Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Size: px
Start display at page:

Download "Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide"

Transcription

1 Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide

2 Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 1.0 PN: Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be "commercial computer software" and "commercial computer software documentation" as defined in FAR Sections and DFARS Section Symantec Corporation Stevens Creek Blvd. Cupertino, CA USA Printed in the United States of America

3 Contacting Technical Support Customers with a current maintenance agreement may access Technical Support information at the following URL: Select your region or language under Global Support. Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to recreate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes

4

5 Getting started with Symantec Database Security and Audit This document includes the following topics: About Symantec Database Security and Audit Overview of setup tasks Prerequisites for installation Installing the appliance Setting up the software on the appliance Launching the Symantec Database Security and Audit console Licensing the product after installation Initial configuration Where to get more information About Symantec Database Security and Audit Symantec Database Security and Audit is a stand-alone appliance that passively monitors and analyzes the database traffic on a network. It detects anomalous SQL queries to a database, both from outside sources and from authorized users within an organization. It can perform extrusion detection of the sensitive information that leaves the organization. For example, it can alert you whenever a SQL response includes multiple credit card numbers. Symantec Database Security

6 6 Getting started with Symantec Database Security and Audit Overview of setup tasks and Audit can also be used to record all database activity for regulatory compliance or to meet other audit requirements. Symantec Database Security and Audit analyzes the SQL statements that it detects against a known set of SQL patterns that represent normal database activity. Any deviations from the norm are flagged as potential attacks on the database. The appliance develops the SQL patterns by generalizing the SQL traffic that is observed during an initial period of training. After training, an administrator can define and activate the policies that govern what types of SQL data are logged or trigger an incident. An administrator can configure alert messages to be sent whenever an incident or other specified activity occurs. Symantec Database Security and Audit is configured and managed from a remote computer by using a Web browser to access the Web-based console interface on the appliance. Overview of setup tasks To prepare the Symantec Database Security and Audit appliance for full operation, you need to do the following: Ensure that all prerequisites are met. See Prerequisites for installation on page 7. Rack mount the appliance and connect the necessary cables. See Installing the appliance on page 8. Set up the software on the appliance. See Setting up the software on the appliance on page 9. Once the appliance has been installed and the software has been configured with the network information, you need to perform the following post-installation tasks: Update the software, if any updates are available. For more information, see the Symantec Database Security and Audit Implementation Guide or the online Help system in the Symantec Database Security and Audit console. License the software. See Licensing the product after installation on page 12. Configure and train the system. See Initial configuration on page 13.

7 Getting started with Symantec Database Security and Audit Prerequisites for installation 7 Prerequisites for installation To install the Symantec Database Security and Audit appliance and set up the software, ensure that the following prerequisites are met: A static IP address is available to assign to the appliance. Your rack system has a slot available for the appliance. The SPAN port is available on the network switch that handles all incoming and outgoing traffic on the database to be monitored. See Figure 1-1 on page 8. Note: As an alternative to using the SPAN port on the switch, you can connect the database monitor port to a network tap. Use a passive tap so that Symantec Database Security and Audit monitoring does not interfere with database access to the network. If the tap ever fails to operate, Symantec Database Security and Audit is unable to monitor the database, but database traffic continues to flow. See Figure 1-2 on page 8. The appliance can be connected to the same network as one or more remote computers that are used to manage Symantec Database Security and Audit. A browser is installed on any remote computers that are used to manage Symantec Database Security and Audit. The Symantec Database Security and Audit console was tested with Firefox 1.x and Microsoft Internet Explorer 6.0. However, the console should run well in most browsers. The console does not use advanced DHTML or require browser extensions such as ActiveX, Flash, or Java. The appliance has access to an SMTP or SNMP server so that the appliance can send alert notifications. You have any necessary cables that are not included with the appliance. The appliance comes with two power cords and one ethernet port extender. If you have a fiber optic network, you need two copper-to-fiber adapters for the ethernet ports on the appliance. The appliance uses copper NICs. Figure 1-1 shows an example of how the appliance can be deployed in a corporate environment.

8 8 Getting started with Symantec Database Security and Audit Installing the appliance Figure 1-1 Example of Symantec Database Security and Audit appliance deployment Figure 1-2 shows an example of how to place a network tap to ensure that all database traffic on the network is monitored. Figure 1-2 Example of network tap placement Installing the appliance Hardware installation consists of unpacking the box, rack-mounting the appliance, and connecting the cables.

