Symantec Protection for SharePoint Servers Implementation Guide
|
|
- Joel Osborne
- 8 years ago
- Views:
Transcription
1 Symantec Protection for SharePoint Servers Implementation Guide for Microsoft SharePoint 2003/2007
2 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ( Third Party Programs ). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
3 Symantec Corporation 350 Ellis Street Mountain View, CA Printed in the United States of America.
4 Technical Support Contacting Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s support offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services For information about Symantec s support offerings, you can visit our website at the following URL: All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Customers with a current support agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level
5 Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Customer service information is available at the following URL: Customer Service is available to assist with non-technical questions, such as the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs, DVDs, or manuals
6 Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America
7 Contents Technical Support... 4 Chapter 1 Chapter 2 Introducing Symantec Protection for SharePoint Servers About Symantec Protection for SharePoint Servers What's new Components of Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works About real-time scanning About scheduled scanning and manual scanning What happens when a file is scanned About scanning policies in the Symantec Protection Engine About logging and notifications About on-demand reports and scheduled reports About handling large scanning volumes About deployment options (standalone and farm environments) About deploying Symantec Protection for SharePoint Servers in a standalone SharePoint environment About deploying Symantec Protection for SharePoint Servers in a farm environment About supported platforms How Symantec Protection Engine protects against viruses Where to get more information Installing Symantec Protection for SharePoint Servers Before you install About protecting the servers that are running the Symantec Protection for SharePoint Servers components About preventing conflicts with other products About stopping IIS during installation System requirements System requirements for Symantec Protection for SharePoint Servers integrated installation... 30
8 8 Contents System requirements for Symantec Protection for SharePoint console only System requirements for Symantec Protection Engine About installing Symantec Protection for SharePoint Servers About the installation options About installing Symantec Protection for SharePoint Servers (integrated installation) Installing only Symantec Protection Engine using the installation wizard About installing only the Symantec Protection for SharePoint console About repairing or modifying Symantec Protection for SharePoint Servers or its components Upgrading Symantec Protection for SharePoint Servers version 5.1.x to version 6.0.x Post-installation tasks Starting the Central Administration service in a farm environment Uninstalling Symantec Protection for SharePoint Servers Uninstalling the Symantec Protection for SharePoint console Uninstalling Symantec Protection Engine Chapter 3 Chapter 4 Using the Symantec Protection for SharePoint console About the Symantec Protection for SharePoint console Accessing the console Changing the service logon account information About the console home page Navigation links Feature links Status pane Configuring Symantec Protection for SharePoint Servers About configuring Symantec Protection for SharePoint Servers Configuring a password for the console About SharePoint Server Farm overview Configuring real-time scanning About manual scans and scheduled scans About configuring global manual and scheduled scanning options... 81
9 Contents 9 Scheduling scans Performing manual scans About importing and exporting settings Importing settings from a SharePoint deployment Exporting settings from a SharePoint deployment Registering Symantec Protection Engine with Symantec Protection for SharePoint Servers About adding, removing, editing, and viewing registered Symantec Protection Engines Specifying the scanning mode for load balancing Checking for the latest virus definitions Chapter 5 Configuring Symantec Protection Engine Accessing the Symantec Protection Engine console About communication protocol settings Configuring ICAP-specific settings Ways to control which file types are scanned About licensing Symantec Protection Engine About license activation If you do not have a serial number Obtaining a license file Installing the license file About keeping your product and protection up-to-date About definition updates About LiveUpdate Configuring LiveUpdate to occur automatically Performing LiveUpdate on demand About Rapid Release Configuring Rapid Release updates to occur automatically Performing Rapid Release updates on demand About enabling security risk detection Chapter 6 Monitoring Symantec Protection for SharePoint Servers activity Ways to monitor Symantec Protection for SharePoint Servers activity About the status pane About SMTP logging Configuring SMTP logging Customizing SMTP messages About monitoring scanning activity Configuring the log file folder location
10 10 Contents Setting the logging level for each event source Setting the maximum storage time for log files Generating an on-demand report Scheduling a report About quarantine management Restoring quarantined files Deleting quarantined files Chapter 7 Troubleshooting Symantec Protection for SharePoint Servers About troubleshooting common issues Symantec Protection for SharePoint Servers link is missing from the SharePoint Central Administration site Unable to access the Symantec Protection Engine console Symantec Protection Engine registration fails Slow server response or high server load No reports are generated Connection failed error message Failure sending mail error message Unable to remember the console password Error 1722 when installing Symantec Protection Engine Scanning process error messages Unable to view information on the SharePoint Server Farm overview page Appendix A Error codes About error codes and messages Index
11 Chapter 1 Introducing Symantec Protection for SharePoint Servers This chapter includes the following topics: About Symantec Protection for SharePoint Servers What's new Components of Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works About deployment options (standalone and farm environments) How Symantec Protection Engine protects against viruses Where to get more information About Symantec Protection for SharePoint Servers Symantec Protection for SharePoint Servers provides virus scanning and repair services for the following SharePoint products: Windows SharePoint Services 2.0 (WSS 2.0) Windows SharePoint Services 3.0 (WSS 3.0) SharePoint Portal Server 2003 (SPS 2003) Microsoft Office SharePoint Server 2007 (MOSS 2007) Microsoft SharePoint Foundation 2010
12 12 Introducing Symantec Protection for SharePoint Servers What's new What's new Microsoft Office SharePoint Server 2010 Microsoft SharePoint Foundation 2013 Microsoft Office SharePoint Server 2013 In addition to virus scanning and repair services, Symantec Protection for SharePoint Servers provides logging, monitoring, and reporting of infected documents on the SharePoint server. Table 1-1 describes the new features in Symantec Protection for SharePoint Servers. Table 1-1 Feature New features Description SharePoint 2013 Support You can install Symantec Protection for SharePoint Servers on SharePoint Integration with the latest Symantec Protection Engine 7.0 Symantec Scan Engine is now referred as Symantec Protection Engine. Symantec Protection for SharePoint Servers has the latest version of Symantec Protection Engine 7.0 for virus scanning and repair services. For more information, see the Symantec Protection Engine Implementation Guide. Components of Symantec Protection for SharePoint Servers Symantec Protection for SharePoint Servers includes the following components, which you can install and configure separately: Symantec Protection Engine Provides virus scanning and repair services You can install Symantec Protection Engine on the SharePoint server. You can also install Symantec Protection Engine on a separate server that is not running SharePoint. This lets you move antivirus processing off-box, thereby reducing the CPU load on the SharePoint server. The latest version of Symantec Protection Engine 7.0 is included in the software package.
