Symantec Enterprise Security Manager Installation Guide. Version 9.0.1

Size: px
Start display at page:

Download "Symantec Enterprise Security Manager Installation Guide. Version 9.0.1"

Transcription

1 Symantec Enterprise Security Manager Installation Guide Version 9.0.1

2 Enterprise Security Manager Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, ActiveAdmin, BindView, bv-control, Enterprise Security Manager, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , Rights in Commercial Computer Software or Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

3 Symantec Corporation Stevens Creek Blvd. Cupertino, CA

4 Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s maintenance offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers automatic software upgrade protection Global support that is available 24 hours a day, 7 days a week Advanced features, including Account Management Services For information about Symantec s Maintenance Programs, you can visit our Web site at the following URL: Contacting Technical Support Customers with a current maintenance agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information Operating system

5 Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Customer service information is available at the following URL: Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and maintenance contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals

6 Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America Additional enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following: Symantec Early Warning Solutions Managed Security Services Consulting Services Educational Services These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring, and management capabilities. Each is focused on establishing and maintaining the integrity and availability of your IT resources. Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs. To access more information about Enterprise services, please visit our Web site at the following URL: Select your country or language from the site index.

7 Contents Technical Support... 4 Chapter 1 Planning for installation About planning for installation About Symantec Enterprise Security Manager (ESM) About Symantec ESM architecture About policies About scalability About policy run disk space requirements About CPU utilization Virtualization support for ESM Chapter 2 Chapter 3 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM About backward compatibility About preserving user data Preserving the customized ".m" files Silently upgrading the Symantec ESM console, the manager, and the agent Upgrading Symantec ESM console Upgrading the ESM manager and the agent Silently upgrading the Symantec ESM manager and the agent Upgrading Symantec ESM agent Checking remote agent upgrade status Silently upgrading the Symantec ESM agent Upgrading Symantec ESM utilities Installing Symantec ESM managers and agents on Windows About installing Symantec ESM components Before you install Symantec ESM About licensing managers... 32

8 8 Contents System requirements for Windows computers Support for internationalization-compatible computers Configuring and editing the disclaimer Installing the ESM components by using the ESM Suite Installer Silently installing the console, the manager, and the agent Installing the Symantec ESM console by using the Suite Installer Silently installing the ESM console Installing the Symantec ESM console by using the Console Installer Installing the ESM manager and the agent by using the Suite Installer Silently installing the manager and the agent Installing the Symantec ESM agent by using the Agent Installer Silently installing and registering an ESM agent Error codes for silent installation or registration failure of an ESM agent Using the Encryption tool Installing the Symantec ESM utilities Post-installation tasks Registering the Symantec ESM agents Configuring the Symantec ESM console About setting the Web browser Changing LiveUpdate configuration for a Symantec ESM agent Changing a Symantec ESM agent port Uninstalling Symantec ESM from a local computer Silently uninstalling the ESM console Uninstalling Symantec ESM from Windows Server 2008 Core Uninstalling Symantec ESM utilities Chapter 4 Installing Symantec ESM managers and agents on UNIX About installing Symantec ESM components About licensing managers System requirements for UNIX computers Supported UNIX operating systems Support for internationalization-compatible computers Installing Symantec ESM on UNIX computers Silent installation of Symantec ESM on UNIX Installing Symantec ESM utilities... 77

9 Contents 9 Post-installation tasks Appendix A Symantec ESM communications About Symantec ESM communications security About Symantec ESM communication ports Appendix B System assessment checklist About system assessment checklists Console checklist Manager checklist Agent checklist... 89

10 10 Contents

11 Chapter 1 Planning for installation This chapter includes the following topics: About planning for installation About Symantec Enterprise Security Manager (ESM) About scalability Virtualization support for ESM About planning for installation Symantec ESM collects and evaluates security-related information from agent computers on the network. A large network with many agent computers generates a large volume of security-related information. Symantec ESM can process security information from multiple agents more efficiently in a large network environment when the agents are grouped into domains. The domains group computers on the network into units with common rules and procedures. You can then manage computers by domain rather than manage an individual computer. Domains can be defined to reflect the geographical location of agent computers, or defined to correspond to the functional areas of the organization. Domains can also be defined to reflect the installation of specific security policies on computers. Let us take a scenario that describes the grouped agents according to physical location. A company site includes two buildings. The site supports 600 Symantec ESM agent computers that are located in both buildings. Each building houses different departments. For employees who are located in different areas, the company groups the employees according to their respective departments. Different company security policies cover the employees in each building. Different security

12 12 Planning for installation About Symantec Enterprise Security Manager (ESM) personnel are assigned in each building. This scenario has a clear delineation of staff, duties, and policies by physical location without any overlap. Alternatively, there may be a scenario where the arrangement of security administration, company policies, and departments is not congruent. The physical location and management of each functional area is organized differently across geographical locations. Such a scenario is an example of grouping of agents into domains on the basis of the company security policy. About Symantec Enterprise Security Manager (ESM) Symantec ESM manages sensitive data and enforces security policies across a range of client-server platforms that includes the following: Microsoft Windows Sun Solaris IBM AIX HP-UX SuSE and Red Hat Linux Novell NetWare/NDS Symantec ESM secures information while ensuring confidentiality, integrity, and availability. Symantec ESM functions include the following: Manage security policies. Detect changes to security settings or files. About Symantec ESM architecture Evaluate and report computer conformity with security policies. Symantec ESM uses a manager-agent architecture to scale the product over the enterprise. This architecture lets Symantec ESM adapt to changes in network structure by adding new Symantec ESM agents for additional operating systems and platforms. Symantec ESM consists of three main components: agent, manager, and console (GUI).