9 Getting started with Symantec Database Security and Audit Setting up the software on the appliance 9 Figure 1-3 shows the back panel of the appliance, where the necessary ethernet connections are made. Figure 1-3 Ethernet ports on the back panel of the 3100 series appliance Note: Before you connect the appliance, read the safety instructions and important regulatory information in your Product Information Guide. To install the appliance 1 Install the mounting rails in an available slot in the rack. 2 Insert the appliance into the rack. 3 On the back of the appliance, connect the keyboard, video, and mouse ports to the KVM device for the rack. If a KVM device is not available, a serial console can be used to administer the appliance. 4 Connect the ethernet ports as follows: Connect the database monitor port (eth1) to the SPAN port on the network switch that handles the database traffic. Connect the administration port (eth0) to the same network as the remote computers that are used to manage the appliance. 5 Connect the power cable(s). 6 To start the appliance, on the front of the appliance, press the power button. Setting up the software on the appliance The software is pre-installed on the appliance. Software setup on the appliance consists of the following configuration tasks: Changing the default password that is used for the administrative accounts on the appliance. Configuring the IP address of the appliance, along with the related network information, such as the IP addresses of the gateway and the DNS server.

10 10 Getting started with Symantec Database Security and Audit Setting up the software on the appliance Configuring the time and date on the appliance. A setup program on the appliance lets you configure these settings. Note: The setup program also provides other settings that can be configured. In most cases, however, you do not need to configure any other settings. For more information about the setup program, see the Symantec Database Security and Audit Implementation Guide. To set up the software on the appliance 1 At the prompt, log in as the setup account: Account name: Default password: setup ChangeIT! 2 Read and accept the End User License Agreement (EULA). 3 When you are prompted, reset the password. The passwords for the setup, support, and root accounts on the appliance are all reset to the new password. 4 When you are presented with the main menu options for the setup program, to configure the network settings, type 2. 5 When you are presented with the Configure Network menu, configure the following options as applicable: Appliance IP address Netmask Gateway IP address Primary DNS server Secondary DNS server, if any 6 To commit your changes, type 6. 7 To return to the main menu, type 8. 8 To test the network configuration settings, at the main menu, type 3. When you are presented with the Network Tools menu, do either or both of the following: To ping an IP address, type 1, and then type the IP address when prompted. To check a domain name, type 2, and then type the name when prompted.

11 Getting started with Symantec Database Security and Audit Launching the Symantec Database Security and Audit console 11 To return to the main menu, type 3. 9 At the main menu, to configure the locale-related settings, type When you are presented with the Configure Time menu, configure the following options as applicable: Local time zone Current date and time NTP server If possible, configure access to an NTP (Network Time Protocol) server to maintain the accuracy of the system clock on the appliance. To ensure accurate reporting and logging, the appliance clock should not be arbitrarily reset. 11 To return to the main menu, type At the main menu, to restart the appliance, type 8. Launching the Symantec Database Security and Audit console You can launch the Symantec Database Security and Audit console in a compatible Web browser on any computer that has access to the Symantec Database Security and Audit appliance. You use an operator account to log into the Symantec Database Security and Audit console. Symantec Database Security and Audit comes with the following operator account: Account name: Default password: admin ChangeIT! The default password of the admin operator account should be changed immediately after installation. To launch the Symantec Database Security and Audit console 1 Open a Web browser, and type the following URL: https://<appliance-ip-address> where <appliance-ip-address> is replaced by the actual IP address with which the Symantec Database Security and Audit appliance is configured. 2 On the console login page, type the name and password of a valid Symantec Database Security and Audit operator account.

12 12 Getting started with Symantec Database Security and Audit Licensing the product after installation Licensing the product after installation To be fully operational, Symantec Database Security and Audit requires a valid license key for each type of database to be monitored. You can use one license to monitor an unlimited number of databases as long as all of the databases match the type that is specified in the license. However, a separate license is required for each type of database that you need to monitor. For example, to monitor two Oracle database servers and three Microsoft SQL Servers, you need two licenses: one for Oracle and one for SQL Server. Note: A single license file may contain multiple licenses, depending on how the licenses are generated. To license Symantec Database Security and Audit after installation, you need to do the following: Log into the Symantec Database Security and Audit console and record the host ID of the appliance. Provide Symantec with the host ID and the serial number or numbers printed on the certificate that comes with the appliance. Symantec will then generate the necessary license keys and them to you. Import the license keys into Symantec Database Security and Audit. Note: Be sure to save the license keys that you receive from Symantec in case you need to reinstall the system. To license Symantec Database Security and Audit after installation 1 In the Symantec Database Security and Audit console, on the Configuration tab, click License. 2 Record the Host ID number that is displayed. 3 Open a new browser window, and type the following URL: https://licensing.symantec.com/ 4 Follow the instructions on the Symantec Licensing and Registration page. You will be asked to supply the following: Serial number If you intend to monitor multiple types of databases, supply the serial number for each type of database. address

