Symantec Mobile Security Manager Administration Guide

Size: px
Start display at page:

Download "Symantec Mobile Security Manager Administration Guide"

Transcription

1 Symantec Mobile Security Manager Administration Guide

2 Symantec Mobile Security Manager The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: Legal Notice Copyright 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec AntiVirus, Symantec Client Firewall, and Symantec Security Response are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Symbian and Symbian OS are registered trademarks of Symbian Software Ltd. Windows is a registered trademark of Microsoft Corporation. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation Stevens Creek Blvd. Cupertino, CA

3 Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product feature and function, installation, and configuration. The Technical Support group also authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s maintenance offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization A telephone and web-based support that provides rapid response and up-to-the-minute information Upgrade insurance that delivers automatic software upgrade protection Global support that is available 24 hours a day, 7 days a week worldwide. Support is provided in a variety of languages for those customers that are enrolled in the Platinum Support program Advanced features, including Technical Account Management For information about Symantec s Maintenance Programs, you can visit our Web site at the following URL: Contacting Technical Support Select your country or language under Global Support. The specific features that are available may vary based on the level of maintenance that was purchased and the specific product that you are using. Customers with a current maintenance agreement may access Technical Support information at the following URL: Select your region or language under Global Support. Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to recreate the problem.

4 When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Select your region or language under Global Support, and then select the Licensing and Registration page. Customer service information is available at the following URL: Select your country or language under Global Support. Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade insurance and maintenance contracts Information about the Symantec Value License Program

5 Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals Maintenance agreement resources Additional Enterprise services If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: Asia-Pacific and Japan: Europe, Middle-East, and Africa: North America and Latin America: Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following: Symantec Early Warning Solutions Managed Security Services Consulting Services Educational Services These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring and management capabilities, each focused on establishing and maintaining the integrity and availability of your IT resources. Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs.

6 To access more information about Enterprise services, please visit our Web site at the following URL: Select your country or language from the site index.

7 Contents Technical Support... 3 Chapter 1 Symantec Mobile Security Manager Overview About this document About Symantec Mobile Security Manager About Symantec Mobile Security Suite management options How Symantec Mobile Security Manager works with Symantec System Center How Symantec Mobile Security Manager works with other Mobile Device Management systems Starting Symantec Mobile Security Manager About the Symantec Mobile Security Manager window Main menu Main toolbar Status bar Chapter 2 Mobile Security concepts Understanding entities Linking devices and device states Device state Users User groups About entity relationships About policy packages and policies Enterprise default package Policies Firewall policies Security Manager policies Integrity Manager policies Intrusion detection policies Policy rules defined About policy package inheritance Eligibility Deploy Reissue... 25

8 8 Contents Chapter 3 Managing users and devices by using the Entity Manager About the Entity Manager Managing entities from the tree view window Managing entities from the grid view window Manually adding user groups, users, and devices About entities Adding user groups and users Transferring users to user groups Adding devices Changing the linking of linked or unliked devices Deleting entities Device registration Device states Setting the device state for auto-linking devices Viewing aggregate license and device information Changing the device state of a linked device Changing the device state of an unlinked device Locking and unlocking the linking Chapter 4 Import Wizards Adding users with the User Import and LDAP Import Wizards About using the User Import Wizard User Import file requirements Preparing your import file Importing users from an external file Specifying import options Specifying user group import options Specifying error handling options Handling error conditions Approving import records Viewing the import results Adding users from a Microsoft Active Directory with the LDAP Import Wizard Connecting to a Microsoft Active Directory Mapping LDAP properties to database fields Specifying error handling and user groups Handling error conditions Reviewing importable users Viewing the import results Refreshing users from a Microsoft Active Directory... 57

9 Contents 9 Chapter 5 Managing policy packages About policy packages Package manager functions Package Manager icons Package Manager right-click menu Package properties Policy properties Using the Package Manager Opening the Package Manager Packages grid Setting the enterprise default package Creating, cloning, and modifying packages Deleting packages Retiring packages Viewing policies that are not part of a package Symantec policy packages Chapter 6 Managing policies About managing policies Policy properties About Firewall policies About Firewall rules Modifying, cloning, and creating Firewall policies Defining Firewall policy properties Defining a stateful Firewall policy Adding rules by selecting existing rules Adding and customizing rules Creating new firewall base rules Customizing rules Setting the order of Firewall rules and deleting rules Creating a security policy General PIN and password settings PIN settings Password settings Device feature blocking Idle timeout Resetting the encryption key Secure folders Modifying security policies Predefined policies... 85

