Symantec Mail Security for SMTP. Installation Guide

Size: px
Start display at page:

Download "Symantec Mail Security for SMTP. Installation Guide"

Transcription

1 Symantec Mail Security for SMTP Installation Guide

2 Symantec Mail Security for SMTP Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. April 17, 2006 Copyright notice Copyright Symantec Corporation. All rights reserved. Symantec, the Symantec logo, Brightmail, LiveUpdate, SESA, and Norton AntiVirus are U.S. registered trademarks or registered trademarks of Symantec Corporation or its affiliates in other countries. Other names may be trademarks of their respective owners. Symantec Mail Security for SMTP 5.0 is protected under U.S. Patent Nos. 6,052,709; 5,999,932; and 6,654,787. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON- INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software and commercial computer software documentation as defined in FAR Sections and DFARS Section Symantec Corporation Stevens Creek Blvd. Cupertino, CA Printed in the United States of America

3 Technical support Licensing and registration As part of Symantec Security Response, the Symantec global Technical Support group maintains support centers throughout the world. The Technical Support group s primary role is to respond to specific questions on product feature/ function, installation, and configuration, as well as to author content for our Web-accessible Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering as well as Symantec Security Response to provide Alerting Services and Virus Definition Updates for virus outbreaks and security alerts. Symantec technical support offerings include: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and Web support components that provide rapid response and up-to-the-minute information Upgrade insurance that delivers automatic software upgrade protection Content Updates for virus definitions and security signatures that ensure the highest level of protection Global support from Symantec Security Response experts, which is available 24 hours a day, 7 days a week worldwide in a variety of languages for those customers enrolled in the Platinum Support Program Advanced features, such as the Symantec Alerting Service and Technical Account Manager role, offer enhanced response and proactive security support Please visit our Web site for current information on Support Programs. The specific features available may vary based on the level of support purchased and the specific product that you are using. To receive the latest product information by , go to: and join our support bulletin mailing list. If the product that you are implementing requires registration and/or a license key, the fastest and easiest way to register your service is to access the Symantec licensing and registration site at Alternatively, you may go to select the product that you wish to register, and from the Product Home Page, select the Licensing and Registration link.

4 Contacting Technical Support Customers with a current support agreement may contact the Technical Support group via phone or online at enterprise/. Customers with Platinum support agreements may contact Platinum Technical Support via the Platinum Web site at platinum/. When contacting the Technical Support group, please have the following: Product release level Hardware information Available memory, disk space, NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description Error messages/log files Troubleshooting performed prior to contacting Symantec Recent software configuration changes and/or network changes Customer Service To contact Enterprise Customer Service online, go to select the appropriate Global Site for your country, then choose Service and Support. Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information (features, language availability, local dealers) Latest information on product updates and upgrades Information on upgrade insurance and maintenance contracts Information on Symantec Value License Program Advice on Symantec's technical support options Nontechnical presales questions Missing or defective CD-ROMs or manuals

5 Contents Chapter 1 Chapter 2 Introducing Symantec Mail Security for SMTP About Symantec Mail Security for SMTP... 8 What s new in Symantec Mail Security for SMTP... 8 New features for all users... 9 Changes for Symantec Mail Security for SMTP users Changes for Symantec Brightmail Antispam users Components of Symantec Mail Security for SMTP How Symantec Mail Security for SMTP works Where to get more information Installing Symantec Mail Security for SMTP Before you install Before you install on any platform Before you install on Windows Before you install on Solaris or Linux System requirements Hardware requirements Supported browsers Supported LDAP servers System requirements for Windows System requirements for Solaris System requirements for Linux Installing on Windows Installing on Solaris and Linux Setting up Logging in Registering your system Configuring your system Setting up a Scanner Completing setup Accessing the Control Center Logging out Having trouble logging in or out?... 43

6 6 Contents Areas of localization Importing configuration files Configuring system locale Uninstalling Symantec Mail Security for SMTP Uninstalling from Windows Uninstalling from Linux and Solaris Appendix A Appendix B Index Integrating Symantec Mail Security with Symantec Security Information Manager About Symantec Security Information Manager Interpreting events in the Information Manager Firewall events that are sent to the Information Manager Definition Update events that are sent to the Information Manager Message events that are sent to the Information Manager Administration events that are sent to the Information Manager Installing and configuring event logging to the Information Manager Configuring the Information Manager Installing the local SSIM Agent Installing the Collector Configuring data sources Uninstalling Information Manager components Uninstalling the Collector Uninstalling the Information Manager Agent Sample options file

7 Chapter 1 Introducing Symantec Mail Security for SMTP This chapter includes the following topics: About Symantec Mail Security for SMTP What s new in Symantec Mail Security for SMTP Components of Symantec Mail Security for SMTP How Symantec Mail Security for SMTP works Where to get more information

8 8 Introducing Symantec Mail Security for SMTP About Symantec Mail Security for SMTP About Symantec Mail Security for SMTP Symantec Mail Security for SMTP offers enterprises an easy-to-deploy, comprehensive gateway-based security solution through the following: Antispam technology Symantec s state-of-the-art antispam filters assess and classify as it enters your site. Firewall This early response feature can vastly improve message throughput by analyzing incoming SMTP connections and enabling you to refuse connections or messages from hosts it perceives to be hostile. Antivirus technology Antivirus definitions and engines protect your users from -borne viruses. Content Compliance These features help administrators enforce corporate policies, reduce legal liability, and ensure compliance with regulatory requirements. Group policies and filter policies An easy-to-use authoring tool lets administrators create powerful and flexible ad hoc filters for individuals and groups. What s new in Symantec Mail Security for SMTP All users will find significant new features in this release of Symantec Mail Security for SMTP. You will also find familiar features, in many cases improved and expanded. In some cases the names of features are the same; in some cases the names have changed, and the changes are noted in this chapter. Note: By default, inbound and outbound messages containing a virus or massmailing worm, and unscannable messages, including malformed MIME messages, will be deleted. You may want to change the default setting for unscannable messages if you are concerned about losing important messages.

