Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Size: px
Start display at page:

Download "Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0"

Transcription

1 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN:

2 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version PN: Legal Notice Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

3 Symantec Corporation Stevens Creek Blvd. Cupertino, CA

4

5 Contents Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 About Symantec On-Demand Protection for Outlook Web Access Version 3.0 Endpoint security... 7 Using Symantec On-Demand Protection with Microsoft Outlook Web Access... 9 Evaluation key Planning On-Demand Protection policies Symantec On-Demand workflows Installing Symantec On-Demand Protection On-Demand Manager generates On-Demand Agents Minimum installation requirements On-Demand Agent downloaded to endpoint computers Installing Symantec On-Demand Protection Running Symantec On-Demand Protection Launching the On-Demand Manager Configuring the On-Demand Agent to implement protection policies Running the Virtual Desktop on client computers Running Host Integrity on client computers Previewing On-Demand Agents Previewing On-Demand Agent files Previewing Host Integrity Previewing Virtual Desktop Generating and Uploading On-Demand Agent files Generating On-Demand Agent files Uploading On-Demand Agent files to your web server... 26

6 6 Contents Chapter 6 Enforcement for Symantec On-Demand for Outlook Web Access Types of Enforcement... 27

7 Chapter 1 About Symantec On-Demand Protection for Outlook Web Access Version 3.0 This chapter includes the following topics: Endpoint security Using Symantec On-Demand Protection with Microsoft Outlook Web Access Evaluation key Planning On-Demand Protection policies Symantec On-Demand workflows Endpoint security Symantec On-Demand Protection provides a secure environment for Outlook Web Access (OWA). This secure environment allows organizations to enforce corporate security policies without preinstalling software or making permanent changes to remote endpoints web mail access. The implementation of Symantec On-Demand Protection to protect Outlook Web Access requires no additional hardware or software deployment. The Symantec On-Demand Agent package can simply be installed on the Outlook Web Server and integrated within the Outlook Web Access authentication process.

8 8 About Symantec On-Demand Protection for Outlook Web Access Version 3.0 Endpoint security Symantec On-Demand Protection safeguards information downloaded during and after an Web session using state-of-the-art security technologies. With this protection tool, corporations can be confident that the unmanaged endpoints using Outlook Web Access for will be in compliance with corporate and regulatory standards. To integrate On-Demand with OWA, you need to configure Symantec On-Demand Protection and the Microsoft Internet Information Services (IIS) server for which OWA Cookie enforcement is to be used. When On-Demand Cookie enforcement is configured, the Microsoft IIS server will force any user to download the On-Demand Agent before accessing their s using OWA. Cookie enforcement for an IIS server prevents bypass of on-demand security for OWA. Cookies are used to control access when the On-Demand module is running. A specified cookie is configured for each browser session, and a server-side Agent verifies the cookie and then allows or blocks the request based on the results. Symantec On-Demand also provides an HTTP packet filter to improve cookie checking for applications such as OWA hosted on an IIS web server. The ISAPI verification filter allows administrators to control access to specific IIS directories. Symantec On-Demand Protection for Outlook Web Access offers the following protection technologies: Adaptive Policies Location switching based on endpoint parameters such as IP range, registry key, DNS, and others. Symantec On-Demand Agent has the ability to adapt security policies based on identification of specific network locations and the type of network device used (corporate-owned vs. non-corporate-owned) to ensure that confidential data is protected without impacting the productivity of a user. Host Integrity Predefined checks for antiviruses, personal firewalls and service packs; custom checks for process, registry key, file, and operating system. The Symantec On-Demand Host Integrity module provides the ability to define, enforce, and restore the security of clients in order to secure enterprise networks and data. Host Integrity rules can be set up to verify that clients attempting network access are running antivirus software, personal firewall software, service packs, and patches. Virtual Desktop Data protection via virtualization and encryption of the file system combined with restricted system access. The Symantec On-Demand Virtual Desktop is an encrypted space in which a user has an online session using a browser. It is transparent and fully secure, requiring only a browser for access. Malicious Code Prevention/Application Control/Authorized Modules/Authorized Drivers Detect and prevent keyloggers, screen scrapers and account creation via behavioral and signature-based engines. Permit or