13 Planning for installation About Symantec Enterprise Security Manager (ESM) 13 About the ESM console The console is one of the primary components of Symantec ESM. The console receives data and sends requests to the other Symantec ESM components. As the data returns, the console formats the information for display and creates spreadsheet reports, pie charts, bar charts, and other visual objects. The console can connect to any manager on the network across platforms. About Symantec ESM managers Symantec ESM managers perform the following functions: Control and store policy data, and pass the data to agents or to consoles. Gather and store security data from agents, and pass the data to consoles. About Symantec ESM agents The Symantec ESM agent gathers and interprets data about the security of a computer that a policy run request generates from a manager. Security modules in the policy analyze the configuration of the workstation, the server, or the computer node where the agent resides. The Security modules also analyze the configuration of the computer where the agent acts as a proxy. The agent server gathers the resulting data and returns the data to the manager that initiated the request. The manager responds by updating the appropriate files in its database. Modules are common to all agents. They contain the executables or security checks that do the actual checking at the server or the workstation level. Symantec provides frequent updates to the modules to protect network environments from unauthorized access, data corruption, and denial-of-service attacks. Symantec ESM groups its security checks into modules, and groups modules into policies. When a policy runs on an agent, the checks that are enabled in the modules examine the agent computer and report the detected vulnerabilities. Agents perform the following additional functions: Store snapshot files of computer-specific and user-account information. Make user-requested corrections to the files. Update the snapshot files when corrections occur. About Symantec ESM utilities The Symantec ESM utilities copy policies between managers and transfer the security information from the managers to an external database.

14 14 Planning for installation About Symantec Enterprise Security Manager (ESM) The following is a list of Symantec ESM utilities: Policy tool Database Conversion tool On large networks with several managers, the Policy tool provides an efficient way to standardize the settings of the enabled security checks, templates, and word lists. The Policy tool first exports policies from a selected manager, and then imports the policies to the other managers on the network. The policies that are imported to each new manager enable the same security checks as those of the source manager. The new managers and the source manager also share the same template and word list settings. The Database Conversion tool lets you transfer security data from the databases of managers that are running on supported Operating Systems to an external database. For example, you can transfer data from the database of a manager that is installed on Windows or UNIX systems to any of the following: Microsoft SQL server Oracle The transfer includes information about the following: Agents Domains Managers Policy run messages Message suppressions Message corrections Policy run reports About policies Symantec ESM groups its security checks into modules and groups its modules into policies. When a policy runs on an agent, the checks that are enabled in the modules examine the agent computer and report the detected vulnerabilities. Symantec ESM contains the following types of policies: Sample policies

15 Planning for installation About Symantec Enterprise Security Manager (ESM) 15 Standards-based policies Regulatory policies About sample policies Sample policies are included with Symantec ESM. These policies are already configured to assess a wide range of potential vulnerabilities. With a minimum amount of setup time, the sample policies let you prioritize security loopholes and fix them accordingly. You can discover and fix the most serious and the most easily corrected problems first, then move on to more complex problems and resolutions. Sample policies are not intended for long-term use. Every time you download a security update, the sample policies are overwritten that include the template and snapshot data and settings. About standards-based policies Standards-based policies are based on ISO and other industry standards. The policies come with preconfigured values, name lists, templates, and the word files that directly apply to the targeted operating system or application. Standards-based policies use the modules from Symantec ESM Security Updates to check OS patches and the various vulnerabilities on the targeted operating system or application. The standards-based policies may also introduce new templates and word lists to check the conditions that the supported standard requires. About regulatory policies Symantec ESM regulatory policies are based on governmental regulatory policies. You use them to assess compliance with the minimum requirements of each supported regulation. Regulatory policies come with preconfigured values, name lists, templates, and the word files that directly apply to the targeted operating system or application. They use the modules and templates from Symantec ESM Security Updates to check OS patches and the various vulnerabilities on the targeted operating system. Regulatory policies may also introduce new templates and word lists to check the conditions that the regulation requires.