9 Introducing Symantec Mail Security for SMTP What s new in Symantec Mail Security for SMTP 9 New features for all users Table 1-1 lists features that are new for both Symantec Mail Security for SMTP users and Symantec Brightmail Antispam users. Table 1-1 New features for Symantec Mail Security for SMTP and Symantec Brightmail Antispam Category Features Description Threat protection features Inbound and outbound content controls Flexible mail management Improved Firewall Sender Authentication Improved virus protection True file type recognition for content compliance filtering Keywords filtering within attachments, keyword frequency filtering Regular expression filtering Support for third party archival tools LDAP integration and synchronization for policies Expanded variety of actions and combinations Expanded mail controls Aliasing Protects against directory harvest attacks, denial of service attacks, spam attacks, and virus attacks. Protects against phishing attacks, using the Sender Policy Framework (SPF), Sender ID, or both. Additional virus verdicts protect against suspected viruses, spyware and adware, and encrypted attachments. messages that may contain viruses can be delayed in the Suspect VIrus Quarantine, then refiltered, with updated virus definitions, if available. This feature can be effective in defeating virus attacks before they are widely known. View a continuously updated list available of virus definitions. Automatically detects file types without relying on file name extensions or MIME types. Scan within attachments to find keywords from dictionaries you create or edit. Specify a number of occurrences to look for. Use regular expressions to further customize filter conditions by searching within messages and attachments. Specify conditions that result in being sent to an archival address or disk location. Dynamic group population via any of several supported LDAP servers More than two dozen actions that can be taken on messages, with many combinations of multiple actions available. SMTP connection management, support for secure (TLS encryption), user-based routing, address masquerading, invalid recipient handling, control over delivery queue processing, support for static routes Distribution lists automatically expanded, mail filtered and delivered correctly for each user

10 10 Introducing Symantec Mail Security for SMTP What s new in Symantec Mail Security for SMTP Table 1-1 New features for Symantec Mail Security for SMTP and Symantec Brightmail Antispam Category Features Description Improved reporting and monitoring Extensive set of pre-built reports, scheduled reporting, additional alert conditions, remote syslog support More than 50 graphical reports that you can generate ad-hoc or on a scheduled basis. Reports can be exported for offline analysis and ed. Expanded administration capabilities Message tracking IP-based access control Control over Quarantine size limits View a trail of detailed information about a message, including the filtering processing applied to a message. Control which hosts and networks can access your Control Center. Specify user-based and total limits, configure automatic message deletions. Changes for Symantec Mail Security for SMTP users For users of Symantec Mail Security for SMTP 4.1, Version 5.0 provides a host of expanded and improved capabilities. In addition to the new features listed in Table 1-1, additional new features for Symantec Mail Security for SMTP users only are listed in Table 1-2. Table 1-2 New features for Symantec Mail Security for SMTP users Category Features Description Flexible mail management Centralized, Webbased administration Use the Control Center to manage all aspects of management and spam, virus, and content filtering across all servers with one interface. Inbound and outbound content controls Group Policies Expanded notification capabilities Improved attachment blocking Create separate inbound and outbound policies for an unlimited number of groups of users. You can specify groups of users based on addresses, domains, LDAP groups, or IP addresses. For each category of , you can specify custom message handling for each group. Automatically send s notifying specific persons or groups when certain message conditions are encountered during message filtering. Create different notifications for different conditions or user groups. Strip attachments within container files. Search within attachments using regular expressions. Improved reporting and monitoring Aggregated logging and reporting Access logs for all messages from all servers via the Control Center. Manage reports for all servers via the Control Center. Note that many of the reporting features in SMS for SMTP 4.1 have been replaced in SMS for SMTP 5.0 by the message tracking feature.

11 Introducing Symantec Mail Security for SMTP What s new in Symantec Mail Security for SMTP 11 Table 1-2 New features for Symantec Mail Security for SMTP users Category Features Description Expanded administration capabilities Delegated administration Multiple administrator roles with view only or modify access to different portions of the management interface. Group Policies introduce expanded flexibility in mail filtering and message handling. Group Policies enable you to specify groups of users, based on addresses, domains, or IP addresses, and customize mail filtering for each group. See the Symantec Mail Security for SMTP Administration Guide for more information. In addition, if you were using Version 4.1 without Premium AntiSpam, Version 5.0, with or without Premium AntiSpam provides much more extensive capabilities for customizing both message filtering and the actions taken on filtered messages. New feature names Most features in Version 5.0 have similar names to the corresponding Version 4.1 features. Table 1-3 provides a cross-reference between selected Symantec Mail Security for SMTP 4.1 features and Symantec Mail Security for SMTP 5.0 features that have different names. Table 1-3 Version 4.1 to Version 5.0 Symantec Mail Security for SMTP 4.1 Feature Name Accounts Custom disclaimer Scan policy Routing Symantec Mail Security for SMTP 5.0 Feature Name Administration Annotation Settings > Virus > Exclude Scanning tab Settings > Hosts > Edit > SMTP tab Discontinued features The following Symantec Mail Security for SMTP 4.1 features are not included in Symantec Mail Security for SMTP 5.0: Auto-generated whitelist Logging of SMTP conversations Hold Queue, automatic reordering of the Slow Queue

12 12 Introducing Symantec Mail Security for SMTP What s new in Symantec Mail Security for SMTP Return code support for DNS Blacklists Configurable administrator timeout for the management interface Changes for Symantec Brightmail Antispam users Although the product name has changed, if you were a Symantec Brightmail Antispam user you will find the user interface for Symantec Mail Security for SMTP 5.0 quite familiar. Most features are named similarly, and the organization of the user interface is quite similar. Most of the changes are new features. For users of Symantec Brightmail Antispam, Symantec Mail Security for SMTP Version 5.0 provides significant new and expanded capabilities. In addition to the new features listed in Table 1-1, additional new features for Symantec Brightmail Antispam users only are listed in Table 1-4. Table 1-4 New features for Symantec Brightmail Antispam users Category Features Description Threat protection features Flexible mail management Inbound and outbound content controls Improved reporting and monitoring Improved virus processing Outbound filtering More flexible Group Policies Multiple actions Expanded content compliance filtering capabilities Attachment blocking Annotations Notifications Expanded virus monitoring Expanded logging LiveUpdate support for virus definitions, list of file types to exclude from virus scanning, expanded container limit controls Provides spam, virus, and content compliance filtering on outbound messages. Specify different outbound and inbound policies for each user group. Use LDAP groups to populate groups for Group Policies. Specify more than one action to take on specific categories of messages to specific groups of recipients. Expanded set of actions available on filtered messages, support for multiple actions on the same messages Create lists of attachment types to remove. Strip attachments within container files. Automatically append or prepend text, such as legal disclaimers or marketing tag lines, to messages. Automatically send s notifying specific persons or groups when certain message conditions are encountered during message filtering. Create different notifications for different conditions or user groups. Virus outbreak alerts, expanded logging of virus events Symantec Security Information Manager (SSIM) logging support