9 About Symantec On-Demand Protection for Outlook Web Access Version 3.0 Using Symantec On-Demand Protection with Microsoft Outlook Web Access 9 deny the execution of specific applications, modules or drivers within the Virtual Desktop. Connection Control Outbound connection blocking from endpoint based on domain/url, IP, or port. Cache Cleaner Data sanitization via deletion of browser history, downloaded data, temporary files, and cookies. An On-Demand location is the type of site from which a user connects to the corporate network to check . Settings and options for the Symantec On-Demand Agent can be different based on the location from which the user is trying to connect. Typical locations include Work, Home, Remote, and Unknown. Symantec On-Demand Agent can be used to define as many locations as needed and each location can be configured with different settings and options. The On-Demand Agent settings and options are set and modified with the On-Demand Manager. Once you have selected the options and settings you want per location, the On-Demand Manager generates all of the required Agent files for you to upload to your Outlook Web Access server. You can then start providing protection with the On-Demand Agent to your users while they access their s. Using Symantec On-Demand Protection with Microsoft Outlook Web Access On-Demand Protection and OWA integration require Cookie enforcement. Cookie enforcement is performed in eight steps. To configure Cookie enforcement 1 Install Symantec On-Demand Manager on a separate desktop. 2 Configure the Symantec On-Demand agent policies. 3 Move the Symantec On-Demand Agent directory to the IIS/Exchange Outlook Web Access Server. 4 Configure the Virtual Desktop Success URL and cookies. 5 Create a New Virtual Directory Named Secur to point to the On-DemandAgent Folder. 6 Edit SodaURLCookie.txt to point to the Exchange Server Directory. 7 Configure the ISAPI filter. 8 Restart the IIS/Exchange Outlook Web Access server Symantec On-Demand Protection provides a secure virtual workspace where the desktop of the endpoint is actually cloned and separated from the original desktop.

10 10 About Symantec On-Demand Protection for Outlook Web Access Version 3.0 Evaluation key The security policy aims to protect the information by encrypting and securing any data written to the hard drive. Additionally, it can enable the enforcement of policies that prevent the user from copying and pasting information, creating screen captures, and printing. Additionally, its outbound firewall disrupts Malware and Spyware communication. Note: For more information about the 8 steps required to integrate On-Demand Protection with OWA, and for detailed On-Demand/OWA deployment strategies for Small-Medium Business networks, High Availability networks, Enterprise-level networks, and ISA Firewall network installations, refer to the Symantec On-Demand Protection for Outlook Web Access Implementation Guide. Evaluation key If you have been given an Evaluation key, it has certain capabilities and a time period during which it is valid. If you have a full registration key, there is no time limit. Click License from the Options menu to review your licensed capabilities in the License Information dialog box. Planning On-Demand Protection policies Before you begin configuring your security policies using On-Demand Protection, you may want to plan protection strategies. Start with the following considerations: What kinds of endpoint machines will your users use: corporate-owned assets used offsite, home computers, public kiosks? What kind of On-Demand protection strategies do you want to enforce for users using corporate owned assets (versus unknown computers) when accessing Outlook Web Access? Symantec On-Demand can be used with Microsoft Outlook Web Access (OWA) deployment to secure endpoints that access your network. The following table shows a sample configuration of On-Demand modules based on the type of device and/or its location so as to determine the policies that need to be enforced on the endpoint. Table 1-1 shows a sample configuration of On-Demand modules based on the type of device and its location as a means for determining the policies that need to be enforced on the endpoint.