10 10 Contents Chapter 7 Deploy Manager About the Deploy Manager About assigning a policy package Assigned and deployed packages Policy package inheritance Assigning policy packages with the Deploy Manager Assigning packages from the Entity Manager Viewing information in the Deploy Manager Removing package assignments About deploying packages Deploying all assigned packages simultaneously Deploying packages to selected entities Deploying by package Reissuing modified deployed packages Tracking package event history Chapter 8 Viewing, reporting, and charting events About viewing, reporting, and charting events About event logs About the Event View Manager Creating, modifying, and deleting event view specifications Loading events Grouping and sorting the event view results Searching event view results Exporting event logs Deleting events About the Reports Manager Report specifications Creating reports Modifying reports Using the filter form Printing and exporting reports Locking reports Deleting reports Charts Manager Running charts Saving charts Chapter 9 Admin tools About administrator tools Devices

11 Contents 11 Device statistics Linked devices Unlinked devices Preferences Agent configuration file Help Desk users Creating authorized users Modifying passwords for authorized users Deleting authorized users Device password override process Enterprise Help Desk user password policy Upload history Package history Reissuing policy packages AWOL linked devices Services Manager

12 12 Contents

13 Chapter 1 Symantec Mobile Security Manager Overview This chapter includes the following topics: About this document About Symantec Mobile Security Manager Starting Symantec Mobile Security Manager About the Symantec Mobile Security Manager window About this document This guide explains how to perform the mobile security administration tasks of Symantec Mobile Security Suite that are managed by the Symantec Mobile Security Manager. It assumes that you have read the Symantec Mobile Security Suite Implementation Guide. The implementation guide explains how to install all of the management components, including Symantec Mobile Security Manager. About Symantec Mobile Security Manager Symantec Mobile Security Manager is the central console for managing the firewall and encryption functionality of Symantec Mobile Security Suite. You can also manage device feature access, create and deploy policy packages, and monitor events by using a range of reporting functions. Symantec Mobile Security Manager requires SQL server. It operates together with a Web server and Windows services. However, you use a different system to manage AntiVirus and LiveUpdate. The following sections explain your options.

14 14 Symantec Mobile Security Manager Overview About Symantec Mobile Security Manager About Symantec Mobile Security Suite management options Symantec Mobile Security Suite allows you to manage the devices in your organization in different ways. These depend on how you manage your network generally, and on the tools that you choose to use. The following table shows the different management components that are available with Symantec Mobile Security Suite. Component Table 1-1 Manages Symantec Mobile Security Suite management components Works with Symantec Mobile Security Manager Symantec System Center tools Wireless administration tools Events, security policies, and device information AntiVirus and LiveUpdate AntiVirus and LiveUpdate Symantec System Center or other Mobile Device Management system Symantec System Center; Symantec Mobile Security Manager Symantec System Center or other Mobile Device Management system; Symantec Mobile Security Manager You use Symantec Mobile Security Manager together with Symantec System Center or another Mobile Device Management system. You can install and run the wireless administration tools on either Symantec System Center or another system. How Symantec Mobile Security Manager works with Symantec System Center You use Symantec System Center together with either set of Symantec Mobile Security Suite tools to manage AntiVirus and LiveUpdate on your organization s mobile devices. You use Symantec Mobile Security Manager to manage the security policies for the devices. How Symantec Mobile Security Manager works with other Mobile Device Management systems You use your Mobile Device Management system or custom tools together with the wireless administration tools to manage Antivirus and LiveUpdate on your organization s mobile devices. You use Symantec Mobile Security Manager to manage the security policies for the devices.

15 Symantec Mobile Security Manager Overview Starting Symantec Mobile Security Manager 15 Starting Symantec Mobile Security Manager Symantec Mobile Security Manager supports a single active session. Within this session, only one instance of each window can be open at any time. To start Symantec Mobile Security Manager On the desktop navigate to Start > Programs > Symantec > Symantec Mobile Security Manager. About the Symantec Mobile Security Manager window The Symantec Mobile Security Manager window includes the following components: The main menu See Main menu on page 15. The main toolbar See Main toolbar on page 16. The status bar See Status bar on page 16. Main menu The following options are available from the main menu: File View Admin Tools Entities Exit from Symantec Mobile Security Manager. Display or hide the Toolbar and Status Bar. Access the Admin Tools window to view device information; set Enterprise preferences; save Agent configuration files; create authorized help desk users; view Upload history, Package history and AWOL devices; and access the Services Manager. Access the Entity Manager window to manage Users, User Groups, and Devices. Add new users from file, add new users from an LDAP Data Source or refresh users from an LDAP Data Source. Export a list of all Devices.