13 Introducing Symantec Mail Security for SMTP Components of Symantec Mail Security for SMTP 13 Table 1-4 New features for Symantec Brightmail Antispam users Category Features Description Expanded administration capabilities Global reject or pause of message scanning During a virus outbreak, you can temporarily pause scanning until new virus filters are in place. While the names of features are largely the same, you will find some changes to the organization of menus. Most importantly, you will now find a Policies menu at the top level, breaking out Group Policies (under the Settings menu in Symantec Brightmail Antispam 6.0.3), and including other items as well. See the Symantec Mail Security for SMTP Administration Guide for an updated explanation of how settings and policies interact. Note: With this release, the default action for an Unscannable verdict, including those due to malformed MIME content, has been changed from markup to delete. This was done to to provide the strongest possible level of protection against external threats. If desired, you can change this action on a per group basis. You may want to change the default setting for unscannable messages if you are concerned about losing important messages. Components of Symantec Mail Security for SMTP You can deploy Symantec Mail Security for SMTP in different configurations to best suit the size of your network and your processing needs. Each Symantec Mail Security for SMTP host can be deployed in the following ways: Scanner Deployed as a Scanner, a Symantec Mail Security for SMTP host filters . Your installation can have one or many Scanners. Symantec Mail Security for SMTP runs alongside your existing or groupware server. Control Center Deployed as a Control Center, a Symantec Mail Security for SMTP host is a Web-based configuration and administration center. Use it to configure and manage filtering, SMTP routing, system settings, and all other functions. Your enterprise-wide deployment of Symantec Mail Security for SMTP can have multiple Scanners but only one Control Center, from which you configure and monitor all the Scanner hosts. The Control Center provides status for all Symantec Mail Security for SMTP hosts in your system, system logs, and extensive customizable reporting. Use it to configure both system-wide and host-specific details.

14 14 Introducing Symantec Mail Security for SMTP Components of Symantec Mail Security for SMTP The Control Center also hosts the Spam and Suspect Virus Quarantines, for storage of spam and virus messages respectively. End users can access the Control Center to view their quarantined spam messages and set their preferences for language filtering and blocked and allowed senders. You can also configure the Spam Quarantine for administrator-only access. Scanner and Control Center A single Symantec Mail Security for SMTP host performs both functions. Note: Symantec Mail Security for SMTP does not provide mailbox access for end users or message storage, and is not intended for use as the only MTA in your infrastructure. Note: Symantec Mail Security for SMTP does not filter messages that don t flow through the SMTP gateway. For example, when two mailboxes reside on the same MS Exchange Server, or on different MS Exchange Servers within an Exchange organization, the messages will not pass through the Symantec Mail Security for SMTP filters.

15 Introducing Symantec Mail Security for SMTP How Symantec Mail Security for SMTP works 15 How Symantec Mail Security for SMTP works Your Symantec Mail Security for SMTP installation processes a message as follows. For the sake of discussion, our sample message passes through the Filtering Engine to the Transformation Engine without being rejected.

16 16 Introducing Symantec Mail Security for SMTP Where to get more information The incoming connection arrives at the inbound MTA via TCP/IP. The inbound MTA accepts the connection and moves the message to its inbound queue. The Filtering Hub accepts a copy of the message for filtering. The Filtering Hub consults the LDAP SyncService directory to expand the message s distribution list. The Filtering Engine determines each recipient s filtering policies. The message is checked against Blocked/Allowed Senders Lists defined by administrators. Virus filters and configurable heuristic filters determine whether the message is infected. Content Compliance filters scan the message for restricted attachment types or keywords, as defined in configurable dictionaries. Spam filters compare message elements with current filters published by Symantec Security Response to determine whether the message is spam. At this point, the message may also be checked against end-user defined Language settings. The Transformation Engine performs per-recipient actions based on filtering results and configurable Group Policies. Where to get more information In addition to this Installation Guide, your Symantec Mail Security for SMTP product comes with the following documentation: Symantec Mail Security for SMTP Planning Guide Symantec Mail Security for SMTP Administration Guide Symantec Mail Security for SMTP Getting Started Symantec Mail Security also includes a comprehensive help system that contains conceptual and procedural information. If you want more information about features that are associated with the page, select a More Information link in the Help page, or use the Table of Contents, Index, or Search tabs in the Help viewer to locate a topic.

17 Chapter 2 Installing Symantec Mail Security for SMTP This chapter includes the following topics: Before you install System requirements Installing on Windows Installing on Solaris and Linux Setting up Accessing the Control Center Areas of localization Uninstalling Symantec Mail Security for SMTP

18 18 Installing Symantec Mail Security for SMTP Before you install Before you install Before you install Symantec Mail Security for SMTP, you must perform some pre-installation tasks. Before you install on any platform The following are pre-installation tasks for both Windows and Linux/Solaris: Disable other antivirus programs Ensure no other programs are using the port that you want to use for the inbound MTA (usually port 25) Ensure no Tomcat or MySQL installations are present Establish an alternate MTA for alerting (optional) Save whitelist, blacklist, local domain, and Anti-Relay list data (optional, for users of Symantec Mail Security for SMTP 4.x only) Disabling other antivirus programs If you have other antivirus programs installed on your computer, it is recommended that you uninstall them to prevent any installation or operational errors. At a minimum, you must configure any other antivirus program to exclude the following directories from scanning: The MTA data directory (which you can specify during the Symantec Mail Security for SMTP installation process to do this, you must specify a custom installation) On Windows, the C:\windows\tmp directory On Linux and Solaris, anything under /var/tmp For information on excluding directories from scanning, see the user documentation that came with the antivirus program. Ensuring no other programs or services are running on the MTA port Stop, disable, or reconfigure any services running on the port you plan to use for your MTA (usually port 25) on the installation host if you are installing a Scanner. This is most likely an MTA such as sendmail or postfix. Optionally, you can configure the MTA to listen on another port when you add it to the Control Center. To check on Linux, use the following command:

19 Installing Symantec Mail Security for SMTP Before you install 19 netstat -an grep ':25' You can also telnet to port 25 and see if it answers. To check on Solaris, use the following command: netstat -an grep '\.25' You can also telnet to port 25 and see if it answers. To check on Windows: Launch a Command window and type: netstat -an find ":25 " This will list the status of port 25 for this system. If it is listed as LISTENING or ESTABLISHED, it is in use. Note: If the port is in use by the IIS SMTP Virtual Server, you do not need to remove it, as it is required for, and operates compatibly with Symantec Mail Security for SMTP. To determine whether the port is in use by IIS SMTP Virtual Server, click Programs>Administrative Tools>Internet Information Services, then expand the server name. Right click Default SMTP Virtual Server, select Properties, then from the General Tab, click Advanced. The currently bound TCP port will be listed there. Checking for Tomcat or MySQL installations Ensure that there are no installations of Tomcat or MySQL on the machine before you begin the installation process. To check on Linux, type: rpm -qa egrep mysql tomcat If any RPMs match, you must remove them. To check on Solaris, type: pkginfo egrep -i 'mysql tomcat' If any packages match, you must remove them. Note: These two methods will only find installations that were installed using the native packages, and not a manual installation. To check on Windows, navigate to the Services panel and look for Tomcat and MySQL services. If you find either product installed, you must uninstall it. Designating an alternate MTA for alerting (optional) Once you have installed Symantec Mail Security for SMTP and have begun filtering , you can configure it to send alerts for certain conditions or

20 20 Installing Symantec Mail Security for SMTP Before you install events. However, if you stop the filter-hub or the MTA service, these alerts cannot be sent. To ensure that you continue receiving alerts, it is useful to establish and maintain an alternate MTA; you can specify its IP address in the settings for the Control Center. For more information, refer to the Symantec Mail Security for SMTP Administration Guide. For information on deployment planning and options, refer to the Symantec Mail Security for SMTP Planning Guide. Saving data from Symantec Mail Security for SMTP 4.x (optional) If you wish to keep data from your existing installation of Symantec Mail Security for SMTP 4.x for use in this version, you must save the data files from your existing installation before you uninstall it. You can save the following data: Whitelist and blacklist data Local Routing list data Anti-Relay list data The custom whitelist data is stored in the file named SMSSMTP_cw.txt file. THe autogenerated whitelist data is stored in SMSSMTP_aw.txt. The blacklist, Local Routing list, and Anti-Relay list data is stored in the file named SMSSMTP.cfg. You can search for these files under the directory in which you installed Symantec Mail Security for SMTP 4.x. Table 2-1 provides the default locations for these files. The location will be different if you installed into a non-default location. Table 2-1 Platform Windows Default locations for data files Location C:\Program Files\Symantec\SMSSMTP\local Solaris /var/opt/smssmtp/local

21 Installing Symantec Mail Security for SMTP Before you install 21 Before you install on Windows You must ensure that the following tasks is completed before you begin the installation procedure: The IIS SMTP Virtual Server is installed Installing IIS SMTP Virtual Server Symantec Mail Security for SMTP is integrated with IIS SMTP Virtual Server on Windows. You must install this Windows Component before you run the Symantec Mail Security for SMTP installer. To install the IIS SMTP Virtual Server On your Windows server, click Control Panel > Add/Remove Programs > Add/Remove Windows Components > Internet Information Services (IIS) > Details > Select SMTP Service. The service is installed. Before you install on Solaris or Linux Ensure the following tasks are completed before you begin the installation procedure: Creating the necessary users and groups You must create the users and groups that Symantec Mail Security for SMTP will use. These users require a shell, but do not require login access, so you do not have to define a password for them. Note: The instructions given in this section are only for adding users to the local passwd file; the method you use for user and group creation may vary depending on how your system is configured to manage users.

22 22 Installing Symantec Mail Security for SMTP Before you install Users and groups for a Control Center installation users: mysql, postfix groups: mysql, postfix, postdrop The mysql user must be in the mysql group. The postfix user must be in the postfix group. There is no user for the postdrop group. To create this user and these groups on Solaris $ su Password: <your_root_password> # groupadd mysql # useradd -c "MySQL user" -g mysql mysql # groupadd -r postdrop To create this user and these groups on Linux $ su Password: <your_root_password> # groupadd -r mysql # useradd -c "MySQL user" -r -g mysql mysql # groupadd -r postdrop Users and groups for a Scanner installation: users: mailwall groups: bmi, avdefs The mailwall user must be in the bmi and avdef groups. To create users and groups on Solaris Use the following commands: $ su Password: <your_root_password> # groupadd bmi # groupadd avdefs # useradd -c "dummy user for SMS for SMTP" -d /opt/symantec/ SMSSMTP/scanner -m -g bmi mailwall To create users and groups on Linux Use the following commands: $ su Password: <your_root_password> # groupadd -r bmi # groupadd -r avdefs

23 Installing Symantec Mail Security for SMTP System requirements 23 # useradd -c "dummy user for SMS for SMTP" -d /opt/symantec/ SMSSMTP/scanner -m -r -G bmi,avdevs mailwall Note: If you are reinstalling this version of Symantec Mail Security for SMTP on this machine, and did not explicitly remove the users and groups that you created for the previous installation, you do not have to recreate them. System requirements This section lists system requirements for running Symantec Mail Security for SMTP. If you plan to install and configure this Symantec Mail Security for SMTP as a Scanner that will process both inbound and outbound traffic, two IPs (NICs) are required, one each for for inbound and outbound mail traffic. The inbound IP should be on your external network and the outbound IP should be on your internal network. Optionally, you can use one NIC and two MTA ports (inbound and outbound). For example, port 25 for inbound and port 26 for outbound. If you will not be processing both inbound and outbound mail, only one IP is required. A fully qualified domain name is required for each computer running Symantec Mail Security for SMTP. A UTF8-capable application for reading logs and other exported files. Hardware requirements Symantec Mail Security for SMTP has the following hardware requirements: Intel Pentium 4 Processor or compatible (Windows and Linux) UltraSPARC (Solaris) 1GB RAM (2GB Recommended) 512 MB disk space minimum (2 GB or more recommended) Supported browsers The following browser versions are supported for Control Center access: Internet Explorer 6.0 Firefox 1.5

