domain\user1 Tip: When you've finished your testing, don't forget to delete or modify your test device policy and set your cluster to Active mode. Next See Blocking access for non-compliant devices on page 22. More information Click here for the interactive workflow. See Restricting mobile device access to organizational on page 8. See Creating device policies that route access through your proxy on page 19. Creating device policies that route access through your proxy You can create a device policy in Symantec App Center that directs traffic through your proxy for the apps that you allow.

20 Creating device policies that route access through your proxy 20 Create a device policy 1 Click Device Policy > New Policy and specify a name and description for your policy. 2 Add the groups for which this policy applies. 3 Under General Settings, indicate whether MDM is required. The ios native app requires MDM be enabled. The Symantec Secure app (for ios or Android) supports MDM, but doesn't require it. See Specify which apps are allowed on page 20. Select a compliance rule (optional) Click the Compliance Rule drop-down list and select a rule. Compliance rules are optional. See Blocking access for non-compliant devices on page 22. Specify which apps are allowed Under Settings, do one of the following: To use an existing Shared Settings configuration To create a new configuration Click the EAS Access Control drop-down list and select an existing configuration. 1 Click New. 2 Type a name and description for this configuration. 3 Select which apps are permitted. Tip: The ios native app requires MDM be enabled. The Symantec Secure app (for ios or Android) supports MDM, but doesn't require it. 4 Click Save. Specify the proxy through which to direct traffic Configure the options for the apps that are allowed: Secure app Under Settings, do one of the following: To use an existing Shared Settings configuration: Click the Secure Configuration drop-down list and select an existing configuration. To create a new configuration:

21 Creating device policies that route access through your proxy 21 Beside Secure Configuration, click New. Type a name and description for this configuration. In the Exchange ActiveSync Host field, type the host name or IP address of the proxy or load balancer (if the proxy is fronted by a load balancer). Configure the remainder of the options based on your proxy server. See "Symantec Secure shared policy settings". Click Save. Native ios app Under ios Settings > Exchange Active Sync Configuration, do one of the following: To use an existing Shared Settings configuration: In the Exchange Active Sync Configuration box, click Add, click the configuration that you want to use, and click Select. To create a new configuration: In the Exchange Active Sync Configuration box, click New. Type a name and description for this configuration. Type the Exchange Server Name that you want to appear as the location on the device. In Exchange ActiveSync Host field, type the host name or IP address of the proxy or load balancer (if the proxy is fronted by a load balancer). Configure the remainder of the options as needed. See "ios shared policy settings". Click Save. Configure other device policy options 1 Configure any of the other device policy options you require. See "Creating device policies". 2 Click Save. Next See Monitoring the health of your proxy on page 22. More information Click here for the interactive workflow.

22 Blocking access for non-compliant devices 22 See Restricting mobile device access to organizational on page 8. Blocking access for non-compliant devices You can create device policies in Symantec App Center that block user access to your organization's if their device is non-compliant. Configure the compliance rule 1 Create or edit a compliance rule and specify the rule requirements. 2 Under Enforcements, check Block access to and click Save. Apply the compliance rule to a device policy 1 Create or modify a device policy. See Creating device policies that route access through your proxy on page Under General Settings, click the Compliance Rule drop-down menu and select the rule that you created. 3 Click Save. More information Click here for the interactive workflow. See Creating device policies that route access through your proxy on page 19. See Restricting mobile device access to organizational on page 8. Monitoring the health of your proxy Registered Secure Proxies check in with Symantec App Center on a regular basis and report their status. You can monitor your proxy status from the Admin Console. Proxy health is color-coded as follows: Gray Green The proxy is registered, but it is not assigned to a cluster. Healthy The proxy checked in 10 minutes or less ago. Yellow Warning The proxy hasn't checked in for more than 30 minutes.

23 Unregistering your proxy 23 Red Error The proxy has experienced a failure applying configuration updates or applying policies. App Center might have also detected the proxy processes are not running. If the proxy can't communicate with App Center, Access is based on the last known device policy. Important: Access is allowed during this time even if the device becomes non-compliant. But users who are blocked access continue to be blocked. After the proxy restarts, users are allowed/blocked access based on the most current device policy. Monitor the health of your proxies 1 Click Settings > Proxy. 2 In the Available Clusters table or the Available Proxies list, click on the name of the proxy you want to see more information about. Details about that proxy along with all of the other proxies in the cluster appear. This information includes the date and time of the last check-in, the status of the proxy, and any available information about the proxy. 3 For additional information, check the proxy logs. By default, the proxy logs are in the following location: /user/local/nginx/logs More information Click here for the interactive workflow. See Restricting mobile device access to organizational on page 8. Unregistering your proxy When you unregister Secure Proxy from Symantec App Center, the following events occur: The proxy no longer checks in with Symantec App Center It stops accepting connections Policy, configuration, and user data is deleted The proxy no longer appears on the Settings > Proxy page in the App Center Admin Console You must unregister the proxy before you uninstall it. See Uninstalling your proxy on page 24.