16 16 Planning for installation About scalability About scalability Symantec conducted scalability tests using 100baseT networks to establish the scalability parameters for Symantec ESM. The Symantec ESM-base scalability tests determined the following: Minimum computer configuration. Maximum number of agents to register with a manager. Maximum number of agents to include in a policy run. The following table lists the number of agents that a Symantec ESM manager can scale to. The host computer must have the RAM and free disk space as indicated in the table for the Symantec ESM manager to scale. The minimum RAM requirement for ESM manager is 1 GB. Table 1-1 Symantec ESM manager scalability requirements Recommended RAM Maximum number of ESM agents registered to a manager Maximum number of ESM 6.x agents per policy run Maximum number of ESM agents per policy run 2 GB Symantec ESM managers that register a large number of agents may require several gigabytes of disk space to store policy run data. You can estimate the additional free disk space that the Symantec ESM manager requires to store policy run data. See About policy run disk space requirements on page 16. You can register up to 4000 agents for each Symantec ESM manager. However, the ESM console may take longer to update if you have more than 500 agents registered to a manager. About policy run disk space requirements Disk space requirements for policy run data vary based on the following: The number of agents in the policy runs The number of reports that you retain on the computer You can make the following calculations to estimate the additional disk space requirement for each policy run: Per policy run disk space = A*M*Msg* MSize Kilobytes

17 Planning for installation Virtualization support for ESM 17 Where: A = the number of agents on which the policy is to be executed. M = the number of modules per policy run. Msg = the expected number of messages that each module returns. MSize, a constant value = 13/100. For example, a single policy run with 10 modules is executed on 4000 agents and it returns 300 messages per module. Hence, the required disk space is (4000*10*300*13)/100 = KB, which is 1.49 GB. This requirement is in addition to the disk space that you must provide to install Symantec ESM on the computer. Note: Symantec ESM managers that register a large number of agents should have several gigabytes of free disk space to store the policy run data. About CPU utilization Symantec ESM processes do not take CPU resources from other processes. Higher priority processes can still obtain the CPU resources that they need. The Symantec ESM agents and the modules run at idle priority. This means that the operating system gives them CPU time only when other threads and processes are not in queue for input and output (I/O). When Symantec ESM processes run, the CPU can easily increase up to 100 percent utilization. This means that Symantec ESM processes use the available CPU cycles. Virtualization support for ESM The ESM components are currently supported on the following virtualized environments: The ESM console, manager, and agent on VMWARE virtualized environment for Windows. ESM manager and agent on Solaris 10 on both local and global zones. ESM manager, agent, and console on virtualized environment for VMWARE ESX servers. Virtual environments use more system resources than the physical environments do. If significant performance degradation occurs in a virtualized environment, try to recreate the issue in a physical environment. Doing so provides a benchmark for the performance.

18 18 Planning for installation Virtualization support for ESM If you face any issue while using ESM on VMWARE, recreate that issue on a physical computer. If the issue cannot be recreated on a physical computer, contact the VMWARE Technical Support. For more information and help, contact Symantec Technical Support.

19 Chapter 2 Upgrading the Symantec Enterprise Security Manager This chapter includes the following topics: Upgrading Symantec ESM Upgrading Symantec ESM console Upgrading the ESM manager and the agent Upgrading Symantec ESM agent Upgrading Symantec ESM utilities Upgrading Symantec ESM To use the new functions in this ESM release, you must upgrade the Symantec ESM software. You can upgrade to ESM only if you have ESM 9.0 installed on your computer. The Symantec ESM upgrade depends on the currently installed version and configuration of the ESM. The upgrade includes the following tasks: Install the 9.0 version of Symantec ESM on computers running Symantec ESM consoles. Install the 9.0 version of Symantec ESM on computers running Symantec ESM managers. Run LiveUpdate on a Symantec ESM console to ensure that the managers have the latest Symantec ESM security update or agent software.

20 20 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM Run Symantec ESM policies to ensure conformity with regulatory standards. Use the ESM console to edit the security checks, the templates, and the name lists in the latest security update to conform to company policy. You then run the ESM policy on a manager domain to update the updatable agents that are in the domain. If you run the policy on the All agents domain, the manager can update the updatable agents. You must upgrade the ESM console first, followed by the ESM managers, and then the ESM agents. For an ESM manager 9.0.1, you must have an ESM console with version or later. ESM agents with earlier versions are compatible with ESM manager Note: You cannot upgrade previous versions of ESM manager installation on AIX or HP-UX to ESM ESM does not support AIX or HP-UX platforms for ESM manager installations. You can install only ESM agents on AIX or HP-UX platforms. See Supported UNIX operating systems on page 71. If you have all the ESM components installed on one computer, then Symantec recommends that you maintain the same version for all the ESM components. During upgrade, the setup uninstalls the ESM components that you do not select for upgrade. For example, if you select the console and the manager for upgrade and do not select the utilities, the setup uninstalls the utilities during upgrade. About backward compatibility Symantec ESM managers are backward-compatible with Symantec ESM agents with version 6.0 or later. Symantec ESM agents that you register to a manager before an upgrade continue to function with the manager after the upgrade. Symantec does not support any other backward compatibility. When you upgrade a manager-only installation to ESM 9.0.1, Symantec ESM installs the agent on the same computer during the upgrade process. In such a scenario, you must register the new agent to the manager. Symantec ESM encrypts all internal communication between the managers and the agents. The Symantec ESM manager has the ability to adjust its encryption level to support the encryption level of the agent. For example, communication between a Symantec ESM manager and a Symantec ESM 6.0 agent uses the encryption level of the Symantec ESM 6.0 agent.