24 24 Installing Symantec Mail Security for SMTP System requirements Note: You must enable cookies in your browser for Control Center to function correctly. Supported LDAP servers Symantec Mail Security for SMTP supports the following LDAP directory types: Windows 2000 Active Directory Windows 2003 Active Directory Sun Directory Server 5.2 (formerly known as the iplanet Directory Server) If you are using version 5.2 of the SunOne LDAP server, you must update to patch 4. Exchange 5.5 Lotus Domino LDAP Server 6.5 OpenLDAP (for authentication only) System requirements for Windows Symantec Mail Security for SMTP is supported on the following versions of Windows: Windows 2000 Server SP4 Windows Server 2003 SP1 Windows Server 2003 (Japanese) SP1 System requirements for Solaris Symantec Mail Security for SMTP is supported on the following versions of Solaris: Solaris 9 If you are running Solaris 9, you must apply patch The patch is available here: Solaris 10 Because the tar file names exceed the 40-character file name limit of native Solaris tar, GNU tar is required to install Symantec Mail Security for SMTP. GNU tar for Solaris is available from and other Web sites.

25 Installing Symantec Mail Security for SMTP Installing on Windows 25 System requirements for Linux Symantec Mail Security for SMTP is supported on the following versions of Linux: Red Hat AS 3.0 Update 5 Red Hat ES 3.0 Update 5 Installing on Windows For Linux installations, the installer requires the compat-libstdc++ library. This library is available on your Red Hat distribution CD. This procedure describes the installation process for Windows. You can install the Control Center, Scanner, or both on the same machine. Note: If you plan to install both the Control Center and a Scanner on the same machine, you must install them at the same time, running the installation program only once. Warning: If you are reinstalling Symantec Mail Security for SMTP after uninstalling it on this machine, ensure that you have completely removed all of the files and directories as described at the end of Uninstalling from Windows on page 46 before proceeding. To install Symantec Mail Security for SMTP on Windows 1 Double-click the installer icon. The installer will prepare the installation and the InstallShield Wizard welcome panel is displayed. This may take a few moments. Note: You can run the installer using an options file. For more information about using an options file, refer to Sample options file on page Click Next. The Subscription Software License Agreement is displayed. 3 Read the licensing agreement, select the radio button to indicate that you accept the licensing agreement, and then click Next. The Installation Type panel is displayed. You can choose to install Symantec Mail Security for SMTP in the following configurations:

26 26 Installing Symantec Mail Security for SMTP Installing on Windows Typical, which installs both the Scanner and Control Center on the same machine in a location you specify, with subcomponents under that location, or Custom, which allows you to install a Scanner or the Control Center individually, as well as specify locations for the MTA data and log directories (if you are installing a Scanner), and/or the port number for your Tomcat installation (if you are installing the Control Center). 4 Select a configuration option and click Next. The Installation Directory panel is displayed. 5 Click Browse to specify an alternate location, or accept the default value, and then click Next. The default value is C:\Program Files\Symantec\SMSSMTP If you selected the default configuration in step 4, the Installation Parameters Summary panel is displayed. Proceed to step 12. If you selected the custom installation configuration in step 4, the Feature Selection panel is displayed. Proceed to step 7. 6 If you are installing both a Scanner and the Control Center, click Next, otherwise, uncheck the box for the component you are not installing, and then click Next. 7 If you are installing the Control Center only, proceed to step 11. If you are installing a Scanner, the MTA Data Directory panel is displayed. This is the directory used for message queue data. The default location for this directory is C:\Program Files\Symantec\SMSSMTP\mta 8 Click Browse to specify an alternate location, or accept the default value, and then click Next. The Log Directory panel is displayed. All log data for this Scanner will be stored in the directory you specify. The default location for this directory is C:\Program Files\Symantec\SMSSMTP\logs 9 Click Browse to specify an alternate location, or accept the default value, and then click Next. If you are installing both a Scanner and the Control Center on this machine, proceed to step 12. If you are installing a Scanner individually (with no Control Center on this machine), the Control Center IP panel is displayed. You must provide either the specific IP address (or CIDR range of IP addresses) of a Control Center allowed to access this Scanner, or you can allow access to this Scanner from any computer.

27 Installing Symantec Mail Security for SMTP Installing on Solaris and Linux 27 Warning: Selecting the Any computer option means that any machine can access this Scanner. This could represent a security risk. Please consult your organization s network security team before you select this option. 10 Enter an IP address or select Any Computer and click Next. 11 If you are installing the Control Center, the Tomcat Port panel is displayed. Accept the default value (41443), or enter an alternate value, and then click Next. The Installation Parameters Summary panel is displayed. Note: The port number you specify for Tomcat to use must be higher than Verify the list of installation parameters and click Install. The installation completes, and the components you have installed are started automatically. A log of the installation is placed in C:\Program Files\Symantec\SMSSMTP\install_log.txt Installing on Solaris and Linux The following section describes how to install Symantec Mail Security for SMTP on Solaris and Linux. Note: If you plan to install both the Control Center and a Scanner on the same machine, you must install them at the same time, running the installation program only once. Warning: If you are reinstalling Symantec Mail Security for SMTP after uninstalling it on this machine, ensure that you have completely removed all of the files and directories as described at the end of Uninstalling from Linux and Solaris on page 46 before proceeding. To install Symantec Mail Security for SMTP on Solaris or Linux 1 As root, or using sudo, type./install The installer begins running. If the correct version of the required JRE is not present, it will unpack its own copy.