16 16 Symantec Mobile Security Manager Overview About the Symantec Mobile Security Manager window Policies Reports Window Help Access the Package Manager, Packages Grid and Deploy Manager. Reissue Modified Deployed Packages and Reissue All Deployed Packages. Access the Event View Manager, Reports Manager, and Charts Manager. Organize the display of open windows or close all windows. Open the online documentation. Main toolbar The following options are available from the main toolbar: Admin Tools Entity Manager: Tree View Entity Manager: User Groups Entity Manager: Users Entity Manager: Linked Devices Entity Manager: Unlinked Devices Package Manager. Deploy Manager Event View Manager Reports Manager Charts Manager Opens the Admin Tools window. Opens the Entity Manager in tree view mode. Opens the Entity Manager in grid view mode with User Groups displayed. Opens the Entity Manager in grid view mode with Users displayed. Opens the Entity Manager in grid view mode with Linked Devices displayed. Opens the Entity Manager in grid view mode with Unlinked Devices displayed. Opens the Package Manager Opens the Deploy Manager. Opens the Event View Manager. Opens the Reports Manager. Opens the Charts Manager. Status bar The following options are available from the status bar: Services Manager Opens the Services Manager window.

17 Symantec Mobile Security Manager Overview About the Symantec Mobile Security Manager window 17 Upload Download Web Server Starts or Stops the Upload Manager. Starts or Stops the Download Manager. Starts or Stops the Symantec web server.

18 18 Symantec Mobile Security Manager Overview About the Symantec Mobile Security Manager window

19 Chapter 2 Mobile Security concepts This chapter includes the following topics: Understanding entities About entity relationships About policy packages and policies Policies Understanding entities An entity is a single User Group, User, or Device. The Enterprise administrator can create, modify, and delete entities; determine the relationship between entities; and assign and deploy Policy Packages to entities. Entities are managed in the Entity Manager and also in the Deploy Manager. Administrators cannot manually add unlinked Devices. Only User Groups, Users, and Linked Devices can be assigned a Policy Package. Only active Linked Devices are eligible for deploy. Linking devices and device states Devices are classified as Linked or Unlinked within Symantec Mobile Security Manager. A Linked Device is a device that has been added to the Symantec Mobile Security Manager database (registered) and linked to a single, existing User. Devices register when they are manually added by the administrator, or automatically when the device communicates with Symantec Mobile Security Manager (Auto-Registration via Mobile Connect). Auto-Registering devices automatically link to an existing User when the linking value on the registering device matches the of an existing User (Auto-Linking). Auto-Linked devices begin with a Device State

20 20 Mobile Security concepts Understanding entities of either Active or Pending depending on the Enterprise-wide preference setting set by the administrator. Unlinked Device - An Unlinked Device is a device that has Auto-Registered but does not have a linking value which matched an existing User. Unlinked Devices must be linked to a single, existing User before they can receive a package in a deploy and have their Event Logs available for viewing. Device state Devices are further classified by Device State. Device States are described below: Active Device Pending Device Rejected Device Suspended Device An Active Device is a Linked Device that has been explicitly set to active (activated) by the administrator or a device that was automatically set to active when it Auto-Linked to an existing User. Active Devices can receive Packages in a Deploy and their Event Logs are available for viewing. A Pending Device is a Linked Device that was automatically set to pending when it Auto-Linked to an existing User. Pending Devices must be set to active (activated) by the administrator in order to receive Policy Packages in a deploy and have their Event Logs available for viewing. A Rejected Device is a Linked or Unlinked Device that has been explicitly set to the rejected Device State by the administrator. A Rejected Device, like all non-active Devices, cannot receive Policy Packages in a deploy and have its Event Logs available for viewing. A Suspended Device is a Linked Device that has been explicitly set to the suspended Device State by the administrator. A Suspended Device, like all non-active Devices, cannot receive Policy Packages in a deploy and have its Event Logs available for viewing. Users A User is a person in the mobile community who owns (or potentially owns) a device. A single User can be added to the database using the Enterprise-wide preference setting Add User window. Multiple Users can be added using the Import Users from File Wizard or from a Microsoft Active Directory with the LDAP Import Wizard. A User can own (be linked to) more than one device, but every Linked Device belongs to one and only one User. When a User is added to the database, the User must be designated as the member of a User Group. A User, or multiple Users, can be transferred to a different User Group at any time, but a User belongs to only one User Group at a given time.