21 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM 21 About preserving user data Symantec ESM preserves customization when upgrading from an older version of Symantec ESM. Customization includes user modifications to policies, domains, templates, suppressions, and customized messages from the ".m" files. Note: Symantec ESM does not preserve.fmt files because they are obsolete. During the upgrade process, Symantec ESM does the following: Preserves any unexpired suppressions of security report items. Stores the template data in the \esm\template directory. During an upgrade, Symantec ESM preserves any modifications to the template files while it merges the new template information into the upgrade. Saves any changes that customize the policy database. These changes include the security checks that you enable in the security modules, as well as any changes to the name lists. Preserves the changes to the message database that result from changes to the ".m" files. Customized protection applies only to messages in the ".m" files. Security option information, such as the names of the security checks and the Help, have neither a customized flag nor the same protection. Overwrites the ".m" files. Overwriting of the ".m" files does not affect any customized messages, because the message database protects them. However, you lose the source of the customized messages. Preserves any changes that customize the Domains database. Preservation of the changes includes all agent registrations to the manager and the agent domains that you create on the manager. Symantec ESM agents continue to belong to the following domains: All agents domain Domain of the agent operating system (OS) For example, an ESM agent on a computer with Windows 2000 OS belongs to both the All agents domain and the Windows 2000 agents domain. Ports existing summary database information to the new sumfinal database on the manager. Converts the access records in the manager access database. You use the ESM console to do the following:

22 22 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM Add the access rights of all Symantec ESM manager accounts. Modify the access rights of all Symantec ESM manager accounts. Delete the access rights of all Symantec ESM manager accounts. You cannot add, modify, or delete the Symantec ESM superuser account. Replaces the registered manager information in a manager.dat file, which is located at the agent's \esm\config\folder. Agents register only with the manager that initiates the upgrade. You must register each agent to any other managers. Overwrites the other files in the \esm\config directory. Users must customize the new files. Preserving the customized ".m" files When you upgrade ESM or apply a new Security Update, the new ".m" files overwrite the existing ".m" files on the agent. The overwrite may result in loss of the customized files. You can preserve the ".m" files on the manager by changing the customized value of the modified messages to a "1" in the ".m" files. Note: You must restart the console to view the changes that you made in the ".m" file. Perform the indicated steps to preserve the customized ".m" files on the ESM manager. To preserve the customized ".m" files 1 If the Enterprise Security Manager version is or later, then open the ".m" file from the agent's \ESM\register\<platform name>\i18n folder. If the Enterprise Security Manager version is earlier than 6.5.2, then the location of the ".m" is \ESM\register\<platform name>. 2 Set the customized flag as 1 after you make the required changes in the message. 3 Re-register the modules or the agent to the manager by using following command: register -fav -m <manager name> -U <ESM username> -P <ESM user password> After you re-register the modules or the agent to the ESM manager, the customized ".m" file is stored in the manager with the changes that you have made. If you upgrade ESM or apply the latest SU, the ".m" files in the agents are overwritten. However, the ".m" file on the manager remains intact.

23 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM console 23 Silently upgrading the Symantec ESM console, the manager, and the agent You can use the Symantec ESM command-line options to silently upgrade the ESM components. The procedure to silently upgrade the ESM components is same as the procedure for silent installation of the components. See Silently installing the console, the manager, and the agent on page 38. Upgrading Symantec ESM console When you upgrade to the new version of the console, the Symantec ESM installer does the following: Takes a backup of the existing data. Uninstalls the earlier version of the ESM console. Installs the new version of the console. Restores the data. You can upgrade the ESM console by using any of the following: The ESM Suite Installer You must have the ESM 9.0 console installed if you want to upgrade to ESM console. The ESM Console Installer The ESM Console Installer supports upgrade from ESM console 6.5.x or later. The console installer aborts the installation process if you have a console with a version earlier than 6.5.x. In such a scenario, you can do one of the following to upgrade to ESM console: Use the ESM 9.0 Suite Installer and then select the ESM console component for upgrade. Upgrade the console to ESM 6.5 or later console, and then upgrade to ESM console by using the ESM Console Installer.

24 24 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM console To upgrade the ESM console by using the Suite Installer 1 Log on as an administrator to the computer on which you want to upgrade the ESM console. Alternatively, use a role that is equivalent to an administrator. 2 Insert the product disc into the drive. Note: If you want to configure the disclaimer for your console, then ensure that the Disclaimer.rtf file is present in the setup folder. See Configuring and editing the disclaimer on page Navigate to ESMInstaller\ESMSetupSuite and run the setup.exe. 4 On the prompt that informs you about the upgrade, click Yes. 5 In the Resuming the Setup Wizard panel, click Next. 6 In the License Agreement panel, click I accept the terms in the license agreement, and then click Next. 7 In the Superuser Account Credentials panel, enter the credentials for the ESM manager account, and then click Next. The superuser credentials that you provide for ESM must be the same as the credentials of the ESM 9.0 superuser account. 8 In the Setup Wizard Completed panel, click Finish. To upgrade the ESM console by using the Console Installer 1 Log on as an administrator to the computer on which you want to install the ESM console. Alternatively, use a role that is equivalent to an administrator. 2 Navigate to the location where you have extracted the console installer. Note: If you want to configure the disclaimer for your console, then ensure that the Disclaimer.rtf file is present in the setup folder. See Configuring and editing the disclaimer on page Go to ESMInstaller\ESMConsole and run the setup.exe. 4 On the message prompt that asks for the upgrade confirmation, click Yes. 5 In the Welcome panel, click Next. 6 In the License Agreement panel, click I accept the terms in the license agreement, and then click Next.