11 About Symantec On-Demand Protection for Outlook Web Access Version 3.0 Symantec On-Demand workflows 11 Table 1-1 Planning protection strategies Location Location Criteria Symantec On-Demand Modules Host Integrity Checks Virtual Desktop Settings Cache Cleaner Settings Office IP Range Host Integrity Antivirus None None Firewall OS patches Remote (using corporatecontrolled computer) Registry check for HKEY_LOCAL_ MACHINE = company_name Host Integrity Virtual Desktop Personal Firewall Antivirus Enable printing Allow writing to removable USB storage devices None Other (using non-controlled computer) All users who do not meet the criteria for Office or Remote Host Integrity Virtual Desktop Personal Firewall Antivirus Service Packs Enable automatic switch Enable file separation None Terminate Virtual Desktop on browser termination Symantec On-Demand workflows A series of generalized workflow steps for usage of Symantec On-Demand Protection for Outlook Web Access are provided as follows. To use Symantec On-Demand Protection for Outlook Web Access in general 1 Launch Symantec On-Demand Manager. 2 Define locations to be protected. 3 Configure the protection options for each location. 4 Deploy the On-Demand Agent files to the appropriate Outlook Web Access server(s). 5 Verify the On-Demand Agent execution on client machines. For example, a browser search on the client machine will pop-up the On-Demand Virtual Desktop. 6 Test the running of Symantec On-Demand Protection at client endpoints.

12 12 About Symantec On-Demand Protection for Outlook Web Access Version 3.0 Symantec On-Demand workflows

13 Chapter 2 Installing Symantec On-Demand Protection This chapter includes the following topics: On-Demand Manager generates On-Demand Agents Minimum installation requirements Installing Symantec On-Demand Protection On-Demand Manager generates On-Demand Agents This section describes how to install Symantec On-Demand Manager which is used to configure and generate the On-Demand Agents that are in turn configured to protect specified locations or endpoints. When you have configured the options and selected the desired location settings or adaptive policies, the On-Demand Manager generates all of the required files for you to put on your Outlook Web Access server. After the On-Demand Agent files are generated per your defined policies and configuration settings, you will move them to your Outlook Web Access server, after which you can start providing the On-Demand Agent directly to your users. See Generating On-Demand Agent files on page 25. Minimum installation requirements To install Symantec On-Demand Protection Manager, be sure your environment includes the following minimum requirements:

14 14 Installing Symantec On-Demand Protection Minimum installation requirements Windows 2000 Server, Windows Server bit editions, Windows 2000 Pro, Windows XP 32-bit editions, and all 32-bit editions of Windows Vista Pentium 633MHz or faster 128 MB RAM 20 MB available hard disk space Administrator privileges Java Runtime Environment (JRE) version or On-Demand Agent downloaded to endpoint computers The downloaded On-Demand Agent requires less than 1 MB of hard disk space. After the agent is downloaded to a client computer, it uncompresses and installs on that network endpoint. The agent requires a total of 5 MB of hard disk space. The size of the On-Demand Agent files depends on which modules are downloaded and implemented. Table 2-1 lists the size of each individual module during the download to the client. These numbers represent compressed file sizes on the server; the files are then expanded and deployed on the client. Table 2-1 Module Sizes on download to client machine Module Virtual Desktop Host Integrity Cache Cleaner Module Size for Windows XP/ 2003/ KB 490 KB 421 KB Module Size for Windows Vista 565 KB 490 KB 421 KB Note: On-Demand Agent modules share common files. Therefore, when On-Demand modules are downloaded individually to the client endpoint, their file sizes are larger than when downloaded in combination. For example, if you download both the Virtual Desktop and Host Integrity modules at the same time, the combined file size is only 701KB, whereas the Virtual Desktop alone is 591 KB. In the case of Virtual Desktop, because the underlying file system and registry are virtualized and encrypted, more space is required after the agent is downloaded. If the user runs an application that accesses user data from the regular desktop, more space may be required, because the data files themselves are virtualized and encrypted.