28 28 Installing Symantec Mail Security for SMTP Installing on Solaris and Linux Note: You can run the installer using an options file. For more information about using an options file, refer to Sample options file on page Type 1 to proceed. The license agreement is displayed. 3 Use the Enter key to page through the license agreement text. 4 Type 1 to accept the license agreement, then type 0 and then 1 to proceed. The Installation Type screen is displayed. You can choose to install Symantec Mail Security for SMTP in the following configurations: Typical, which installs both the Scanner and Control Center on the same machine in a location you specify, with subcomponents under that location, or Custom, which allows you to install a Scanner or the Control Center individually, as well as specify locations for the MTA data and log directories (if you are installing a Scanner), or the port number for your Tomcat installation (if you are installing the Control Center). 5 Type the number of the option you want to select or deselect it, then type 1 to proceed. The Installation Directory screen is displayed. 6 Specify an alternate location, or type 1 to accept the default value, and then then type 0 to proceed. The default value is /opt/symantec/smssmtp/ If you selected the default installation configuration in step 5, the Installation Parameters Summary screen is displayed. Proceed to step 13. If you selected the custom installation configuration in step5, the Feature Selection panel is displayed. Proceed to step 7. 7 If you are installing both a Scanner and the Control Center, type 0 to proceed, otherwise, type the number for the component you are not installing to deselect it, and then type 0 to proceed. 8 If you are installing the Control Center only, proceed to step 12. If you are installing a Scanner, the MTA Data Directory screen is displayed. This is the directory used for message queue data. The default location for this directory is /opt/symantec/smssmtp/mta

29 Installing Symantec Mail Security for SMTP Installing on Solaris and Linux 29 9 Specify an alternate location, or type 1 accept the default value, and then then type 0 to proceed. The Log Directory screen is displayed. All log data for this Scanner will be stored in the directory you specify. The default location for this directory is / opt/symantec/smssmtp/logs. 10 Specify an alternate location, or type 1 to accept the default value, and then then type 0 to proceed If you are installing both a Scanner and the Control Center on this machine, proceed to step 13. If you are installing a Scanner individually (with no Control Center on this machine), the Control Center IP panel is displayed. You must provide either the specific IP address (or CIDR range of IP addresses) of a Control Center allowed to access this Scanner, or you can allow access to this Scanner from any computer. Warning: Selecting the Any computer option means any machine can access this Scanner. This could represent a security risk. Please consult your organization s network security team before you select this option. 11 Enter an IP address or select Any Computer and type 0 to proceed. 12 If you are installing the Control Center, the Tomcat Port screen is displayed. Accept the default port value (41443), or enter an alternate value, and then type 0 to proceed. Note: The port number you specify for Tomcat to use must be higher than 1024, as it does not run as root (or setuid root). The Installation Parameters Summary screen is displayed. 13 Verify the list of installation parameters and type 3 to complete the installation. The installation completes, and the components you have installed are started automatically. A log of the installation is placed in /opt/symantec/smssmtp/install_log.txt

30 30 Installing Symantec Mail Security for SMTP Setting up Setting up If you installed Control Center, you will now log into the Control Center and run the Setup Wizard. Many of the site-wide settings that you will specify as you use the Setup Wizard are actually site defaults that you can later vary for each Scanner you add. If you are setting up the Control Center and a Scanner on the same machine, the Setup Wizard will not show a summary as described in step 7 of this procedure, instead you will proceed directly to the Add Scanner Wizard. Note: If you have installed both the Control Center and a Scanner on one machine, you must add the Scanner on that machine to the Control Center before adding other Scanners. Note: None of the settings you specify using the wizard are final until you click Finish at the end of the wizard. If you step through all the panels of the wizard and do not click Finish, configuration settings will be unchanged. Logging in Before you can register and set up your system, you must log in to the Control Center. To log in as an administrator 1 Access your Control Center from a browser. The default login address is: where <hostname> is the hostname of the machine on which you installed the Control Center. You can also use the IP address in place of <hostname>. You may see a security alert message. 2 If you see a security alert message, accept the self-signed certificate to continue. The Control Center log in page is displayed. 3 You may choose the language in which you want to operate the Quarantine and end user views of the Control Center. Select the language you wish to use from the drop-down list on the login page.

31 Installing Symantec Mail Security for SMTP Setting up 31 Note: To display Quarantine and other end-user pages correctly when using a non-english locale setting, you must install language-specific fonts on the computer used to access these pages. These fonts must support UTF-8. Registering your system 4 Enter the default username and password, which are admin/symantec, and then click Login. The first time you access the Control Center, you will see the License Registration panel. If you have installed Control Center but have not yet installed a Scanner, you will see the Administrator Settings panel described in Configuring your system on page 32. To complete registration, you need one or more license files (.slf files) provided to you by Symantec (depending on the product features you have purchased, you may receive multiple license files). Place the file(s) on the computer from which you are accessing the Control Center. Each time you add a Scanner, you must confirm your license(s) or register again. However, you can use the same.slf file(s) for each Scanner. To register your license(s) 1 On the License Registration page, click Browse to find your.slf file. 2 Select your.slf file and click Open to return to the License Registration page. 3 If your installation will be using a proxy server for communications with Symantec, check the Use HTTP Proxy box and complete the proxy configuration fields. 4 Click Register. If registration was successful, the License Registration page is redisplayed. If there was an error, you will see error text at the top of the page. Note: For registration and ongoing operations, Symantec Mail Security for SMTP communicates with Symantec Security Response over a secure connection. If registration has failed, ensure that your network is configured to permit outbound connections to Symantec on port If you have another.slf file for a different feature, repeat this procedure. 6 When all your.slf files are successfully registered, click Next.

32 32 Installing Symantec Mail Security for SMTP Setting up Configuring your system When you have registered your license(s), the Setup Wizard is launched. Configure your system Proceed through the Setup Wizard as described in this section to configure your system. Note: None of the settings you specify using the wizard are final until you click Finish at the end of the wizard. If you step through all the panels of the wizard and do not click Finish, you will not make any changes to configuration settings. To specify administrator, local domain, and locale settings 1 On the Administrator Settings panel, specify an address for the administrator and click Next. You can use the Control Center to specify that the system send alerts and other information to this address after you have completed this procedure. 2 On the Local Domains panel, add the domains for which you accept incoming mail. You can also add specific addresses. To delete a domain or address from the list, check it and click Delete. 3 For each domain or address you add, optionally specify that messages should be routed to a specific host and port. You can optionally check Enable MX Lookup. You can click Import to import a text file containing a list of local domains, one domain per line. 4 Click Next. The System Locale panel is displayed. 5 Specify the locale that Symantec Mail Security for SMTP should use for formatting numbers, dates, and times, and then click Next. If you are setting up a Control Center-only installation, you will now see the Setup Wizard Summary panel. If you are setting up a Control Center and a Scanner on the same machine, you will see the Mail Filtering panel, the first panel in the Add Scanner Wizard. 6 Do one of the following: If you are setting up a Control Center-only installation, review the information on the Setup Wizard Summary panel. Click Back to make changes, or Finish to complete. You must set up a Scanner before you can filter mail. To set up a Scanner on another machine you must