25 Upgrading the Symantec Enterprise Security Manager Upgrading the ESM manager and the agent 25 7 In the Destination Folder panel, click Next to accept the default location for the ESM console setup. Alternatively, do the following in the given order and then click Next: In the Destination Folder panel, click Change. In the Change Current Destination Folder panel, select the folder where you want to store the console installer binaries. You may also create a new folder to store the console installer binaries. Click OK. 8 In the Disclaimer Options panel, enter the password for the Disclaimer.rtf file and then click Next. The Disclaimer Options panel appears if you have the Disclaimer.rtf file copied in the Symantec\ESMConsole folder to your local computer. 9 In the Ready to Install the Program panel, click Install. The Installing Symantec Enterprise Security Manager Console panel displays the progress of the upgrade procedure. 10 On the message prompt that informs you about the deletion of the ESM files and the folders, click Yes. When you upgrade to ESM console, the setup deletes the installation files of the previous version of the console. This operation is a part of the upgrade. 11 Check Launch ESM Console if you want to launch the ESM console immediately after the installation is complete. 12 Check Show Release Notes if you want to view the Symantec Enterprise Security Manager Release Notes after the installation is over. You must have Adobe Reader to view the Symantec Enterprise Security Manager Release Notes. 13 In the Setup Wizard Completed panel, click Finish. Upgrading the ESM manager and the agent You must have an ESM 9.0 manager installed on the computer before you upgrade to an ESM SP1 manager. An ESM manager is compatible with 6.x or later agents. ESM manager and agent installations reside on the same computer in ESM You cannot have separate installations of the manager and the agent in ESM

26 26 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM agent You locally upgrade a manager by installing the new version over the old version of ESM manager on the computer that runs the manager software. To upgrade an ESM manager and agent 1 Log on as an administrator to the computer on which you want to install the ESM manager. Alternatively, use a role that is equivalent to an administrator. 2 Insert the product disc into the drive. 3 Go to ESMInstaller\ESMSetupSuite and run the setup.exe. 4 On the prompt that informs you about the upgrade, click Yes. 5 In the Resuming the Setup Wizard panel, click Next. 6 In the License Agreement panel, click I accept the terms in the license agreement, and then click Next. 7 In the Superuser Password panel, enter the Superuser account password, and then click Next. 8 The Installing Symantec Enterprise Security Manager Suite panel displays the progress of the installation. 9 In the Setup Wizard Completed panel, click Finish. Silently upgrading the Symantec ESM manager and the agent You can use the Symantec ESM command-line options to silently upgrade the ESM manager and the agent. The procedure to silently upgrade the manager and the agent is same as the procedure for silent installation of the manager and the agent. See Silently installing the manager and the agent on page 48. Upgrading Symantec ESM agent You can upgrade Symantec ESM agents by using one of the following methods: Local upgrade Remote upgrade Install the new version over the old version on the computer that runs the agent software. Use the Symantec ESM console. You should run LiveUpdate on the Symantec ESM console before you upgrade agents remotely. LiveUpdate ensures that the ESM manager has the most current Symantec security information.

27 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM agent 27 If you do not register the agent during local upgrade, you need to register the agent manually to its manager after the upgrade is complete. Also, before you upgrade the agents to ESM 9.0.1, you must move the agents to an ESM manager. See Installing the Symantec ESM agent by using the Agent Installer on page 50. You must apply the Signature Fix before you remotely upgrade the agents that have a version earlier than ESM to ESM Note: The Security Update level does not get updated if you remotely upgrade an ESM agent to ESM Symantec recommends that you apply SU 35 after a remote upgrade, if SU 35 is not already applied on the agent. To remotely upgrade a Symantec ESM agent 1 In the ESM console menu bar, click LiveUpdate. 2 In the LiveUpdate Wizard, click Directory path and click Browse. 3 In the Browse for Folder dialog box, navigate to the folder that contains the Agent folder in the product disk and then click OK. 4 In the LiveUpdate Wizard, click Next. 5 The LiveUpdate Wizard displays the managers that are connected to the console. Select the managers on which you want to copy the remote upgrade binaries and then click Next > OK. 6 In the Symantec ESM console, in the Enterprise tree, right-click an agent or an agent in a domain, and then click Remote upgrade. 7 In the Upgrade Staus panel, click Close after the upgrade is complete. To remotely upgrade agents in a domain 1 In the ESM console menu bar, click LiveUpdate. 2 In the LiveUpdate Wizard, click Directory path and click Browse. 3 In the Browse for Folder dialog box, navigate to the folder that contains the Agent folder in the product disk and then click OK. 4 In the LiveUpdate Wizard, click Next. 5 The LiveUpdate Wizard displays the managers that are connected to the console. Select the managers on which you want to copy the remote upgrade binaries and then click Next > OK.