21 Mobile Security concepts About entity relationships 21 User groups A User Group is a collection of Users. The primary function of a User Group is to facilitate assigning and deploying Policy Packages to devices according to the rules of Policy Package inheritance. About entity relationships User Groups, Users and linked Devices are structured in a hierarchical parent to child relationship. This relationship facilitates assigning and deploying Policy Packages. In this relationship, a User Group is the parent to one or more Users and a User is the parent to one or more Linked Devices. Although Unlinked Devices are defined as entities, they are outside the deploy hierarchy. When adding entities to your database, the following rules apply: A Linked Device must belong to a single User A User must belong to a single User Group Multiple, Linked Devices can belong to a single User Multiple Users can belong to a single User Group As you define your entities, particularly User Groups, consider that child entities inherit the Policy Package assigned to the parent entity. For more information on Policy Package inheritance, see the next section, Understanding Policy Packages and Policies. About policy packages and policies Symantec Mobile Security software protects the device in four key categories of security; Firewall, Security Management, Intrusion Detection and Integrity Management. Each category is represented by one or more policies in Symantec Mobile Security Manager. A Policy Package is a complete group of all four categories of policies, seven policies in all. There are four Firewall Policies, one Security Manager Policy, one Intrusion Detection Policy and one Integrity Manager Policy. Packages are assigned to entities, creating an inheritance hierarchy that reaches all the way to the device. After deployment, packages are picked up by the device via Mobile Connect.

22 22 Mobile Security concepts Policies Enterprise default package A Default Policy Package is in force when the Agent software is first installed on the device. Custom packages can later be created, assigned to entities and deployed to the device. The Mobile Security Enterprise Agent Software is installed with a predefined, default package, which includes seven policies for each of the four defined categories. After installation, the policies are automatically enforced until a new package is deployed to the device. During setup you are required to designate an existing package (Mobile Security Stateful Default) as your Enterprise Default Package (EDP). Alternately, you can create a new package during setup, and designate that package as the EDP. The EDP then becomes the default package for all the devices in your organization that have not received a specific package via deploy. It is copied to a special area on the web server for pickup and generates a package event in Admin Tools/Package History. The default location of the file is C:\Symantec\Download\Common\bfp.bfp. The EDP can be also assigned to entities for deploy just like any other package. This has two advantages. If you decide to designate a different Package as your Enterprise Default. No reassignment is necessary for any entities assigned the EDP. There is an immediate and automatic deploy to all devices who are targeted to receive the EDP. Each time the Enterprise Default Package is redesignated or the Agent configuration settings are modified, the default file updates. New devices and devices targeted to receive the Enterprise Default Package automatically download the updated version of the file. The Enterjprise Default Package is typically distributed with the Agent software so that the device will use your organization s policies and configuration settings for communicating with the Enterprise via Mobile Connect. If the Agent software is installed without this file, a Symantec-defined package called "Mobile Security Stateful Default" package will go into effect. Policies A policy is a collection of one or more rules, such as "block network traffic on port 80" or "require an eight digit PIN for authentication". Within Symantec Mobile Security Manager, rules are grouped into one of four policy types: Firewall, Security, Integrity Management and Intrusion Detection. Within the firewall

23 Mobile Security concepts Policies 23 Firewall policies category, four firewall policies are specified for the four security levels available on the Agent. A Firewall policy consists of one or more Firewall rules, and is created in the Firewall Policy editor. Firewall policies are defined by: Setting the policy properties Adding firewall rules Security Manager policies Integrity Manager policies Setting rule values (also known as rule customization) Setting the order of the rules Intrusion detection policies Rules are added to a firewall policy in two ways, either by selecting rules from another firewall policy (or the All Firewall Rules ruleset), or by creating the rule directly by specifying rule protocol, action and port value. The Security policy specifies the settings for basic authentication (PIN or password); blocking of various device features; the behavior of the device when it becomes idle; device PIN or password reset by device user; and how the Symantec software handles encrypted folders. The Integrity Manager monitors the state of the device and alerts against integrity violations, which are defined as changes to the device s core system files, registry entries and directories. Integrity Manager Policies are predefined. The administrator selects the predefined policy to be included in a package. If a violation is detected, the Integrity Manager takes some desired action, event logging or device quarantine, based on the action code set in the policy. The Intrusion Detection Policy watches for certain types of suspicious network traffic. This policy is currently built-in and cannot be modified with a Policy editor.