15 Installing Symantec On-Demand Protection Installing Symantec On-Demand Protection 15 Installing Symantec On-Demand Protection Use the following instructions to install Symantec On-Demand Protection for Outlook Web Access Note: Symantec On-Demand is officially supported only on English-language operating systems at this time, but the English versions of On-Demand Manager and Agent may work on non-english operating systems as well. To install Symantec On-Demand Protection 1 Download the Symantec On-Demand Protection software from the Symantec server or copy from the product CD. 2 Locate and double-click the downloaded SymantecOn-Demand.exe file. The installer runs and installs the application on your computer. 3 When you are prompted, enter your name, company name, and serial number. The serial number determines the options that are active in your version of On-Demand Protection. Be certain to enter the company name and license number carefully; they must match your registration confirmation exactly.

16 16 Installing Symantec On-Demand Protection Installing Symantec On-Demand Protection

17 Chapter 3 Running Symantec On-Demand Protection This chapter includes the following topics: Launching the On-Demand Manager Configuring the On-Demand Agent to implement protection policies Running the Virtual Desktop on client computers Running Host Integrity on client computers Launching the On-Demand Manager When the installation is complete, launch the On-Demand application from the Windows Start menu. The On-Demand Manager application loads and the main screen displays. To begin running Symantec On-Demand Protection for Outlook Web Access, first define the locations to be secured, then select the modules to be enabled per location. Lastly, configure the settings to be applied to your locations. Configuring the On-Demand Agent to implement protection policies To set up On-Demand Protection to implement your security policies at specified locations, use On-Demand Manager to perform three categories of configuration: Create your locations. Define the modules to load in each location.

18 18 Running Symantec On-Demand Protection Configuring the On-Demand Agent to implement protection policies Define the actions to be taken in those locations. For example, to create locations for Office, Remote, ot Other, use an IP address range to identify the endpoints that access your server from the Office location, and a registry check to identify endpoints using a company-owned computer from another location (Remote). All endpoints tha do not match any checking criteria are routed to Other. After your locations are created, you can define the protection modules to load in each location. For example, in the Remote location, you may want to implement the Host Integrity and Virtual Desktop modules. After you define the modules, define specific actions for these modules in each location. For example, in the Virtual Desktop module for Remote endpoints, you may want to allow users to print and copy information to removable USB media, while in the Other location you might want to force users to work only within the Virtual Desktop (Enable Automatic Switch) and to work with copies of files rather than the real versions (Enable File Separation). You may also want to terminate the Virtual Desktop when the browser session is terminated to ensure that the Virtual Desktop session does not remain active indefinitely on kiosks or shared computers. Note: For information about configuring locations, refer to the Implementation Guide for Symantec On-Demand Protection. Table 3-1 shows how to implement your security policies per location. Table 3-1 Protection policies per location Location Module Policy Success Action Failure Action Office (IP Range) Host Integrity Antivirus1, Antivirus 2, etc. hisuccess.htm Popup dialog displays; hifail.htm Remote (Registry Key) Host Integrity Personal Firewall1, Antivirus1, etc. Load the next module; hisuccess.htm Next module does not load; popup dialog displays; hifail.htm Virtual Desktop Enable printing, Allow writing to removable USB Virtual Desktop loads; vdsuccess.htm