13 Getting started with Symantec Database Security and Audit Initial configuration 13 This is the address to which the license keys will be sent. The license files are sent in a compressed format (zip). Be sure to provide an address that can accept zipped file attachments. Symantec system ID This is the host ID number that you recorded in the Symantec Database Security and Audit console. 5 After you receive the license from Symantec, unzip the compressed file. 6 In the Symantec Database Security and Audit console, on the Configuration tab, click License. 7 In the Import New License File section, do the following: Click Browse to select a license file. Click Import License. The view refreshes to show the new license information. 8 Repeat the previous step, if necessary, for each license file that you received. Initial configuration After installation and licensing, you should complete additional configuration tasks to prepare Symantec Database Security and Audit for full operation. Table 1-1 describes these tasks. Table 1-1 Task Post-installation checklist Description Create additional operator accounts Symantec Database Security and Audit is pre-installed with one operator account. For security reasons, you cannot log in more than once simultaneously. If you attempt to log into a new browser session using an operator account that is already logged in, Symantec Database Security and Audit automatically logs out the first session. You can add additional operator accounts to do the following: Enable more than one person to use Symantec Database Security and Audit simultaneously. Create operators with different privileges. Track operator activity. All operator actions on Symantec Database Security and Audit are recorded in the audit log file.

14 14 Getting started with Symantec Database Security and Audit Initial configuration Table 1-1 Task Post-installation checklist (continued) Description Review the default settings for general configuration options Review the list of detected databases Enable training mode Review SQL patterns after training Define the time periods that can be applied to policies Review and activate policies These parameters affect the overall operation of Symantec Database Security and Audit, such as when to log out an idle user or what to do with malformed SQL statements. By default, Symantec Database Security and Audit monitors all of the databases that it detects. However, you can change the database monitoring mode to manual, and choose one or more detected databases to monitor. In order to identify anomalous SQL traffic, Symantec Database Security and Audit must first be trained to recognize normal SQL queries. Training is an automatic process in which Symantec Database Security and Audit observes SQL traffic on the network and generates the SQL patterns that represent normal behavior. All SQL queries observed during the training period are assumed to be normal operations and used to generate the SQL patterns. You should review these patterns and deactivate any that represent anomalous behavior. When you define operator policies, you can configure those policies to operate only inside or outside of a pre-configured time period. You should review and adjust the default time periods before you add or modify policies. Symantec Database Security and Audit compares the SQL queries that it detects to the policies that have been defined. The actions that Symantec Database Security and Audit takes when a query matches policy criteria are defined as part of the policy. Symantec Database Security and Audit comes with pre-defined policies, which you must activate if you want to use them. You can also define your own policies. Configure Symantec Database Security and Audit for alert notifications When Symantec Database Security and Audit generates an incident to indicate potential malicious activity, you can configure it to send alert information by SMTP and SNMP traps. By default, no external alerts are generated.

15 Getting started with Symantec Database Security and Audit Where to get more information 15 Table 1-1 Task Post-installation checklist (continued) Description Create a data maintenance plan In the Symantec Database Security and Audit console, you can export configuration data from the appliance manually to create a backup to which the system configuration can be restored. After installing the Symantec Database Security and Audit Archive Tool on a Windows computer, you can schedule regular backups of event data. You can enable regular, automatic purges of closed incidents from the appliance. Note: For detailed information about configuring and managing Symantec Database Security and Audit, see the Symantec Database Security and Audit Implementation Guide or the online Help. Where to get more information To download a PDF file of the Symantec Database Security and Audit Implementation Guide, go to the following Web page: To access the online Help system, in the Symantec Database Security and Audit console, click Help.

16 16 Getting started with Symantec Database Security and Audit Where to get more information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows Symantec Enterprise Vault Technical Note Administering the Monitoring database Windows December 2006 Symantec Enterprise Vault Administering the Monitoring database Copyright 2006 Symantec Corporation.