24 24 Mobile Security concepts Policies Policy rules defined Firewall policies consist of one or more customized firewall rules. Customized rules are instances of firewall base rules which have additional values specified for logging, user-defined event severity, IP range and direction. The event logging option allows the Administrator to toggle event logging on or off for a particular rule, controlling log size on the device. Severity level is used to categorize firewall events at a level determined by the Administrator. Severity level can be set to Low, Medium or High or No severity. Severity levels can be filtered in any combination when viewing Event Logs in the Event Log Viewer. Firewall Rule Base Rule Customized Rule Security Manager Rule Intrusion Detection Rule Integrity Manager Rule A filter that blocks or allows network packets through defined ports, protocols, IP ranges and direction. A generic firewall rule in which the event logging and severity options are not specified. Base Rules define standard protocols and ports on which network traffic is blocked or allowed. When an instance of a base rule is added to an actual firewall policy, values for logging and severity level must be specified prior to saving the Firewall policy. A library of Base Rules is packaged with Symantec Mobile Security Manager and the administrator may also add new Base Rules. A Firewall rule that is part of a Firewall policy. An instance of a Firewall Base Rule that has been customized with a value for event logging and severity. Additionally, an IP range can be specified for the rule, and the rule can be set to inbound only or outbound only. Uni-directional rules is not a common use case. A Security Manager rule controls device authentication or behavior of the device. An Intrusion Detection rule defines behavior and actions for intrusive network traffic. Intrusion Detection rules are predefined and cannot be edited. An Integrity rule defines behavior and actions for events that affect the integrity of the device. Integrity Manager rules are predefined and cannot be edited. About policy package inheritance Policy Packages can be assigned to any entity at any level; User Group, User or linked device. To achieve total flexibility in a deployment, different Policy Packages may be assigned to Users within the same User Group or even to different devices for the same User.

25 Mobile Security concepts Policies 25 When the Administrator assigns a Policy Package to a User Group, all devices linked to Users who belong to the User Group will inherit that Package. No further assignments are necessary unless the Administrator chooses override the User Group's Package by assigning directly at the user or device level. Policy Package assignments can be changed at any time and new packages can be deployed at any time. Eligibility Deploy Reissue A device that would receive a new package in the event of a complete deploy is said to be an eligible device or eligible for deploy. Devices become eligible when the following two conditions are met: The device is active The device is assigned or inherits a package other than the package currently deployed to the device Initiating a deploy creates a package file for each eligible device. The package files are available for download from the Enterprise web server. Devices periodically look for new packages. When the new package is installed on the device, the polices go into effect immediately. A deploy is triggered when the Enterprise Default Package is changed. The command Reissue All Deployed Packages causes a package file to be regenerated on the Enterprise server for every device which has previously received a package. A complete reissue is necessary only in special cases. Application-defined data, such as event types, have changed when the Enterprise itself has been upgraded. The Agent Configuration File has changed. Since the Agent Configuration file is distributed only within a package, this necessitates a reissue. A new Agent license file must be redistributed. Since the Agent license file is distributed only within a package, this necessitates a reissue. The first two cases above trigger an automatic reissue, which occurs without Administrator intervention. The third case requires the Admin to execute the

26 26 Mobile Security concepts Policies command, Reissue All Deployed Packages, which is available in the main menu under Policies. The command Reissue Modified Deployed Packages is used to update devices which have received an older revision of the package. When the rules in a package change, or the selection of policies in a package change, the package is said to have been critically modified. Devices that have already received the package are not eligible to receive it as defined above, but need the new revision. The command Reissue Modified Deployed Package is located in the main menu under Policies. This causes a package file to be regenerated for every device which needs the latest revision of its package. Note: When a package is critically modified, the Administrator is prompted to reissue that package. In addition, all packages which are eligible for deploy or need reissue can be identified in the Deploy Manager (Packages view). Note: When a critically modified package is deployed, its revision is incremented and an XML snapshot of that package is automatically taken to preserve a strict audit trail of every rule in every revision of every package.

27 Chapter 3 Managing users and devices by using the Entity Manager This chapter includes the following topics: About the Entity Manager Manually adding user groups, users, and devices About the Entity Manager Entities are defined as Users, Devices, or User Groups. Together they represent the mobile user community in the organization. The Entity Manager allows logical grouping of entities and definition of entity hierarchies. Entities are managed through the Entity Manager interface. In the Entity Manager you can do the following: Add, modify and delete entities View entity details Identify Users assigned to each User Group Transfer Users to different User Groups Identify Devices assigned to each User Lock or Unlock the linking for a Device View entities and the Policy Packages that have been Assigned or Deployed to them Import Users from a file Import Users from Microsoft Active Directory