28 28 Upgrading the Symantec Enterprise Security Manager Upgrading Symantec ESM utilities 6 In the Symantec ESM console, in the Enterprise tree, right-click a domain and then click Remote upgrade. 7 In the Upgrade Staus panel, click Close after the upgrade is complete. You can double-click an agent's name to display additional information about the agent's upgrade status. Checking remote agent upgrade status You can disconnect the console from a manager during a remote agent upgrade without affecting the upgrade process. Like policy runs, the ESM manager controls the agent software upgrades. If you reconnect the console, you can monitor the progress of an agent upgrade. Agents that have not started to upgrade are displayed with a white status. Agents that are running the upgrade are available. Agents that successfully upgrade change to a green status. Agents that fail to upgrade change to a red status. To check the status of an agent upgrade 1 Right-click a manager, and then click Check remote upgrade status. 2 Double-click an agent's name to display additional information about the agent's upgrade status. Silently upgrading the Symantec ESM agent You can use the Symantec ESM command-line options to silently upgrade the ESM agent. The procedure to silently upgrade the ESM agent is same as the procedure for silent installation of the agent. See Silently installing and registering an ESM agent on page 52. Upgrading Symantec ESM utilities To upgrade an older version of the Symantec ESM utilities, you must install the new version. The procedure to upgrade the ESM utilities is same as the procedure for installation of the ESM utilities. See Installing the Symantec ESM utilities on page 59.

29 Chapter 3 Installing Symantec ESM managers and agents on Windows This chapter includes the following topics: About installing Symantec ESM components System requirements for Windows computers Configuring and editing the disclaimer Installing the ESM components by using the ESM Suite Installer Installing the Symantec ESM console by using the Suite Installer Installing the Symantec ESM console by using the Console Installer Installing the ESM manager and the agent by using the Suite Installer Installing the Symantec ESM agent by using the Agent Installer Installing the Symantec ESM utilities Post-installation tasks About installing Symantec ESM components You can install Symantec ESM managers, agents, consoles, and utilities on the computers that meet the system requirements. See System requirements for Windows computers on page 32.

30 30 Installing Symantec ESM managers and agents on Windows About installing Symantec ESM components You must have the ESM 9.0 components installed on your computer to install the ESM components. Symantec distributes Symantec ESM software on a product disc. To access this software, at least one computer with a Windows operating system must have access to a disk drive. Symantec locates the programs for each product on the disc according to the following directory structures: Content_Updates Documentation UNIX_Package Windows_Package Reporting_DatabaseLink The installation process includes the following tasks: Start the Symantec ESM installer. Install the ESM manager, agent, console, and utilities. You can install the manager, the agent, the console, and the utilities by using the ESM Suite Installer. Use the ESM Agent Installer to install only the ESM agent. Note: Remote installation of the agents is not supported from ESM 9.0 onwards. You must have the following rights on the computer on which you want to install Symantec ESM: Administrative privileges to access system resources. Write permissions on the path that you have selected to install Symantec ESM. Permissions to read, modify, and update registry data. Before you install Symantec ESM You must have the ESM 9.0 console and the manager installed on the computer before you install the ESM console and the manager. However, you can install the ESM agents even if you do not have the ESM 9.0 agents installed on the computer. The installation process of Symantec ESM on Windows consists of the following tasks: Install the ESM console.

31 Installing Symantec ESM managers and agents on Windows About installing Symantec ESM components 31 Install the ESM manager. Install the ESM agents that report to the ESM manager. Register the agents to the manager. Install the Symantec ESM utilities. Symantec ESM consoles are supported on Windows platforms only. Symantec ESM managers are supported on Windows and UNIX platforms. Perform the following tasks before installing Symantec ESM components on Windows computers. Symantec ESM console Install Java runtime environment (JRE) 1.5.0_15 or later. Prepare the Disclaimer.rtf if you want a disclaimer to be launched before you launch the ESM console. See Configuring and editing the disclaimer on page 35. Symantec ESM managers and agents Select the computers on which you want to install Symantec ESM manager and agent software. Obtain access to an account with administrator privileges on each selected computer. Select the Symantec ESM managers to which you want to register each Symantec ESM agent. Ensure that the following ports are not in use by any other application: List the following: Name/IP/FQDN of the host computer Name and password of a manager account that has privileges to register Symantec ESM agents The port number for each Symantec ESM manager to which you plan to register a Symantec ESM agent Select a password for the Symantec ESM superuser account on each manager. The superuser account has all of the privileges in Symantec ESM. You should choose a password with six or more characters including at least one non-alphabetical character. Manager account passwords can have up to 32 characters.