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec ApplicationHA agent for Internet Information Services Configuration Guide Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003, Windows Server 2008 5.1 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

Symantec NetBackup Appliance Getting Started Guide

Symantec NetBackup Appliance Getting Started Guide Symantec NetBackup Appliance Getting Started Guide NetBackup 52xx Series Release 2.5.2 21283281 NetBackup 52xx Series Appliance Getting Started Guide The software described in this book is furnished under

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Veritas Cluster Server Application Note: Disaster Recovery for Microsoft

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Storage Foundation

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Symantec Security Information Manager 4.5 Installation Guide

Symantec Security Information Manager 4.5 Installation Guide Symantec Security Information Manager 4.5 Installation Guide PN: 10912602 Symantec Security Information Manager 4.5 Installation Guide The software described in this book is furnished under a license agreement

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail Symantec Messaging Gateway 10.0 Installation Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

Configuring Symantec AntiVirus for NetApp Storage system

Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Cisco TelePresence VCR MSE 8220

Cisco TelePresence VCR MSE 8220 Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

and Symantec Network Access Control

and Symantec Network Access Control Getting Started with Symantec Network Access Control For Symantec Network Access Control and Symantec Network Access Control Starter Edition 20983669 Getting started with Symantec Network Access Control

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability

More information

Using Backup Exec System Recovery's Offsite Copy for disaster recovery

Using Backup Exec System Recovery's Offsite Copy for disaster recovery Using Backup Exec System Recovery's Offsite Copy for disaster recovery The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

Unified Threat Management

Unified Threat Management Unified Threat Management QUICK START GUIDE CR35iNG Appliance Document Version: PL QSG 35iNG/96000-10.04.5.0.007/250121014 DEFAULTS Default IP addresses Ethernet Port IP Address Zone A 172.16.16.16/255.255.255.0

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance 1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation

More information

Veritas CommandCentral Disaster Recovery Advisor Release Notes 5.1

Veritas CommandCentral Disaster Recovery Advisor Release Notes 5.1 Veritas CommandCentral Disaster Recovery Advisor Release Notes 5.1 Veritas CommandCentral Disaster Recovery Advisor Release Notes Copyright 2009 Symantec Corporation. All rights reserved. Product version:

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Virtual Machine Management 7.1 User Guide

Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

SOFTWARE LICENSE LIMITED WARRANTY

SOFTWARE LICENSE LIMITED WARRANTY CYBEROAM INSTALLATION GUIDE VERSION: 6..0..0..0 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Symantec Security Information Manager 4.7.4 Release Notes

Symantec Security Information Manager 4.7.4 Release Notes Symantec Security Information Manager 4.7.4 Release Notes Symantec Security Information Manager 4.7.4 Release Notes The software described in this book is furnished under a license agreement and may be

More information

Savvius Insight Initial Configuration

Savvius Insight Initial Configuration The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure

More information

QUICK START GUIDE. Cisco C170 Email Security Appliance

QUICK START GUIDE. Cisco C170 Email Security Appliance 1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance

More information

Altor Virtual Network Security Analyzer v1.0 Installation Guide

Altor Virtual Network Security Analyzer v1.0 Installation Guide Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor

More information

Use QNAP NAS for Backup

Use QNAP NAS for Backup Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Privileged Access Management Upgrade Guide

Privileged Access Management Upgrade Guide Privileged Access Management Upgrade Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Indepth for. Technical Note

Symantec Indepth for. Technical Note Symantec Indepth for Microsoft.NET postinstallation and configuration Technical Note Symantec Indepth for Microsoft.NET postinstallation and configuration Copyright 2006 Symantec Corporation. All rights

More information

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec NetBackup Status Codes Reference Guide

Symantec NetBackup Status Codes Reference Guide Symantec NetBackup Status Codes Reference Guide UNIX, Windows, and Linux Release 7.5 21220054 Symantec NetBackup Status Codes Reference Guide The software described in this book is furnished under a license

More information

Installing and Configuring a Cisco APIC-EM Appliance

Installing and Configuring a Cisco APIC-EM Appliance Installing and Configuring a Cisco APIC-EM Appliance This chapter describes how to install the Cisco APIC-EM ISO image on the appliance and configure it. Installing the Cisco APIC-EM Series Appliance in

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

Symantec NetBackup Appliance Getting Started Guide

Symantec NetBackup Appliance Getting Started Guide Symantec NetBackup Appliance Getting Started Guide Release 2.0 NetBackup 5200 and 5220 The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Symantec Security Information Manager 4.5 Administrator's Guide

Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec Backup Exec Management Plug-in for VMware User's Guide

Symantec Backup Exec Management Plug-in for VMware User's Guide Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide 9034968 Published April 2016 Copyright 2016 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

By the Citrix Publications Department. Citrix Systems, Inc.

By the Citrix Publications Department. Citrix Systems, Inc. Licensing: The License Management Console By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Quick Start Guide 7.0 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information