28 28 Managing users and devices by using the Entity Manager About the Entity Manager Export a list of Devices The Entity Manager provides a comprehensive picture of all entities in your Enterprise database through two separate views: grid view and tree view. The grid view displays a spreadsheet-like display of all entities for a given entity type. The tree view shows the hierarchical relationship between User Groups, Users and Linked Devices. Both views provide options to add, modify, and delete entities, and allow you to refresh displayed information to reflect updates due to Auto-Registration, the import of data from a file, or action taken by the Enterprise administrator. Options in the grid view, tree view or in both views include: Expand/Contract Tree View: Expands or contracts the details for all entities in the tree. (This icon functions only in tree view and is grayed out in grid view.) Modify Entity: Opens the Modify User Group, Modify User, Modify Device, or Modify Unlinked Device window depending on the current selection. Add Entity: Opens the Add User Group, Add User, or Add Device window depending on the current selection. Delete Entity: Deletes the selected User Group, User, or Device. Multiple entities can also be selected in a grid and then deleted using the Delete Entity icon. Refresh from Database: Refreshes the displayed information when new entities have been added externally (for instance, through auto-registration) during the Entity Manager session. Restore Grid to Default: The Restore Grid to Default icon will return the column order and the width of each column in the grid to the default settings. (This icon functions only in grid view and is grayed out in tree view.) Managing entities from the tree view window The Entity Manager: tree view window displays entities, and the relationships between them, in a hierarchical format based on their User Group assignment, including details about each User Group, User or Device in your Enterprise database. To open the Entity Manager: tree view window Do one of the following: InSymantec Mobile Security Manager, click the Entity Manager: tree view Icon Click Ctrl+H Click Entities Entity Manager: tree view from menu bar

29 Managing users and devices by using the Entity Manager About the Entity Manager 29 From the expanded Entity Manager: tree view window, click the Expand/Contract tree view toolbar icon Click the Expand/Contract tree view right-click menu option From the Entity Manager: grid view window, click either Ctrl+H or the tree view radio button or the Locate in Tree View button When the Entity Manager: tree view window initially displays, all User Groups will be listed in the left pane in their collapsed or contracted state. Note: Unlinked device information is not accessible from the Entity Manager: tree view window. Use the Entity Manager: grid view window. From within the collapsed or contracted Entity Manager: tree view window you can: View all User Groups See the name, description and deployed Policy Package for each User Group See the total number of Users in each User Group Access a series of right-click menus that will allow you to expand or contract the tree view: modify, add or delete entity information for the selected entity: or refresh the available data from a Microsoft Active Directory or other external database Choose from a set of toolbar icons including Expand/Contract tree view, Modify Entity, Add Entity, Delete Entity and Refresh From Database Switch to the Entity Manager: grid view window by clicking the grid view radio button or, if a choice is highlighted in the left pane, by clicking the Locate in Grid button. When the tree view window is in the collapsed state, the left pane lists all existing User Groups. If you click on a User Group in the left pane, the status bar at the base of the window will show the User Group name and the number of Users in the User Group. The right pane will also display the name of the selected User Group, along with any available description of the User Group, and the name of the User Group s Assigned or Deployed Policy Package, if one exists. Note: In the Entity Manager, both the tree view and grid view windows have radio buttons that allow you to switch between the two windows with a single click. You can also click the Locate in Grid button in the tree view window to switch to the grid view, and you can click the Locate in tree view button in the grid view window to switch to the tree view.

30 30 Managing users and devices by using the Entity Manager About the Entity Manager The contracted Entity Manager: tree view window has a right-click menu that will allow you to expand or contract the tree view window. From this menu you can also open the Modify or the Add User Group windows, delete a selected User Group, or refresh the User data from a Microsoft Active Directory or other database. The tree view can be expanded so that each User in each User Group, and each Device assigned to a User is displayed. A plus sign next to a User Group indicates that one or more Users are assigned to that Group. A plus sign next to a User indicates one or more Devices are assigned to that User. To expand or contract an individual User Group, double-click the name of the User Group in the left pane or click the plus sign next to the name. Only Users assigned to the selected User Group is displayed. To expand or contract the list of devices assigned to a specific User, click the plus or minus sign next to the User s name, or double-click on the User s name. To view the details of an entity, click on the desired entity in the left pane. Detailed information will display in the Entity Details pane. Information about the selected entity will appear in the status bar at the base of the window. Clicking the Locate in Grid button will switch to the Entity Manager: grid view window, and will automatically display information about the highlighted entity. Managing entities from the grid view window The Entity Manager: grid view window allows you to view and manage entities in a grid format, displaying records in list form for each entity type (User Groups, Users, and Linked and Unlinked Devices). Unlike the tree view, which shows the relationship between the various types of entities, the grid view lets you see all of the information associated with entities of one type. Within the Entity Manager: grid view window you can: View a list of User Groups, Users, Linked Devices, or Unlinked Devices View Active, Pending, Rejected or Suspended Devices by selecting among display controlling filters View aggregate information about Linked, Unlinked and Active Devices View detail information about User Groups, Users, Linked Devices, and Unlinked Devices Sort and group entity details by column headers Access right-click menus that allow you to edit or refresh entity information from a Microsoft Active Directory or other database