33 Installing Symantec Mail Security for SMTP Setting up 33 install a Scanner on that machine, and then follow the procedure described in Setting up a Scanner on page 35. If you are setting up a Control Center and a Scanner on this machine, continue with To specify mail filtering settings in the next section. To specify mail filtering settings 1 On the Mail Filtering panel, specify how you will use this Scanner. You can choose to filter inbound mail, outbound mail, or both. If you choose to filter inbound mail, you will see the Inbound Mail Filtering panel. Proceed with step 2. If you choose to filter outbound mail only, you will see the Outbound Mail Filtering panel. Proceed with To specify outbound mail filtering settings on page On the Inbound Mail Filtering panel, choose the IP address to use for inbound mail. You can use the Test button to ensure that the mail server responds. 3 If desired, change the port specification for inbound mail, and then click Next. Note: Be sure not to use a port already in use on your system. 4 On the Inbound Mail Filtering - Connections panel, specify the mail servers from which this Scanner will accept inbound mail. You can choose All IP addresses or specify IP addresses or hostnames. A typical choice would be All IP addresses, thus allowing the Scanner to accept mail from any MTA on the Internet. If you specify one or more IP addresses, you must include the IP address of the Control Center so that Spam Quarantine and Suspect Virus Quarantine can release messages. After you add the first entry, the IP address of the Control Center is added automatically and selected. If you are using a different IP address for the Control Center, or have the Control Center and Scanner installed on different machines, you must add the new IP address and disable the one that was added automatically. Warning: If you are deploying this Scanner behind a gateway, and are specifying one or more IP addresses instead of All IP addresses, you must add the IP addresses of ALL upstream mail servers in use by your organization. Upstream mail servers that are not specified here may be classified as spam sources.

34 34 Installing Symantec Mail Security for SMTP Setting up 5 On the Inbound Mail Filtering - Local Relay panel, specify the internal host to which this Scanner will relay inbound mail after filtering is complete. You can define a new host or select a host from the list. A typical value is a downstream mail server such as your corporate mail server. You can also specify a port. If you check Enable MX lookup for this host, you must specify a host name (not an IP address) for that server. 6 If you chose to filter only inbound mail, click Next and proceed to step 8 in To specify outbound mail filtering settings in the next section. If you chose to filter inbound and outbound mail, click Next and proceed to step 1 in To specify outbound mail filtering settings in the next section. To specify outbound mail filtering settings 1 On the Outbound Mail Filtering panel, choose the IP address to use for outbound mail. 2 If desired, change the port specification for outbound mail, and then click Next. In most cases this should be left as port 25. If you are using one NIC but wish to support both inbound and outbound filtering, you must set this to an alternate port so that it does not conflict with the port used for inbound filtering. You can use the Test button to ensure that the mail server responds. 3 On the Outbound Mail Filtering - Connections panel, specify by IP address the internal mail servers from which this Scanner will accept outbound mail. A typical value is the IP address of your corporate outbound mail server. If you chose to filter only outbound mail, you will see the Outbound Mail Filtering - Local Relay panel next. Click Next and proceed to step 4. If not, click Next and skip to step 6. 4 On the Outbound Mail Filtering - Local Relay panel, specify the internal host to which this Scanner will relay outbound mail after filtering is complete. You can select a host from the list or define a new host. A typical value is a downstream mail server such as your corporate mail server. You can also specify a port. If you check Enable MX lookup for this host, you must specify a host name (not an IP address) for that server. 5 Click Next. 6 On the Outbound Mail Filtering - Nonlocal Relay panel, specify how you want to relay outbound mail after filtering is complete. You can use default MX lookup, select a host from the list, or define a new host.

35 Installing Symantec Mail Security for SMTP Setting up 35 You can also specify a port. If you check Enable MX lookup for this host, you must specify a host name (not an IP address) for that server. For outbound mail addressed to a non-local domain, there is typically no relay host to specify. If you choose Use default MX lookup, the Scanner will use Internet MX records to deliver the mail. 7 Click Next. 8 On the Setup Wizard Summary panel, review the settings shown. 9 If you are satisfied with the settings, click Finish to save them. If not, click Back to revise your settings, or Cancel to end without saving any changes. When the configuration is complete, the Scanner will contact Symantec to download the latest antispam filters and antivirus definitions, and the default antivirus definition download schedule will be in place (if you have installed an antivirus license). You can alter this schedule from the Control Center. Refer to the Symantec Mail Security for SMTP Administration Guide for more information. Setting up a Scanner The instructions in this section only apply if you are adding a Scanner on a machine different from the one hosting your Control Center. Add a Scanner Use the Add Scanner Wizard to set up a Scanner. Note: None of the settings you specify using the wizard are final until you click Finish at the end of the wizard. If you step through all the panels of the wizard and do not click Finish, you will not make any changes to configuration settings. To configure host IP settings 1 If you are adding your first Scanner, you will now see the Add Scanner Wizard. Skip to step 3. If you re adding a subsequent Scanner, from the Control Center, click Settings > Hosts. 2 On the Hosts page, click Add and then click Next. 3 On the Scanner Host Settings panel, identify your new Scanner by typing a description and a name or IP address. 4 Click Next to continue with To register the Scanner in the next section.

36 36 Installing Symantec Mail Security for SMTP Setting up To register the Scanner 1 On the License Registration page, click Browse to find your.slf file. 2 Select your.slf file and click Open to return to the License Registration page. 3 If your Scanner will be using a proxy server for communications with Symantec, check the Use HTTP Proxy box and complete the proxy configuration fields. 4 Click Register. If registration was successful, the License Registration page is redisplayed. If there was an error, you will see error text at the top of the page. Note: For registration and ongoing operations, Symantec Mail Security for SMTP communicates with Symantec Security Response over a secure connection. If registration has failed, ensure that your network is configured to permit outbound connections to Symantec on port If you have another.slf file for a different feature, repeat this procedure. 6 When all your.slf files are successfully registered, click Next. 7 Continue with To specify mail filtering settings in the next section. To specify mail filtering settings 1 On the Mail Filtering panel, specify how you will use this Scanner. You can choose to filter inbound mail, outbound mail, or both inbound and outbound mail. If you choose to filter inbound mail, you will see the Inbound Mail Filtering panel. Click Next and proceed with step 2. If you choose to filter outbound mail only, you will see the Outbound Mail Filtering panel. Click Next and proceed with To specify outbound mail filtering settings on page On the Inbound Mail Filtering panel, choose the IP address to use for inbound mail. You can use the Test button to ensure that the mail server responds. 3 If desired, change the port specification for inbound mail, and then click Next. 4 On the Inbound Mail Filtering - Connections panel, specify the mail servers from which this Scanner will accept inbound mail. You can choose All IP addresses or specify IP addresses or hostnames. A typical choice would be All IP addresses, thus allowing the Scanner to accept mail from any MTA on the Internet.