32 32 Installing Symantec ESM managers and agents on Windows System requirements for Windows computers Install MDAC 2.7 on the computer on which you plan to install ESM by using the ESM Suite Installer. The MDAC version that you install must be version or later. You can verify the MDAC version from the file version of the msado15.dll, which resides at the following location: \Program Files\Common Files\System\ado\msado15.dll Go to the following URL to download MDAC : familyid=b41304ca-874f-421d f179779a4&displaylang=en Symantec ESM utilities Select the computers on which you want to install the Symantec ESM utilities. Obtain access to accounts with administrator privileges on the computers that have Windows operating systems. Upgrade the Symantec ESM managers that are on the network to version 6.5 or later. The ESM Policy tool cannot run with earlier versions of Symantec ESM manager software. Install Java 1.5.0_15 if you plan to use the Database Conversion tool with ORACLE 9i and the native ORACLE drivers. You can choose to install Java 1.4.x as part of the default installation. About licensing managers Each Symantec ESM manager requires a permanent license to operate completely. Agents and consoles do not require licenses. Managers can register agents up to the number that is specified at the time of license distribution. To later register additional agents to the manager, you must change the manager s allocation by using the Enterprise License feature from the ESM console. You can install the ESM manager without a license. Without a license, the manager installs with limited functionality. For full functionality, you must assign a license using the Enterprise License feature from the ESM console. The license of the ESM 9.0 manager is maintained in ESM manager. You can continue with the same licenses that are allocated to the ESM 9.0 managers even after you upgrade to ESM managers. For information on how to assign a license to ESM Manager, see the Enterprise Security Manager User Guide. System requirements for Windows computers The Windows computers that have the ESM components installed must meet the minimum hardware requirements.

33 Installing Symantec ESM managers and agents on Windows System requirements for Windows computers 33 Table 3-1 lists the minimum hardware requirements for ESM consoles on Windows computers. Table 3-1 Hardware Physical memory Hard disk space Virtual memory CPU Network speed Hardware requirements for ESM consoles on Windows Minimum requirement 512 MB 75 MB 1 GB 1.33 GHz 10 Mbps Table 3-2 lists the minimum hardware requirements for ESM managers on Windows computers. Table 3-2 Hardware Physical memory Hard disk space Virtual memory CPU Network speed Hardware requirements for ESM managers on Windows Minimum requirement 2 GB 25 GB 3.5 GB 2.8 GHz (Xeon/x86/Opteron/Itanium) 100 Mbps Table 3-3 lists the minimum hardware requirements for ESM agents on Windows computers. Table 3-3 Hardware Physical memory Hard disk space Virtual memory CPU Network speed Hardware requirements for ESM agents on Windows Minimum requirement 512 MB 450 MB 1 GB 1.33 GHz 100 Mbps

34 34 Installing Symantec ESM managers and agents on Windows System requirements for Windows computers Table 3-4 lists the required operating systems and service packs for ESM manager, agent, and console. Table 3-4 Symantec ESM Manager Console Utilities Agent Supported operating systems and service packs for ESM manager, agent, and console Operating systems Windows Server 2003 or Windows Server 2003 with Service Pack 1 or 2, Intel (x86), Opteron (x64), Itanium (IA64), and EM64T (x64) Windows Server 2008 Core and GUI, Intel (x86), Opteron (x64), Itanium (IA64), and EM64T (x64) Virtual machine on ESX Server 3.x Windows Server 2003 or Windows Server 2003 with Service Pack 1 or 2, Intel (x86) Windows XP Professional or Windows XP Professional with Service Pack 2 or later Windows Vista, Windows Vista with Service Pack 1, Intel (x86), Opteron (x64), and EM64T (x64) Windows Server 2003 Windows XP Professional Windows 2000 Professional, Server, or Advanced Server with service pack 1.0 or later Windows 2000 Professional, Server, or Advanced Server with service pack 1.0 or later Windows Server 2003 or Windows Server 2003 with Service Pack 1 or 2, Intel (x86), Opteron (x64), EM64T (x64), and Itanium (IA 64) Windows XP Professional with Service Pack 1 or later Windows Vista, Windows Vista with Service Pack 1, Intel (x86), Opteron (x64), and EM64T (x64) Windows Server 2008 Core and GUI, Intel (x86), Opteron (x64), Itanium (IA64), and EM64T (x64) Virtual machine on ESX Server 3.x Support for internationalization-compatible computers Table 3-5 contains the languages and the locales that ESM supports in a heterogeneous environment.