31 Managing users and devices by using the Entity Manager Manually adding user groups, users, and devices 31 Choose from a set of toolbar icons including Add Entity, Modify Entity, Delete Entity, Refresh from Database and Restore Grid to Default Modify the grouping of information and the display order of columns Restore the grid view display to its default settings with a single click Switch to the Entity Manager: tree view window by clicking the tree view radio button To open the Entity Manager: grid view window 1 In Symantec Mobile Security Manager, press Ctrl+G or select Entities Entity Manager: Grid View from the main menu or 2 From the Symantec Mobile Security Manager main menu, select from the User Groups, Users, Linked Devices, or Unlinked Devices icons. The Entity Manager window displays information about the entity type you selected or 3 Click the grid view radio button or the Locate in Grid button from the Entity Manager: tree view window. Sorting and grouping with column headers In the right pane of the grid view you can group rows by one or more column header and customize the order of the headers. To group displayed data by a given column header, click the column header for the data you want to group and drag it to the dark gray area in the right pane where it says Drag a column header here to group by that column. In the following Figure, Linked Devices have been grouped first by User Name, then by Device State. To sort the list in ascending or descending order by any column, click the desired column header. An arrow in each column header indicates if the column is in ascending or descending order. To change the order of columns, drag and drop a column header to a new position. To restore the view to the default setting, click the Restore Grid to Default icon. Manually adding user groups, users, and devices This section describes how to manually add User Groups, Users and Devices to your Enterprise database.

32 32 Managing users and devices by using the Entity Manager Manually adding user groups, users, and devices Note: To facilitate deployments where large volumes of Users are being managed, you can add multiple Users from an external file with the User Import Wizard or from a Microsoft Active Directory with the LDAP Import Wizard. About entities Clicking Entities in the menu bar of Symantec Mobile Security Manager opens a dropdown menu that includes options to access User Groups, Users and Devices. When highlighted, each of these choices offers an Add selection that opens the appropriate window to add the designated entity to the database. When entered manually, entities can be added from either the grid view or the tree view window. Since each of these methods opens the same Add <Entity> window, this section will focus on adding entities from the grid view. User groups, users and devices linked to those users form a hierarchy which makes assigning and deploying packages efficient and logical. Devices can register automatically when they communicate with the Enterprise, or they can be added manually by the Administrator. Users can be added manually or imported in bulk. User Groups are always added manually. Devices added manually must be linked to an existing user and users added manually must specify an existing user group. It is impossible to manually add a device not linked to user or to have a user who does not belong to a user group. For all Add <Entity> windows, required fields are marked with an asterisk. Data for some fields must also be unique within the database. For each window, you will be notified if you have not met the data requirements. The Add User Group, Add User, and Add Device windows all contain an optional field for Assigned Package. This option lets you choose the assigned Policy Package to be deployed to this entity. Symantec Mobile Security Manager includes a policy inheritance model that is tied to the entity hierarchy. While this field is optional, it can be used to save steps later in the deployment process. Note: For more information on Policy Package inheritance, see the Managing Policy Packages and Managing Policies chapters. Adding user groups and users Users must be assigned to a User Group and can belong to only one User Group. Users can be transferred to a different User Group at any time

33 Managing users and devices by using the Entity Manager Manually adding user groups, users, and devices 33 To manually add a User Group 1 Select User Groups in the left pane of the grid view window, 2 Click the Add Entity icon, or right-click and select Add User Group... 3 Enter the User Group Name. The User Group name is a required field and must be unique within the database. 4 You can add an optional Description of the User Group name. 5 You can select an Assigned Package. The Assigned Package is used to assign a Policy Package to the User Group. See the section, Understanding Policy Package Inheritance for more information on assigning Policy Packages to User Groups. 6 Click the Save button. To manually add a new User 1 Select Users in the left pane of the grid view window. 2 Click the Add Entity icon, or right-click and select Add Users... from the dropdown menu. 3 Enter the required fields listed below: Note: A User Group may be added at this point without closing the Add User window. Once the User Group information is saved, the User Group name will be available for selection. 4 Click the Save button. Note: Multiple Users can be added in bulk using the User Import or LDAP Import Wizard. See Adding Users with the User Import Wizard, and the section dealing with adding Users from a Microsoft Active Directory with the LDAP Import Wizard for more information. Transferring users to user groups You can transfer users to different user groups. To manually transfer a user to a different user group 1 Highlight Users in the left pane of the grid view. 2 Highlight one or more rows of Users to transfer. Use the Shift or Ctrl key to select multiple rows.