24 Uninstalling your proxy 24 Remove the proxy from the cluster 1 Click Settings > Proxy. 2 In the Available Clusters list, locate the proxy that you want to unregister and click the x beside the name. You must unlink the proxy from the cluster before you can unregister it. 3 Confirm that you want to unlink the proxy from the cluster. Unregister the proxy 1 In the Available Proxies list, locate the proxy that you want to unregister and click the x beside the name. 2 Confirm that you want to delete the proxy. More information See Restricting mobile device access to organizational on page 8. See Creating, configuring, and managing proxy clusters on page 15. See Secure Proxy command line tools on page 25. Uninstalling your proxy Before you uninstall Secure Proxy, you must unregister the proxy from Symantec App Center first. See Unregistering your proxy on page 23. If you install the proxy with the default settings, the uninstall script performs a clean uninstallation of the nginx directory removing Secure Proxy and its related files. If you modified the location of installation and log files, all proxy files may not be removed during uninstallation. In that case, you'll need to locate and manually delete these files when you permanently uninstall the proxy. A user and group account are created when you initially install Secure Proxy. The default user and group account names are both symc-proxy, but you can customize these names. You may want to remove the user and group account names if you permanently uninstall the proxy. However, make sure that you don't inadvertently remove possible shared accounts.

25 Secure Proxy command line tools 25 Run the uninstall script 1 Change directories to the directory that contains the uninstall.sh script. The default location of the uninstall.sh script is: /usr/local/nginx/scripts Tip: If you cannot run the uninstallation from the uninstall.sh scripts folder for any reason, you can mount the proxy.iso file and use the setup.sh script to uninstall. 2 Type the following command: #./uninstall.sh More information See Restricting mobile device access to organizational on page 8. See Secure Proxy default file locations on page 26. Secure Proxy command line tools Modify Secure Proxy after installation through the command line using the configure.sh script. The nginx service automatically restarts after the command finishes executing. The default location of the script is as follows: /usr/local/nginx/scripts The usage is as follows: #/configure.sh [OPTIONS] {TOOL} Table 1-2 lists the tools that you can execute using the configure.sh script. Table 1-2 Configure.sh tools Tool network Description Configures the network parameters. The configuration script prompts you for the network interface and port that receives/transfer data. proxy listen Configures the listening parameters of your proxy. The configuration script prompts you for the listening parameters of the proxy: IP, port, SSL (on or off). proxy registration check Checks to see if your proxy server is registered.

26 Secure Proxy default file locations 26 Table 1-2 Tool Configure.sh tools (continued) Description proxy registration [App Center URI] [proxy name] [username] [ password] Provides the parameters to register your proxy with App Center. You can type all of the parameters to register your proxy or let the script prompt you. redis display_password redis new_password redis port [port number] Displays the password used by Redis. Generates a new password for Redis. Configures the Redis port. More information See Restricting mobile device access to organizational on page 8. Secure Proxy default file locations Table 1-3 lists the default location for Secure Proxy files. Table 1-3 File Secure Proxy configure.sh and uninstall.sh files setup.sh installation data and log files Main binary files Configuration files Security certificates Secure Proxy default file locations Location /usr/local/nginx /usr/local/nginx/scripts /var/lib/symc.inventory /usr/local/nginx/sbin /user/local/nginx/conf /usr/local/nginx/certs

27 Secure Proxy default file locations 27 Table 1-3 File Nginx log files Secure Proxy default file locations (continued) Location /usr/local/nginx/logs The log files contained in this folder are as follows: error.log Contains logs on users and devices which are blocked or allowed by the proxy controller.log Contains logs on proxy communication with App Center registration.log This log is written during the proxy registration process with App Center redis.log Internal database process logs More information See Restricting mobile device access to organizational on page 8. See Uninstalling your proxy on page 24.

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec NetBackup Status Codes Reference Guide

Symantec NetBackup Status Codes Reference Guide Symantec NetBackup Status Codes Reference Guide UNIX, Windows, and Linux Release 7.5 21220054 Symantec NetBackup Status Codes Reference Guide The software described in this book is furnished under a license

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec ApplicationHA agent for Internet Information Services Configuration Guide Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.1

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.1 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.1 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Critical System Protection 5.2.9 Agent Guide

Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Virtual Machine Management 7.1 User Guide

Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Enterprise Security Manager Modules. Release Notes

Symantec Enterprise Security Manager Modules. Release Notes Symantec Enterprise Security Manager Modules for MS SQL Server Databases Release Notes Release 4.1 for Symantec ESM 9.0.x and 10.0 For Windows 2000/2008 and Windows Server 2003 Symantec Enterprise Security

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is

More information

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Configuring Symantec AntiVirus for NetApp Storage system

Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions

More information

Symantec Mobile Encryption for ios. User's Guide

Symantec Mobile Encryption for ios. User's Guide Symantec Mobile Encryption for ios User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 2.0.0.