13 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 13 Symantec Protection for SharePoint console Provides a means for users to configure how Symantec Protection Engine and the SharePoint server should communicate with each other, handle infected files, and monitor scanning activity. The Symantec Protection for SharePoint console refers to the administrative console of Symantec Protection for SharePoint Servers. You can configure how Symantec Protection for SharePoint Servers handles the communication between the Symantec Protection Engine and the SharePoint server through this console. Symantec Protection for SharePoint Servers also interprets the results that are returned from the protection engine after scanning. See About deploying Symantec Protection for SharePoint Servers in a standalone SharePoint environment on page 22. See About deploying Symantec Protection for SharePoint Servers in a farm environment on page 23. See About deployment options (standalone and farm environments) on page 22. How Symantec Protection for SharePoint Servers works Symantec Protection for SharePoint Servers provides the following types of scanning: Real-time scanning of files as they are uploaded and downloaded from the SharePoint server See About real-time scanning on page 14. Scheduled scans and manual scans of the files that are stored on the SharePoint server See About scheduled scanning and manual scanning on page 15. In addition to scanning, Symantec Protection for SharePoint Servers does the following: Monitors scanning activity by its logging and notification feature See About logging and notifications on page 19. Generates on-demand reports and schedules distribution of reports by mail See About on-demand reports and scheduled reports on page 20.
14 14 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works About real-time scanning Files are scanned in real time as they are uploaded and downloaded from the SharePoint server. You can configure to scan files on upload, download, or both. All files that are uploaded or downloaded are submitted for scanning, regardless of file type. Symantec Protection for SharePoint Servers also supports scanning of files that are uploaded to document library, calendars, contacts, lists, and so on. Note: If scanning fails for any reason during a real-time scan (for example, if the Symantec Protection Engine goes offline or reaches its scanning threshold), the scan is terminated. The scan request is not re-submitted until a user tries to upload or download the file. You can configure the following options for real-time scanning: Scan documents on upload. Scan documents on download. Allow users to download infected documents. Attempt to clean infected documents. You must set up real-time scanning to ensure protection of your SharePoint server before you let users start uploading or downloading files. For the most secure configuration, select the Scan documents on upload, Scan documents on download, and Attempt to clean infected files options. Warning: Selecting the option Allow users to download infected documents can put your organization at risk. Irreparable files might contain viruses that can infect your computer. SharePoint security ensures that only administrators can download the irreparable files if this option is not enabled. See Configuring real-time scanning on page 76. How caching works on the SharePoint server The SharePoint server caches the scanning results for each stored file. The cached information includes the date and the revision number of the virus definitions that were used to perform the scan. The cached information also includes the status of the file (whether the file is clean or infected). In real-time scanning, all files that are uploaded or downloaded are submitted for scanning. On download, the SharePoint server evaluates the status of the file and the virus definition that were used to determine whether the file must be scanned.