34 34 Managing users and devices by using the Entity Manager Manually adding user groups, users, and devices Adding devices 3 Select Transfer Selected Users to User Group, from the right-click menu. 4 Select the desired target User Group from the dropdown list. In this example, because Accounting was selected from the dropdown list, Accounting is shown as the target transfer group in the status bar. 5 Click Transfer Users. In addition to automatic device registration, devices can be added manually to Symantec Mobile Security Manager. Device ID and User information are required to manually enter a device. Device ID User Any Windows Mobile-based device has a unique identifier called the Universal Unique Identifier (UUID). The UUID is a 32-character, industry standard identifier that is stored on the device. This ID is unique across device manufacturers. All devices must have an associated User. A device can belong to only one User, but one User can be associated with multiple devices. Changing the linking of linked or unliked devices Both the Modify Device and Modify Unlinked Device windows let you link a user to a device in the database. If a user has more than one device, that user can be manually linked to multiple devices. To manually link a user to one or more devices from the Modify Device window 1 From the Entity Manager: grid view window, right-click the Linked Device you wish to associate with a user and select Modify Device from the popup menu. The Modify Device window will open. 2 Next, select the user you wish to link to the device you selected. To do this, at the User: line you can either click Add to bring up the Add User window where you can enter information about a new user and save that information to the Enterprise database, or you can click the dropdown arrow to select from the existing users in the Enterprise database. When you highlight to select a user from the dropdown list, the Linking Mismatch window will open. 3 Of you click to select the Change link to <user> radio button and click OK, the device you selected will be linked to the indicated user. 4 If you click to select the Keep link to <user> radio button and click OK, or if you click the Cancel button, no change will be made in the Enterprise database.

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability

More information

Symantec Security Information Manager 4.6 Administrator's Guide

Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec Security Information Manager 4.5 Administrator's Guide

Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec Virtual Machine Management 7.1 User Guide

Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec Enterprise Security Manager Patch Policy Release Notes

Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Critical System Protection 5.2.9 Agent Guide

Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Symantec Security Information Manager 4.5 Reporting Guide

Symantec Security Information Manager 4.5 Reporting Guide Symantec Information Manager 4.5 Reporting Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec System Recovery 2011 Management Solution Administrator's Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector for Blue Coat Proxy Quick Reference The software described in this book is furnished under a license agreement

More information

Configuring Symantec AntiVirus for NetApp Storage system

Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used

More information

Symantec Secure Email Proxy Administration Guide

Symantec Secure Email Proxy Administration Guide Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo

More information

Symantec Enterprise Security Manager Modules. Release Notes

Symantec Enterprise Security Manager Modules. Release Notes Symantec Enterprise Security Manager Modules for MS SQL Server Databases Release Notes Release 4.1 for Symantec ESM 9.0.x and 10.0 For Windows 2000/2008 and Windows Server 2003 Symantec Enterprise Security

More information

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Database Agent for Microsoft SQL Configuration

More information

Symantec Management Platform Installation Guide. Version 7.0

Symantec Management Platform Installation Guide. Version 7.0 Symantec Management Platform Installation Guide Version 7.0 Symantec Management Platform Installation Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec ApplicationHA agent for Internet Information Services Configuration Guide Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide

More information

Altiris Asset Management Suite 7.1 from Symantec User Guide

Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software

More information

Symantec AntiVirus Corporate Edition Administrator's Guide

Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector for SNARE for Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows Server 2003, Windows Server 2008 VCS Library Management Pack Veritas Cluster Server Library

More information

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.

More information

bv-control for Active Directory v8.50 User Guide

bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 bv-control for Active Directory User Guide The software described in this book is furnished under a license agreement

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Security Information Manager 4.8 User Guide

Symantec Security Information Manager 4.8 User Guide Symantec Security Information Manager 4.8 User Guide Symantec Security Information Manager User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Client Security Administrator's Guide

Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Altiris Monitor Solution for Servers 7.5 from Symantec User Guide

Altiris Monitor Solution for Servers 7.5 from Symantec User Guide Altiris Monitor Solution for Servers 7.5 from Symantec User Guide Altiris Monitor Solution for Servers 7.5 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Symantec Event Collector 4.3 for Cisco PIX Quick Reference

Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes

Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes November 2012 Veritas Operations Manager Advanced Release Notes The software described in this book is furnished under a license agreement

More information

Symantec Security Information Manager 4.5 Installation Guide

Symantec Security Information Manager 4.5 Installation Guide Symantec Security Information Manager 4.5 Installation Guide PN: 10912602 Symantec Security Information Manager 4.5 Installation Guide The software described in this book is furnished under a license agreement

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Symantec Endpoint Protection Small Business Edition Client Guide

Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is

More information

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in

More information

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up Exchange Server Archiving 9.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 13740352 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software

More information

Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide

Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up Exchange Server Archiving 10.0 Symantec Enterprise Vault: Setting up Exchange Server Archiving The software described in this book is furnished under a license agreement

More information

Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide

Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide The software described in this book is furnished under a license

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information