19 Running Symantec On-Demand Protection Running the Virtual Desktop on client computers 19 Table 3-1 Protection policies per location (continued) Location Module Policy Success Action Failure Action Other Host Integrity Personal Firewall, Antivirus Load the next module; hisuccess.htm Next module does not load; popup dialog displays; hifail.htm Virtual Desktop Enable automatic switch, Enable file separation, Virtual Desktop loads; vdsuccess.htm Terminate Virtual Desktop on browser close Running the Virtual Desktop on client computers The On-Demand Virtual Desktop runs on computers meeting the following specifications: Pentium 633MHz or faster; For Vista: 1 GHz 256 MB RAM; For Vista: I GB RAM 25 MB MINIMUM available hard disk space is required for Agent to download and launch VD; For Vista: 100 MB MINIMUM available hard disk space required for Agent to download and launch the Virtual Desktop. Note: If the Virtual Desktop is not selected for use, then the system does not require 25 or 100 MB hard disk space. If you are selecting Host Integrity or Cache Cleaner instead, 5MB of free hard disk space is required. Be mindful that more space may be required for your computer to run smoothly after the Agent is downloaded because user data files must be virtualized for successful launch of certain applications. Windows Server bit editions, Windows 2000 Pro, Windows 2000 Server, Windows XP 32-bit editions, and all 32-bit editions of Windows Vista Browser: Internet Explorer 6.0 or 7.0, Netscape 8.1, Firefox 1.5 or 2.0 Java Runtime Environment (JRE) version 1.4.2, 1.5, or 1.6

20 20 Running Symantec On-Demand Protection Running Host Integrity on client computers Running Host Integrity on client computers Symantec On-Demand Host Integrity runs on computers meeting the following specifications: Pentium 633MHz or faster 128 MB RAM 5 MB available hard disk space required for Agent to download Windows Server bit editions, Windows 2000 Pro, Windows 2000 Server, Windows XP 32-bit editions, and all 32-bit editions of Windows Vista Browser: Internet Explorer 6.0 or 7.0, Netscape 8.1, Firefox 1.5 or 2.0 Java Runtime Environment (JRE) version 1.4.2, 1.5, or 1.6

21 Chapter 4 Previewing On-Demand Agents This chapter includes the following topics: Previewing On-Demand Agent files Previewing Host Integrity Previewing Virtual Desktop Previewing On-Demand Agent files Preview On-Demand Agents to view the results of your location configuration and module settings in the user environments you created. Preview the modules your user will see before you upload the On-Demand Agent files to your Web server.

22 22 Previewing On-Demand Agents Previewing Host Integrity To preview On-Demand Agent files 1 Click Preview (next to the Apply button). The On-Demand Manager launches the program that your users see, so that you can verify that the configured protection modules works as you designed them. When you are satisfied with the results of your testing, you can then deploy Agent files to your server. 2 As you preview modules with the On-Demand Manager, be sure to click Apply, at the top right corner of the primary dialog box, to confirm your changes and to save your work. You can also click File > Save. Previewing Host Integrity Either action Apply or File > Save generates the On-Demand Agent files that you will deploy to your server for use at specified locations and endpoints. If you opted to implement the Host Integrity module, endpoint users connecting to your network will download an Agent that performs host integrity checking. If any of the On-Demand Protection checks fail, users will see a preview message that explains the reason for the failure. Figure 4-1 shows the reason for the failure. Figure 4-1 Host Integrity preview message If you chose to provide a failure URL during configuration of this module, users will be taken to that URL. If you choose to remediate, users will be taken to the configured remediation page when they click Remediate at which point they are

23 Previewing On-Demand Agents Previewing Virtual Desktop 23 given the opportunity to remediate by downloading the appropriate or required software (antivirus, personal firewall, patch, etc.) Previewing Virtual Desktop If you implement the Virtual Desktop module, endpoint users connecting to your network will download an Agent that installs and launches the Virtual Desktop. Figure 4-2 shows the Virtual Desktop. Figure 4-2 Virtual Desktop preview To display Virtual Desktop options (About, Help, Run Web Browser, Switch Desktop, Exit), right-click the Taskbar lock icon. When the browser session is terminated or the inactivity time-out period has elapsed, the On-Demand Agent sanitizes the system, disabling or erasing all data from the session. Note: Data is not protected or sanitized after closing if it is created on the regular desktop. Only the On-Demand Virtual Desktop offers security and data protection.