15 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 15 If another user requests access to that same file and the virus definitions have not changed, a redundant scan is avoided. Individual cache entries are updated whenever a stored file is changed. What happens when a file is uploaded When you try to upload a file to the SharePoint server, the file is submitted first to Symantec Protection Engine for scanning. If the file contains a virus that cannot be repaired, the file is not stored on the SharePoint server. You receive a notification that the file is infected and cannot be uploaded. If you configure the SharePoint server to attempt to clean infected files and if the infected file is a repairable file, then it is repaired and uploaded to the SharePoint server. What happens when a file is downloaded When you try to download a stored file, Symantec Protection for SharePoint Servers verifies the following information about the file: If the file was scanned on upload The status of the file (for example, if the file is clean) Whether the virus definition that were used during the latest scan are the most current If the file is infected, or if the virus definitions are not the most current, the file is submitted to Symantec Protection Engine for scanning. Based on the scan results, the file is handled according to the settings that you specify. See Configuring real-time scanning on page 76. If the file is clean and was scanned with the latest definitions, the file is not rescanned. It is automatically downloaded to you. If you configure the SharePoint server to attempt to clean infected files and if the infected file is a repairable file, then it is repaired and downloaded to the server. If the file contains a virus that cannot be repaired, the file is not downloaded to the user. You receive a notification that the file is infected and cannot be downloaded. (You can configure Symantec Protection for SharePoint Servers to permit users to download infected files. However, the most secure configuration is to disable this option. Files that contain viruses pose a risk to your organization. You are denied access to infected files by default.) About scheduled scanning and manual scanning You can schedule periodic scans of the documents that are stored on the SharePoint server. Schedule periodic scans of the document library to ensure that all files have been scanned for viruses. These scans ensure that the files that have not
16 16 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works been previously scanned are scanned in a timely manner. Regular scans also ensure that scanning is kept up to date as virus definitions change. Scheduled scans occur at the time and frequency that you specify. You can force an immediate (manual) scan of the documents that are stored on the server. The options of Exclusion List, Optional Settings, and Infected File Detection Rules that you configure for scheduled scans also apply to manual scans. You can either perform a manual scan or a scheduled scan along with real-time scanning without any adverse effects. See About manual scans and scheduled scans on page 80. During scheduled scans and manual scans, all files are submitted for scanning, regardless of whether they were scanned previously or not. Only files in the Exclude folders list and the File extension exclude list are omitted from scanning. If a scan request fails because the protection engine is unavailable, the scan request is sent to the next protection engine, which is available and registered. You can configure the following options for manual scans and scheduled scans: Excluding files with specific extensions from being scanned See Excluding files with specific extensions from being scanned on page 82. Excluding folders from being scanned See Excluding folders from being scanned on page 83. Specifying the number of threads for scanning See Specifying the number of threads for scanning on page 83. Scanning all file versions in the document library See Scanning all file versions in the document library on page 84. Scanning only those files that were added or modified from the last scan See Scanning those files that have been added or modified since the last completed scan on page 84. Specifying the location for quarantined documents See Specifying the location for quarantined documents on page 85. Specifying file handling rules See Specifying file handling rules on page 86. Reviewing scan statistics See Reviewing scan statistics on page 88.
17 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 17 Preserving bandwidth and time during manual and scheduled scans You can designate which directories on the SharePoint server are scanned during scheduled scans and manual scans. You can scan all directories on the SharePoint server, or you can exclude certain directories from scanning. You can control which file types are scanned during manual scans and scheduled scans by specifying the file types passed to Symantec Protection Engine. You can save bandwidth and time by excluding those files types that are not likely to contain viruses and can be excluded from scanning. Based on the file extension,symantec Protection for SharePoint Servers makes an initial determination, about whether to pass a file to Symantec Protection Engine for scanning. You can limit scanning to only those files that have been added or modified since the last manual or scheduled scan. Symantec Protection for SharePoint Servers can compare the time a file was modified or added with the time of the last scan. This feature lets you conserve scanning resources by omitting files from scanning that have not been modified or added since the last scan. When this feature is disabled, all files are scanned during manual scans and scheduled scans. Quarantining infected files Symantec Protection for SharePoint Servers can quarantine the infected files that are found during a scheduled scan or manual scan. A copy of each infected item is forwarded to a quarantine directory. You can view a list of all these quarantined files in the Quarantine Management page. You can view, restore, or delete the quarantined file based on your analysis. The default quarantine location is C:\Program Files\Symantec\SharePoint\Quarantine. What happens when a file is scanned After the Symantec Protection for SharePoint console and Symantec Protection Engine are installed and properly configured, files are passed to Symantec Protection Engine for analysis. If Symantec Protection Engine does not find a virus in a file, Symantec Protection Engine indicates that the file is clean. If a virus is detected, Symantec Protection Engine does one of the following actions:
18 18 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works Records a log entry that an infection was found Separate logging and alerting features are available through the Symantec Protection for SharePoint console and Symantec Protection Engine. You can activate logging and alerting options in Symantec Protection Engine to supplement those logging and alerting options that are available through the Symantec Protection for SharePoint console. The Symantec Protection for SharePoint console sends an notification and records a log entry when an infection is found. Attempts to repair the infected file Deletes unrepairable infected files from the container files If the file can be repaired, Symantec Protection Engine repairs it and passes a clean file back to Symantec Protection for SharePoint Servers. Configure the SharePoint antivirus settings to accept these repaired files so that infected files are replaced with repaired files on the SharePoint server. See Configuring real-time scanning on page 76. When a container file or archive file is submitted for scanning, Symantec Protection Engine decomposes the container file and scans each embedded file individually. If the container file contains unrepairable files, Symantec Protection Engine deletes the unrepairable files from the container or the archive file. The remaining clean contents are forwarded to the SharePoint server. Symantec Protection for SharePoint Servers handles this container file as a repaired file. (Configure the SharePoint antivirus settings to accept repaired files so that infected files can be replaced with repaired files.) Note: When a top-level file (a file that is not embedded in a container file) is infected and cannot be repaired, Symantec Protection Engine indicates it to Symantec Protection for SharePoint Servers and the SharePoint server. The SharePoint server denies access to the infected file by default. The file is deleted from the SharePoint server if you have configured it to do so. See Registering Symantec Protection Engine with Symantec Protection for SharePoint Servers on page 93. About scanning policies in the Symantec Protection Engine When Symantec Protection Engine scans a file for viruses, it applies the scanning policies that you configure in the Symantec Protection Engine console. For example, you can limit the resources that Symantec Protection Engine uses by only scanning certain types of files. When an established threshold is met or exceeded during a scan, or a policy is violated, Symantec Protection Engine communicates this information to Symantec Protection for SharePoint Servers. Symantec Protection for SharePoint Servers treats the file as though an unrepairable infection was found. The policies that
19 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 19 you configure for handling infected files (that is, blocking or deleting files) are applied. The following scanning policies are available through the Symantec Protection Engine console: You can restrict the amount of resources that are used to process large container files. You can establish a mail policy to filter mail and mail attachments based on a number of attributes. Symantec Protection Engine uses a decomposer to extract the embedded files from a container file, scan all of the files, and reassemble the container file once scanning is complete. For overly large container files, this process can require a significant amount of resources. You can use these settings to control the resources that Symantec Protection Engine uses to process large container files and to prevent these overly large container files from being stored on the SharePoint server. You can specify the maximum amount of time spent in decomposing a container file, the maximum file size for individual files in a container file, maximum number of nested levels to be decomposed, and the maximum number of bytes that are read when determining whether a file is MIME-encoded. These mail policy settings are applied to all MIME-encoded messages. If MIME-encoded messages are posted for user access on the SharePoint server, you can use the mail policy settings in Symantec Protection Engine to filter based on attachment file size or file name, message origin, total message size, or message subject line. Note: Mail policy settings do not affect nonmime-encoded file types that are passed to Symantec Protection Engine for scanning. When a mail filter policy is violated, Symantec Protection Engine only applies the action to MIME-encoded messages. For more information, see the Symantec Protection Engine Implementation Guide. About logging and notifications Symantec Protection for SharePoint Servers logs events for the Scan Process, Symantec Protection Engine, and System report sources by default. You can specify the logging level for each of these report sources in Log File settings.
20 20 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works See About monitoring scanning activity on page 141. The default location of the log files is <installdir>:\program Files\Symantec\SharePoint\Logfiles. Symantec Protection for SharePoint Servers provides Simple Mail Transfer Protocol (SMTP) logging capabilities. When SMTP logging is configured, an notification is sent to a specified recipient for chosen events. To configure SMTP logging, you must do the following: Enable the notification system. Identify an SMTP server and port number for forwarding the log messages. Provide the default origin and destination information for the SMTP messages. Select the event categories for which SMTP messages should be generated. You can choose separate sender and recipient addresses for each event category. See Configuring SMTP logging on page 127. You can also select the notification level so that Symantec Protection for SharePoint Servers sends an notification only for the events whose level you specify. You can provide separate recipient information for each type of message. Default message text is included, but you can customize individual messages. See Customizing SMTP messages on page 131. About on-demand reports and scheduled reports You can manually generate and analyze reports for a specified date range. You must select a report source (Protection Engines, Scan Processes, or System) and define the log data you to display. You can generate a detailed report of all logs or pie chart reports. Symantec Protection for SharePoint Servers displays a numerical statistical report beneath the pie chart. See Generating an on-demand report on page 144. You can configure Symantec Protection for SharePoint Servers to generate reports and distribute them by to specified recipients at a scheduled time. From the options available, select hourly, daily, weekly, monthly, or once to schedule the reports. Note: You must first configure notifications before you try to schedule a report by .
21 Introducing Symantec Protection for SharePoint Servers How Symantec Protection for SharePoint Servers works 21 To schedule reports, you must do the following tasks: Select a schedule. Choose from the default schedules or create a new schedule. Select a report data range. Symantec Protection for SharePoint Servers retrieves data from within this specified date range. Choose a report source (Protection Engines, Scan Processes, or System) and report definition. These options determine the content of your scheduled report. Select a report format. Activate report generation by mail. Specify the sender and recipient's address. See Scheduling a report on page 145. About handling large scanning volumes In a simple Symantec Protection for SharePoint Servers configuration, a single Symantec Protection Engine handles the scanning and the repair services for the SharePoint server. However, larger traffic volumes can require multiple protection engines to handle virus scanning. If you process large traffic volumes or have multiple clients making virus scanning requests, you can install and configure multiple protection engines to handle the scanning load. If you install multiple protection engines to handle increased loads, you must register each Symantec Protection Engine with Symantec Protection for SharePoint Servers. Each Symantec Protection Engine must be installed on a separate computer on your network. See Registering Symantec Protection Engine with Symantec Protection for SharePoint Servers on page 93. When you use multiple protection engines, you can specify how you want the scanning load to be distributed by selecting a scanning mode. The scanning modes are as follows: Cycle mode Scanning is distributed evenly across all registered Symantec Protection Engines using a continuous repeating sequence. In a standalone environment, this option is available only if multiple protection engines are registered; but in a farm environment, this option is available even if one protection engine is registered.