35 Installing Symantec ESM managers and agents on Windows Configuring and editing the disclaimer 35 Table 3-5 Language German Spanish French Italian English Supported languages and locales Locale Germany Spain France Italy US On an internationalization-compatible computer, you must have the same character set for all the ESM components on the supported Windows and UNIX operating systems. For example, consider the following scenario: You have the UTF-8 character set for an ESM manager, which is installed on a French Operating System. When you register agents to the ESM manager, the character set for the agents must also be UTF-8. If you have different character sets, the components fail to establish communication between each other. Note: The ESM components that you install on the internationalization-compatible computers must have HI-ASCII character set. Configuring and editing the disclaimer You must create the Disclaimer.rtf file and use the file during upgrade if you want a disclaimer to be displayed before you launch the console. The Disclaimer.rtf is a configurable file and you can have customized information in the disclaimer as per the requirements of your organization. Before you upgrade the console to ESM 9.0.1, you must copy the ESMSetupSuite folder from the product disc and save it on your local computer. Alternatively, save the ESMSetupSuite folder in a shared folder in your network. To configure the disclaimer, you must edit the "DISCLAIMER_PASSWORD=" parameter in any of the following files to enter a valid password: ConsoleSilentInstallSample.bat Manager&ConsoleSilentInstallSample.bat

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec Enterprise Security Manager Patch Policy Release Notes

Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Symantec System Recovery 2011 Management Solution Administrator's Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Virtual Machine Management 7.1 User Guide

Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Management Platform Installation Guide. Version 7.0

Symantec Management Platform Installation Guide. Version 7.0 Symantec Management Platform Installation Guide Version 7.0 Symantec Management Platform Installation Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector for SNARE for Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Enterprise Security Manager Modules. Release Notes

Symantec Enterprise Security Manager Modules. Release Notes Symantec Enterprise Security Manager Modules for MS SQL Server Databases Release Notes Release 4.1 for Symantec ESM 9.0.x and 10.0 For Windows 2000/2008 and Windows Server 2003 Symantec Enterprise Security

More information

Symantec Security Information Manager 4.6 Administrator's Guide

Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Linux 5.1 Service Pack 1 Platform Release 2 Veritas Storage Foundation and High Availability Solutions Getting Started Guide

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions

More information

Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes

Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes November 2012 Veritas Operations Manager Advanced Release Notes The software described in this book is furnished under a license agreement

More information

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec ApplicationHA agent for Internet Information Services Configuration Guide Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec NetBackup for DB2 Administrator's Guide

Symantec NetBackup for DB2 Administrator's Guide Symantec NetBackup for DB2 Administrator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for DB2 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector for Blue Coat Proxy Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Secure Email Proxy Administration Guide

Symantec Secure Email Proxy Administration Guide Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Symantec High Availability Console Installation and Upgrade Guide

Symantec High Availability Console Installation and Upgrade Guide Symantec High Availability Console Installation and Upgrade Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 February 2013 Symantec High Availability Solution Installation and Configuration

More information

Symantec ESM agent for IBM AS/400

Symantec ESM agent for IBM AS/400 Symantec ESM agent for IBM AS/400 Version 6.5 Installation Guide 1 Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec Enterprise Security

More information

Symantec NetBackup Clustered Master Server Administrator's Guide

Symantec NetBackup Clustered Master Server Administrator's Guide Symantec NetBackup Clustered Master Server Administrator's Guide for Windows, UNIX, and Linux Release 7.5 Symantec NetBackup Clustered Master Server Administrator's Guide The software described in this

More information

Symantec NetBackup PureDisk Deduplication Option Guide

Symantec NetBackup PureDisk Deduplication Option Guide Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Database Agent for Microsoft SQL Configuration

More information

Symantec Backup Exec Continuous Protection Server 2010. Administrator's Guide

Symantec Backup Exec Continuous Protection Server 2010. Administrator's Guide Symantec Backup Exec Continuous Protection Server 2010 Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes

Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes Symantec Endpoint Protection 12.1.6 MP1a and 12.1.6 MP1 Release Notes Symantec Endpoint Protection Release Notes Product version: 12.1.6 MP1a / 12.1.6 MP1 Documentation version: 1 This document was last

More information

Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide

Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Security Information Manager 4.5 Administrator's Guide

Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows Server 2003, Windows Server 2008 VCS Library Management Pack Veritas Cluster Server Library

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Storage Foundation

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5

Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5 Symantec NetBackup AdvancedDisk Storage Solutions Guide Release 7.5 21220064 Symantec NetBackup AdvancedDisk Storage Solutions Guide The software described in this book is furnished under a license agreement

More information

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Symantec Security Information Manager 4.5 Installation Guide

Symantec Security Information Manager 4.5 Installation Guide Symantec Security Information Manager 4.5 Installation Guide PN: 10912602 Symantec Security Information Manager 4.5 Installation Guide The software described in this book is furnished under a license agreement

More information

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software

More information

PGP Command Line Version 10.3 Release Notes

PGP Command Line Version 10.3 Release Notes PGP Command Line Version 10.3 Release Notes Page 1 of 6 PGP Command Line Version 10.3 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information

More information

Symantec Security Information Manager 4.5 Reporting Guide

Symantec Security Information Manager 4.5 Reporting Guide Symantec Information Manager 4.5 Reporting Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation

More information

bv-control for Active Directory v8.50 User Guide

bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 bv-control for Active Directory User Guide The software described in this book is furnished under a license agreement

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7

Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 The software described

More information

Symantec Event Collector 4.3 for Cisco PIX Quick Reference

Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used

More information

Symantec Mobile Security Manager Administration Guide

Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Symantec Critical System Protection 5.2.9 Agent Guide

Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in

More information