24 24 Previewing On-Demand Agents Previewing Virtual Desktop

25 Chapter 5 Generating and Uploading On-Demand Agent files This chapter includes the following topics: Generating On-Demand Agent files Uploading On-Demand Agent files to your web server Generating On-Demand Agent files To generate files for the On-Demand Agent 1 Save any recent configuration or settings changes by clicking Apply at the top right corner of the On-Demand Manager screen or, alternatively, by clicking File > Save. 2 Review your configurations and selections by previewing them: Click the Preview button located next to the Apply button. Previewing saves all of your location and module configurations as Agent files and places them in the On-DemandAgent folder at: C:\Program Files\Symantec\Symantec On-Demand Next, you will copy the entire contents of the On-DemandAgent folder and upload it to your web server.

26 26 Generating and Uploading On-Demand Agent files Uploading On-Demand Agent files to your web server Uploading On-Demand Agent files to your web server To upload the generated On-DemandAgent folder s files 1 Navigate to the folder in which the On-Demand Manager has placed the Agent files (C:\Program Files\Symantec\Symantec On-Demand) and copy the entire OnDemandAgentfolder to your IIS/Exchange server for OWA integration. Note: Be sure you have configured locations and settings with the On-Demand Manager, including setting up your endpoint modules such as Host Integrity and Virtual Desktop. 2 Be sure you have saved your settings by clicking File Save in the On-Demand Manager screen, or by clicking Apply. This action generates all of the required On-Demand Agent files. They are stored in your On-DemandAgent folder by default inc:\program Files\Symantec\Symantec On-Demand\On-DemandAgent. 3 Transfer the contents of this folder to your IIS/Exchange - Outlook Web Access server. 4 Use the On-Demand Agent home page (index.htm), generated by the On-Demand Manager, as your Web server home page; it initiates the On-Demand agent download. This is the page that your users are directed in order to trigger the On-Demand agent download. 5 The On-Demand Agent creates a secure environment on the user s computer and then opens the protected web page (or any other page that you have set as a Success URL page). For more information about success or failure URLs, refer to the Implementation Guide for Symantec On-Demand Protection for Outlook Web Access. 6 After the Virtual Desktop, Host Integrity and other modules are installed, the Virtual Desktop opens and the page configured at step one loads automatically and takes users to their Outlook Webmail authentication page, which is now formally protected.

27 Chapter 6 Enforcement for Symantec On-Demand for Outlook Web Access This chapter includes the following topics: Types of Enforcement Types of Enforcement Enforcer integration is available in Symantec On-Demand for Outlook Web Access as Enforcement for Internet Information Services (IIS) Web Server and as Microsoft ISA Firewall Web Filter. Enforcement for Internet Information Services (IIS) Web Server Enforcement for Internet Information Services (IIS) Web Server prevents bypass of On-Demand security for Outlook Web Access. Symantec On-Demand uses cookies to control network access. When a Symantec On-Demand module is running, the specified cookie is available to the current browser session, and a server-side ISAPI filter can be configured to check if the required cookie is included and allowed; if not allowed, it might block the request based on the results. This HTTP packet filter also allows administrators to control access to specific IIS directories. Microsoft ISA Firewall Web Filter Microsoft ISA Firewall is used to protect the IIS/Exchange - Outlook Web Access server. When ISA Firewall Web Filter is configured, a Web Filter can be installed on the Firewall to enforce On-Demand Agent loading on the endpoint before the user can access webmail. The Web filter works similar to

28 28 Enforcement for Symantec On-Demand for Outlook Web Access Types of Enforcement the ISAPI filter in that it verifies the specified cookie and controls access to specific directories/urls on the Outlook Web Access server. Note: For more information about On-Demand IIS-ISAPI and ISA Web Filter enforcement configuration, refer to the Implementation Guide for Symantec On-Demand Protection for Outlook Web Access.