22 22 Introducing Symantec Protection for SharePoint Servers About deployment options (standalone and farm environments) Priority mode Scanning is distributed to Symantec Protection Engines based on priority. You specify the priority when you register a Symantec Protection Engine with Symantec Protection for SharePoint Servers. See To register a new Symantec Protection Engine on page 96. See To edit a Symantec Protection Engine registration on page 97. If you enable both modes, the priority mode takes precedence. If both the registered protection engines have the same priority, then the cycle mode takes precedence. See Specifying the scanning mode for load balancing on page 98. About deployment options (standalone and farm environments) Symantec Protection for SharePoint Servers includes the following components that can be installed separately or together: Symantec Protection for SharePoint console Symantec Protection Engine See Components of Symantec Protection for SharePoint Servers on page 12. See About the installation options on page 39. You must install Symantec Protection for SharePoint Servers and its components in different ways based on the following SharePoint environments: Standalone environment Farm environment About deploying Symantec Protection for SharePoint Servers in a standalone SharePoint environment In a standalone SharePoint environment, you can choose to do a full install of both components of Symantec Protection for SharePoint Servers on the same computer. You can also choose to move antivirus processing off-box by installing Symantec Protection Engine on a separate server. However, ensure that you install the Symantec Protection for SharePoint console on the SharePoint server. For a SharePoint standalone deployment, ensure that SharePoint is not configured with Microsoft SQL Server Desktop Engine or Windows Internal Database.
23 Introducing Symantec Protection for SharePoint Servers About deployment options (standalone and farm environments) 23 Symantec Protection 6.0 for SharePoint Servers does not support a SharePoint standalone configuration with Microsoft SQL Server Desktop Engine or Windows Internal Database. About deploying Symantec Protection for SharePoint Servers in a farm environment In a SharePoint farm environment, based on the SharePoint version used, deploy Symantec Protection for SharePoint Servers on the following servers: Windows SharePoint Services 2.0 SharePoint Portal Server 2003 Install the Symantec Protection for SharePoint console on each front-end Web server in the farm. The other component, which is the Symantec Protection Engine, can be installed on the same server as the Symantec Protection for SharePoint console or on a separate server. Windows SharePoint Services 3.0 Microsoft Office SharePoint Server 2007 Install the Symantec Protection for SharePoint console on each front-end Web server in the farm and at least on one server where Central Administration service is running. You can install the Symantec Protection for SharePoint console on the other Application servers in the farm to run on-demand or scheduled scans on these servers, if desired. However, you can run these scans from the front-end servers as well. The other component, which is Symantec Protection Engine, can be installed on the same server as the Symantec Protection for SharePoint console or on a separate server. About supported platforms You can install the Symantec Protection for SharePoint console on the following platforms: Microsoft Windows Server 2003 Microsoft Windows Server 2008 See System requirements for Symantec Protection for SharePoint console only on page 31.
24 24 Introducing Symantec Protection for SharePoint Servers How Symantec Protection Engine protects against viruses See About installing only the Symantec Protection for SharePoint console on page 50. Symantec Protection Engine runs on the following platforms: Sun Solaris Red Hat Linux Microsoft Windows 2000 Server Microsoft Windows Server 2003 Microsoft Windows Server 2008 You can deploy Symantec Protection Engine in any environment that is running any combination of these platforms. See System requirements for Symantec Protection Engine on page 32. See Installing only Symantec Protection Engine using the installation wizard on page 45. How Symantec Protection Engine protects against viruses Symantec Protection for SharePoint Servers sends the files to Symantec Protection Engine for virus scanning and repair. Symantec Protection Engine detects viruses, worms, and Trojan horses in all major file types (for example, Windows files, DOS files, and Microsoft Word and Excel files). Symantec Protection Engine includes a decomposer that handles most compressed and archive file formats and nested levels of files. Symantec Protection Engine provides protection against container files that can cause denial-of-service attacks (for example, container the files that are overly large, that contain large numbers of embedded compressed files, partial container files, or that have been designed to use resources maliciously and degrade performance). Symantec Protection Engine detects security risks such as adware, dialers, hacking tools, joke programs, remote access programs, spyware, and trackware. The Symantec Protection Engine also detects mobile code such as Java, ActiveX, and standalone script-based threats. Symantec Protection Engine uses Symantec AntiVirus technologies, for heuristic detection of new or unknown viruses.
25 Introducing Symantec Protection for SharePoint Servers Where to get more information 25 Where to get more information In addition to this guide, Symantec Protection for SharePoint Servers includes Help topics that you can access through the Help table of contents and index. You can also search for keywords in the Help. Context-sensitive Help is available on each page. You can visit the Symantec website for more information about your product. The following online resources for Symantec Protection for SharePoint Servers are available: Provides access to the technical support Knowledge Base, newsgroups, contact information, downloads, and mailing list subscriptions index.jsp Provides product news and updates Provides access to the virus encyclopedia, which contains information about all known threats; information about hoaxes; and access to white papers about threats index.jsp
26 26 Introducing Symantec Protection for SharePoint Servers Where to get more information
27 Chapter 2 Installing Symantec Protection for SharePoint Servers This chapter includes the following topics: Before you install System requirements About installing Symantec Protection for SharePoint Servers Upgrading Symantec Protection for SharePoint Servers version 5.1.x to version 6.0.x Post-installation tasks Uninstalling Symantec Protection for SharePoint Servers Before you install Do the following tasks before you install Symantec Protection for SharePoint Servers or its components: Provide antivirus protection for the servers on which the Symantec Protection for SharePoint Servers components run. See About protecting the servers that are running the Symantec Protection for SharePoint Servers components on page 28. Exclude certain directories from scanning by any other antivirus product that is running on the computers on which you install the components. See About preventing conflicts with other products on page 28.