More information

Symantec NetBackup PureDisk Deduplication Option Guide

Symantec NetBackup PureDisk Deduplication Option Guide Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

Altiris Asset Management Suite 7.1 from Symantec User Guide

Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Storage Foundation

More information

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec High Availability Console Installation and Upgrade Guide

Symantec High Availability Console Installation and Upgrade Guide Symantec High Availability Console Installation and Upgrade Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 February 2013 Symantec High Availability Solution Installation and Configuration

More information

Symantec NetBackup Clustered Master Server Administrator's Guide

Symantec NetBackup Clustered Master Server Administrator's Guide Symantec NetBackup Clustered Master Server Administrator's Guide for Windows, UNIX, and Linux Release 7.5 Symantec NetBackup Clustered Master Server Administrator's Guide The software described in this

More information

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

More information

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software

More information

Symantec NetBackup for DB2 Administrator's Guide

Symantec NetBackup for DB2 Administrator's Guide Symantec NetBackup for DB2 Administrator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for DB2 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Linux 5.1 Service Pack 1 Platform Release 2 Veritas Storage Foundation and High Availability Solutions Getting Started Guide

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Database Agent for Microsoft SQL Configuration

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes

Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes November 2012 Veritas Operations Manager Advanced Release Notes The software described in this book is furnished under a license agreement

More information

Altiris Monitor Solution for Servers 7.5 from Symantec User Guide

Altiris Monitor Solution for Servers 7.5 from Symantec User Guide Altiris Monitor Solution for Servers 7.5 from Symantec User Guide Altiris Monitor Solution for Servers 7.5 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Symantec NetBackup Plug-in for VMware vcenter Guide. Release 7.6

Symantec NetBackup Plug-in for VMware vcenter Guide. Release 7.6 Symantec NetBackup Plug-in for VMware vcenter Guide Release 7.6 Symantec NetBackup Plug-in for vcenter Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5

Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5 Symantec NetBackup AdvancedDisk Storage Solutions Guide Release 7.5 21220064 Symantec NetBackup AdvancedDisk Storage Solutions Guide The software described in this book is furnished under a license agreement

More information

Symantec System Recovery 2011 Management Solution Administrator's Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows on VMware 6.1 February 2014 Symantec ApplicationHA Agent for Microsoft Internet Information Services

More information

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec AntiVirus for Network Attached Storage Integration Guide

Symantec AntiVirus for Network Attached Storage Integration Guide Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Security Manager Patch Policy Release Notes

Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement

More information

PGP Portable Quick Start Guide Version 10.2

PGP Portable Quick Start Guide Version 10.2 PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Management Platform Installation Guide. Version 7.0

Symantec Management Platform Installation Guide. Version 7.0 Symantec Management Platform Installation Guide Version 7.0 Symantec Management Platform Installation Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec ApplicationHA 6.1 Generic Agent Configuration Guide - AIX on IBM PowerVM

Symantec ApplicationHA 6.1 Generic Agent Configuration Guide - AIX on IBM PowerVM Symantec ApplicationHA 6.1 Generic Agent Configuration Guide - AIX on IBM PowerVM January 2014 Symantec ApplicationHA 6.1 Generic Agent Configuration Guide The software described in this book is furnished

More information

Veritas Dynamic Multi-Pathing for Windows Release Notes

Veritas Dynamic Multi-Pathing for Windows Release Notes Veritas Dynamic Multi-Pathing for Windows Release Notes Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 October 2012 Veritas Dynamic Multi-Pathing for Windows Release Notes The software described

More information

Symantec Security Information Manager 4.7.4 Release Notes

Symantec Security Information Manager 4.7.4 Release Notes Symantec Security Information Manager 4.7.4 Release Notes Symantec Security Information Manager 4.7.4 Release Notes The software described in this book is furnished under a license agreement and may be

More information

Note: To view the most recent version of this document, go to the Products section on the Symantec Corporation Web site.

Note: To view the most recent version of this document, go to the Products section on the Symantec Corporation Web site. 1 of 5 Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of Symantec Endpoint Encryption Full Disk for Mac OS X. Symantec Corporation

More information

Symantec NetBackup Clustered Master Server Administrator's Guide

Symantec NetBackup Clustered Master Server Administrator's Guide Symantec NetBackup Clustered Master Server Administrator's Guide for Windows, UNIX, and Linux Release 7.6 Symantec NetBackup Clustered Master Server Administrator's Guide The software described in this

More information

Enabling Windows Management Instrumentation Guide

Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec NetBackup Deduplication Guide

Symantec NetBackup Deduplication Guide Symantec NetBackup Deduplication Guide UNIX, Windows, Linux Release 7.1 21159706 Symantec NetBackup Deduplication Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows Server 2003, Windows Server 2008 VCS Library Management Pack Veritas Cluster Server Library

More information