Getting Started Guide for Symantec On-Demand Protection

Getting Started Guide for Symantec On-Demand Protection Getting Started Guide for Symantec On-Demand Protection Getting Started Guide for Symantec On-Demand Protection The software described in this book is furnished under a license agreement and may be used

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Policy Based Encryption Essentials. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Using Backup Exec System Recovery's Offsite Copy for disaster recovery

Using Backup Exec System Recovery's Offsite Copy for disaster recovery Using Backup Exec System Recovery's Offsite Copy for disaster recovery The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Enabling Windows Management Instrumentation Guide

Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Wise Package Studio 8.0 MR1 Release Notes

Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Symantec Drive Encryption for Windows

Symantec Drive Encryption for Windows Symantec Drive Encryption for Windows Technical Note 10.3 Released January 2014. Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo,

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Backup Exec Management Plug-in for VMware User's Guide

Symantec Backup Exec Management Plug-in for VMware User's Guide Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright

More information

Norton Small Business. Getting Started Guide

Norton Small Business. Getting Started Guide Norton Small Business Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright 2015

More information

Web Security Firewall Setup. Administrator Guide

Web Security Firewall Setup. Administrator Guide Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows Symantec Enterprise Vault Technical Note Administering the Monitoring database Windows December 2006 Symantec Enterprise Vault Administering the Monitoring database Copyright 2006 Symantec Corporation.

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide Symantec Protection for SharePoint Servers 6.0.4 Getting Started Guide Symantec Protection for SharePoint Servers Getting Started Guide The software described in this book is furnished under a license

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........

More information

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software

More information

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Norton Family Product Manual

Norton Family Product Manual Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual

More information

Reporting Installation Guide

Reporting Installation Guide Reporting Installation Guide Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2007, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published April

More information

Installing Sage ACT! 2013 for New Users

Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names

More information

Symantec High Availability Console Installation and Upgrade Guide

Symantec High Availability Console Installation and Upgrade Guide Symantec High Availability Console Installation and Upgrade Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 February 2013 Symantec High Availability Solution Installation and Configuration

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

IBackup Drive User Guide

IBackup Drive User Guide IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive

More information

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.

More information

FedEx Ship Manager Software. Installation Guide

FedEx Ship Manager Software. Installation Guide FedEx Ship Manager Software Installation Guide Before you start Check here to see that your PC has what it needs to run FedEx Ship Manager Software: Minimum System and Hardware Requirements Intel Pentium

More information

Sage HRMS 2014 Sage Employee Self Service

Sage HRMS 2014 Sage Employee Self Service Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights

More information

Symantec Endpoint Encryption Device Control Release Notes

Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control 8.2.0 www.symantec.com About Symantec Endpoint Encryption Device Control Symantec Endpoint Encryption

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Symantec System Recovery 2011 Management Solution Administrator's Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

INSTALLATION GUIDE. AXIS Camera Station

INSTALLATION GUIDE. AXIS Camera Station INSTALLATION GUIDE AXIS Camera Station About this Guide This guide is intended for administrators and users of the AXIS Camera Station, and is applicable for software release 3.50 and later. It covers

More information

Symantec Enterprise Vault Technical Note. Troubleshooting the Monitoring database and agents. Windows

Symantec Enterprise Vault Technical Note. Troubleshooting the Monitoring database and agents. Windows Symantec Enterprise Vault Technical Note Troubleshooting the Monitoring database and agents Windows December 2006 Symantec Enterprise Vault Troubleshooting the Monitoring database and agents Copyright

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Symantec ESM agent for IBM AS/400

Symantec ESM agent for IBM AS/400 Symantec ESM agent for IBM AS/400 Version 6.5 Installation Guide 1 Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec Enterprise Security

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

How To Set Up A Thermal Cycler With Veritilink Remote Management Software

How To Set Up A Thermal Cycler With Veritilink Remote Management Software Installation Guide VeritiLink Remote Management Software Version 1.0 Installation Guide Getting Started VeritiLink Remote Management Software Version 1.0 Setting Up the Veriti Thermal Cyclers Setting

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information