28 28 Installing Symantec Protection for SharePoint Servers Before you install Plan to install the Symantec Protection for SharePoint console at a time when Microsoft Internet Information Server (IIS) can be stopped temporarily. See About stopping IIS during installation on page 29. Ensure that the computer on which you plan to install the console and Symantec Protection Engine meets the minimum system requirements. You can install both components together or on separate computers. See System requirements on page 29. Ensure that the ports 9455, 9466, and 9477 are available. For a SharePoint standalone deployment, ensure that SharePoint is not configured with Microsoft SQL Server Desktop Engine or Windows Internal Database. Symantec Protection 6.0 for SharePoint Servers does not support a SharePoint standalone configuration with Microsoft SQL Server Desktop Engine or Windows Internal Database. Symantec recommends that you back up the web.config file of the SharePoint Central Administration site. About protecting the servers that are running the Symantec Protection for SharePoint Servers components Before you install Symantec Protection Engine and the Symantec Protection for SharePoint console, consider to install additional antivirus protection such as Symantec AntiVirus Corporate Edition to protect the servers on which these components run. By design, Symantec Protection Engine scans only the files that are passed to it from Symantec Protection for SharePoint Servers. Symantec Protection for SharePoint Servers does not protect the operating systems of the computers on which Symantec Protection Engine and SharePoint Server run. Because both of these servers potentially handle viruses, they are vulnerable without real-time virus protection. To achieve comprehensive virus protection with Symantec Protection for SharePoint Servers, it is important to protect the Symantec Protection Engine server and the SharePoint server from virus attacks. To protect the host computers, install an antivirus program on these servers in addition to the Symantec Protection for SharePoint Servers components. About preventing conflicts with other products To prevent a conflict between the antivirus product that is running on the host computer and Symantec Protection for SharePoint Servers, configure any other
29 Installing Symantec Protection for SharePoint Servers System requirements 29 antivirus product that is running on the host computer to exclude certain directories from scanning. Table 2-1 lists the directories to exclude from scanning. Table 2-1 Directories to exclude from scanning Directories Windows:<Installdir>\temp Linux and Solaris : <Installdir>/temp <Installdir>\Program Files\Symantec\ SharePoint\Quarantine Server The server on which Symantec Protection Engine runs. These directories are the temporary directories that Symantec Protection Engine uses for scanning. The server on which Symantec Protection for SharePoint console runs. Symantec Protection for SharePoint Servers uses it as the default quarantine directory. About stopping IIS during installation System requirements During the installation, the Microsoft Internet Information Server (IIS) must be stopped temporarily. During the time that it takes to complete the installation, no access to IIS services is available. You must plan to install the Symantec Protection for SharePoint console when Microsoft IIS can be stopped temporarily. Microsoft IIS restarts automatically after the installation is complete. You can choose to install both components of Symantec Protection for SharePoint Servers together on the same computer or on different computers. The Symantec Protection for SharePoint console and Symantec Protection Engine are supported on both 32-bit and 64-bit computers for Windows 2003 Server and Windows 2008 Server. See System requirements for Symantec Protection for SharePoint Servers integrated installation on page 30.
30 30 Installing Symantec Protection for SharePoint Servers System requirements See System requirements for Symantec Protection for SharePoint console only on page 31. See System requirements for Symantec Protection Engine on page 32. System requirements for Symantec Protection for SharePoint Servers integrated installation Table 2-2 describes the minimum system requirements to install the Symantec Protection for SharePoint console and Symantec Protection Engine on the same server. Table 2-2 Requirement Minimum system requirements for Symantec Protection for SharePoint console and Symantec Protection Engine Details Hardware requirements Processor and Memory: As per the requirements of the version of Microsoft SharePoint Disk space: 6 GB One network interface card (NIC) running TCP/IP with a static IP address Internet connection to update antivirus definitions Operating system Symantec Protection for SharePoint Servers runs on the following platforms: Windows Server 2003 with Service Pack 2 or later Windows Server 2008 with Service Pack 2 or later You can use any of the following editions of Windows Server: Windows Server 2003 Standard/Enterprise/Data Center SP2/R2 Windows Server 2008 Standard/Enterprise/Data Center SP2/R2
31 Installing Symantec Protection for SharePoint Servers System requirements 31 Table 2-2 Requirement Software requirements Minimum system requirements for Symantec Protection for SharePoint console and Symantec Protection Engine (continued) Details Any of the following Microsoft SharePoint Server editions: Windows SharePoint Services 2.0 (WSS 2.0) with Service Pack 3 (SP 3) SharePoint Portal Server 2003 (SPS 2003) with Service Pack 3 (SP 3) Windows SharePoint Services 3.0 (WSS 3.0) Microsoft Office SharePoint Server 2007 Any of the following Web browsers: Microsoft Internet Explorer 6.0 (with the most recent service pack that is available) or higher. The following software components: Microsoft.NET Framework 2.0 SP1 or higher Microsoft ASP.NET 2.0 AJAX Extensions 1.0 Central Admin Site ASP.NET Version 2.0 or higher System requirements for Symantec Protection for SharePoint console only Table 2-3 describes the minimum system requirements to install the Symantec Protection for SharePoint console. Table 2-3 Requirement Minimum system requirements for the Symantec Protection for SharePoint console Details Hardware requirements Processor and Memory: As per the requirements of the version of Microsoft SharePoint Disk space: 512 MB (may vary depending on how long you choose to maintain log files)
32 32 Installing Symantec Protection for SharePoint Servers System requirements Table 2-3 Requirement Operating system Minimum system requirements for the Symantec Protection for SharePoint console (continued) Details The Symantec Protection for SharePoint console runs on the following platforms: Windows Server 2003 with Service Pack 2 or later Windows Server 2008 with Service Pack 2 or later You can use any of the following editions of Windows Server: Windows Server 2003 Standard/Enterprise/Data Center SP2/R2 Windows Server 2008 Standard/Enterprise/Data Center SP2/R2 Software requirements Any of the following Microsoft SharePoint Server editions: Windows SharePoint Services 2.0 (WSS 2.0) with Service Pack 3 (SP 3) SharePoint Portal Server 2003 (SPS 2003) with Service Pack 3 (SP 3) Windows SharePoint Services 3.0 (WSS 3.0) Microsoft Office SharePoint Server 2007 Any of the following Web browsers: Microsoft Internet Explorer 6.0 (with the most recent service pack that is available) or higher. The following software components: Microsoft.NET Framework 2.0 SP1 or higher Microsoft ASP.NET 2.0 AJAX Extensions 1.0 Central Admin Site ASP.NET Version 2.0 or higher System requirements for Symantec Protection Engine You can install Symantec Protection Engine on Windows, Linux, and Solaris. See System requirements to install Symantec Protection Engine on Windows on page 33. See System requirements to install Symantec Protection Engine on Solaris on page 34. See System requirements to install Symantec Protection Engine on Linux on page 35.
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
More informationSymantec Protection for SharePoint Servers 6.0.4. Getting Started Guide
Symantec Protection for SharePoint Servers 6.0.4 Getting Started Guide Symantec Protection for SharePoint Servers Getting Started Guide The software described in this book is furnished under a license
More informationSymantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4
Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is
More informationConfiguring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc
Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described
More informationSymantec Protection Engine for Cloud Services 7.0 Release Notes
Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and
More informationSymantec Security Information Manager - Best Practices for Selective Backup and Restore
Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in
More informationSymantec AntiVirus for Network Attached Storage Integration Guide
Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement
More informationSymantec Endpoint Protection Shared Insight Cache User Guide
Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and
More informationConfiguring Symantec AntiVirus for NetApp Storage system
Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used
More informationSymantec Mobile Management for Configuration Manager
Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software
More informationSymantec NetBackup for Microsoft SharePoint Server Administrator s Guide
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this
More informationVeritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1
Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is
More informationSymantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0
Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase
More informationSymantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide
Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software
More informationBackup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0
Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationVeritas Operations Manager Package Anomaly Add-on User's Guide 4.1
Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a
More informationVeritas Cluster Server Getting Started Guide
Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished
More informationSymantec Security Information Manager 4.8 Release Notes
Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used
More informationSymantec NetBackup for Microsoft SharePoint Server Administrator s Guide
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this
More informationAltiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
More informationSymantec Mobile Management 7.2 MR1Quick-start Guide
Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only
More informationSymantec LiveUpdate Administrator. Getting Started Guide
Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationSymantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide
Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
More informationSymantec Critical System Protection Configuration Monitoring Edition Release Notes
Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book
More informationAltiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished
More informationSymantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5
Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished
More informationEmail Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationSymantec NetBackup Vault Operator's Guide
Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may
More informationVeritas Operations Manager Release Notes. 3.0 Rolling Patch 1
Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in
More informationSymantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software
More informationSymantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7
TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationSymantec Data Center Security: Server Advanced v6.0. Agent Guide
Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and
More informationSymantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
More informationSymantec Client Firewall Policy Migration Guide
Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Protection Center Enterprise 3.0. Release Notes
Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used
More informationSymantec System Recovery 2013 Management Solution Administrator's Guide
Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a
More informationSymantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference
Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license
More informationSymantec Endpoint Protection Integration Component 7.5 Release Notes
Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.
More informationSymantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
More informationSymantec Mail Security for Microsoft Exchange
Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license
More informationSymantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
More informationConfiguring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP
Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software
More informationSymantec ApplicationHA agent for Internet Information Services Configuration Guide
Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide
More informationRecovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note
Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.
More informationSymantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide
Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is
More informationSymantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described
More informationSymantec System Recovery 2011 Management Solution Administrator's Guide
Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a
More informationVeritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server
Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability
More informationSymantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
More informationSymantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationSymantec Virtual Machine Management 7.1 User Guide
Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in
More informationSymantec Secure Email Proxy Administration Guide
Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo
More informationSymantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1
Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement
More informationSymantec NetBackup for Lotus Notes Administrator's Guide
Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
More informationSymantec Management Platform Installation Guide. Version 7.0
Symantec Management Platform Installation Guide Version 7.0 Symantec Management Platform Installation Guide The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
More informationSymantec Backup Exec System Recovery Exchange Retrieve Option User's Guide
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under
More informationPGP CAPS Activation Package
PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationSymantec Event Collector for Cisco NetFlow version 3.7 Quick Reference
Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement
More informationInstallation Guide for Symantec Endpoint Protection and Symantec Network Access Control
Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in
More informationGetting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
More informationAltiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished
More informationSymantec Endpoint Protection Small Business Edition Implementation Guide
Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide The software described in this book is furnished under
More informationVeritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes
Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes November 2012 Veritas Operations Manager Advanced Release Notes The software described in this book is furnished under a license agreement
More informationBackup Exec 15. Quick Installation Guide
Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationSymantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide
Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
More informationAltiris Asset Management Suite 7.1 from Symantec User Guide
Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may
More informationSymantec Endpoint Protection Small Business Edition Client Guide
Symantec Endpoint Protection Small Business Edition Client Guide Symantec Endpoint Protection Small Business Edition Client Guide The software described in this book is furnished under a license agreement
More informationSymantec Enterprise Security Manager Modules. Release Notes
Symantec Enterprise Security Manager Modules for MS SQL Server Databases Release Notes Release 4.1 for Symantec ESM 9.0.x and 10.0 For Windows 2000/2008 and Windows Server 2003 Symantec Enterprise Security
More informationPGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes
PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP
More informationAltiris Asset Management Suite 7.1 SP2 from Symantec User Guide
Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationSymantec Endpoint Protection and Symantec Network Access Control Client Guide
Symantec Endpoint Protection and Symantec Network Access Control Client Guide Symantec Endpoint Protection and Symantec Network Access Control Client Guide The software described in this book is furnished
More informationAltiris Monitor Solution for Servers 7.5 from Symantec User Guide
Altiris Monitor Solution for Servers 7.5 from Symantec User Guide Altiris Monitor Solution for Servers 7.5 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationSymantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and
More informationSymantec Mail Security for Microsoft Exchange
Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license
More informationSymantec Mail Security for Microsoft Exchange Getting Started Guide
Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationVeritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault
Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Storage Foundation
More informationSymantec Protection for SharePoint Servers Implementation Guide
Symantec Protection for SharePoint Servers Implementation Guide 2 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book is furnished under a license agreement
More informationSymantec NetBackup PureDisk Deduplication Option Guide
Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Enterprise Security Manager Patch Policy Release Notes
Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement
More informationSymantec Response Assessment module Installation Guide. Version 9.0
Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationSymantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server
Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions
More informationSymantec NetBackup Clustered Master Server Administrator's Guide
Symantec NetBackup Clustered Master Server Administrator's Guide for Windows, UNIX, and Linux Release 7.5 Symantec NetBackup Clustered Master Server Administrator's Guide The software described in this
More informationSymantec Critical System Protection 5.2.9 Agent Guide
Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in
More informationSymantec Scan Engine Implementation Guide
Symantec Scan Engine Implementation Guide Symantec Scan Engine Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the
More informationSymantec Security Information Manager 4.7.4 Release Notes
Symantec Security Information Manager 4.7.4 Release Notes Symantec Security Information Manager 4.7.4 Release Notes The software described in this book is furnished under a license agreement and may be
More informationAltiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes
Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes The
More informationSymantec NetBackup for DB2 Administrator's Guide
Symantec NetBackup for DB2 Administrator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for DB2 Administrator's Guide The software described in this book is furnished under a license agreement
More informationSymantec Mail Security for Microsoft Exchange Server 2007/Server 2010
Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010 Implementation Guide Symantec Information Foundation Symantec Mail Security for Microsoft Exchange Implementation Guide The software
More informationHow To Use Symantec Mail Security For Windows 7.2.2 (X86) And 7.0 (X64) (X32) (For Windows 7) (Windows 7) And 8.2) (Msmsm
Symantec Mail Security for Microsoft Exchange Server 2013 Implementation Guide v7.0.1 Symantec Mail Security for Microsoft Exchange Implementation Guide The software described in this book is furnished
More informationAltiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide
Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide The software described in this book is furnished under a license
More informationSymantec NetBackup for Enterprise Vault Agent Administrator's Guide
Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance
More informationPGP Command Line Version 10.3 Release Notes
PGP Command Line Version 10.3 Release Notes Page 1 of 6 PGP Command Line Version 10.3 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information
More informationSymantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
More informationSymantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
More informationVeritas Storage Foundation and High Availability Solutions Getting Started Guide
Veritas Storage Foundation and High Availability Solutions Getting Started Guide Linux 5.1 Service Pack 1 Platform Release 2 Veritas Storage Foundation and High Availability Solutions Getting Started Guide
More information