37 Installing Symantec Mail Security for SMTP Setting up 37 If you specify one or more IP addresses, you must include the IP address of the Control Center so that Spam Quarantine and Suspect Virus Quarantine can release messages. After you add the first entry, the IP address of the Control Center is added automatically and selected. If you are using a different IP address for the Control Center, or have the Control Center and Scanner installed on different machines, you must add the new IP address and disable the one that was added automatically. Warning: If you are deploying this Scanner behind a gateway, and are specifying one or more IP addresses instead of All IP addresses, you must add the IP addresses of ALL upstream mail servers in use by your organization. Upstream mail servers that are not specified here may be classified as spam sources. 5 Click Next. 6 On the Inbound Mail Filtering - Local Relay panel, specify the internal host to which this Scanner will relay inbound mail after filtering is complete. You can select a host from the list or define a new host. A typical value is a downstream mail server such as your corporate mail server. You can also specify a port. If you check Enable MX lookup for this host, you must specify a host name (not an IP address) for that server. 7 If you chose to filter only inbound mail, click Next and proceed to step 9 in To specify outbound mail filtering settings. If you chose to filter inbound and outbound mail, click Next and proceed to step 1 in To specify outbound mail filtering settings. To specify outbound mail filtering settings 1 On the Outbound Mail Filtering panel, choose the IP address to use for outbound mail. 2 If desired, change the port specification for outbound mail. In most cases this should be left as port 25. If you are using a single NIC and IP for both inbound and outbound mail, ensure that this port is different from the one you specified for inbound mail. You can use the Test button to ensure that the mail server responds. 3 Click Next. 4 On the Outbound Mail Filtering - Connections panel specify by IP address or CIDR range the internal mail servers from which this Scanner will accept outbound mail. A typical value is your corporate outbound mail server.

38 38 Installing Symantec Mail Security for SMTP Setting up Completing setup If you chose to filter only outbound mail, you will see the Outbound Mail Filtering - Local Relay panel next. Click Next and proceed to step 5. If not, click Next and skip to step 7. 5 On the Outbound Mail Filtering - Local Relay panel, specify the internal host to which this Scanner will relay outbound mail after filtering is complete. You can define a new host or select a host from the list. A typical value is a downstream mail server such as your corporate mail server. You can also specify a port. If you check Enable MX lookup for this host, you must specify a host name (not an IP address) for that server. 6 Click Next. 7 On the Outbound Mail Filtering - Nonlocal Relay panel, specify how you want to relay outbound mail after filtering is complete. You can use default MX lookup, select a host from the list, or define a new host. You can also specify a port. If you check Enable MX lookup for this host, you must specify a host name (not an IP address) for that server. For outbound mail addressed to a non-local domain, there is typically no relay host to specify. If you choose Use default MX lookup, the Scanner will use Internet MX records to deliver the mail. 8 Click Next. 9 On the Setup Wizard Summary panel, review the settings shown. 10 If you are satisfied with the settings, click Finish to save them. If not, click Back to revise your settings, or Cancel to end without saving any changes. When the configuration is complete, the Scanner will contact Symantec to download the latest antispam filters and antivirus definitions, and the default antivirus definition download schedule will be in place (if you have installed an antivirus license). You can alter this schedule from the Control Center. Refer to the Symantec Mail Security for SMTP Administration Guide for more information. Your installation is now nearly ready to use, with a set of default policies designed for most enterprise installations. Review the following sections to determine what additional setup tasks you need to perform. Adding more Scanners To add more Scanners, repeat the tasks in Setting up a Scanner on page 35.

39 Installing Symantec Mail Security for SMTP Setting up 39 Setting mail filtering policies When you set up Symantec Mail Security for SMTP, a set of ready-made default message filtering policies are in place. You can use these policies or customize them. The initial default policies are as follows: The default group policy includes all users, and specifies use of default filtering policies for spam, suspected spam, virus, content compliance, and end user settings. The default spam policy is to modify the subject line by prepending [Spam] and deliver the message to the inbox, and only applies to inbound mail traffic. The default suspected spam policy is to modify the subject line by prepending [Suspected Spam] and deliver the message to the inbox. The suspected spam threshold is set to 72 (see Symantec Mail Security for SMTP Administration Guide for more information). The default virus policy is to clean the message. The default worm policy is to delete the message. No default content compliance policies are in place. No end user configuration capabilities are in place. For more information on these policies and instructions on adjusting them to meet your needs, see the Symantec Mail Security for SMTP Administration Guide. Note: With this release, the default action for an Unscannable verdict, including those due to malformed MIME content, has been changed from markup to delete. This was done to provide the strongest possible level of protection against external threats. If desired, you can change this action on a per group basis. You may want to change the default setting for unscannable messages if you are concerned about losing important messages. Testing Scanners For instructions on testing Scanners, see the Symantec Mail Security for SMTP Administration Guide.

40 40 Installing Symantec Mail Security for SMTP Accessing the Control Center Accessing the Control Center Follow these instructions to begin using the Control Center. To log in as an administrator 1 Access your Control Center from a browser. The default login address is: where <hostname> is the hostname of the machine on which you installed the Control Center. You can also use the IP address in place of <hostname>. You may see a security alert message. 2 If you see a security alert message, accept the self-signed certificate to continue. The Control Center log in page is displayed. 3 You may choose the language in which you want to operate the Quarantine and end user views of the Control Center. Select the language you wish to use from the drop-down list on the login page. 4 In the User name box, type the user name given to you by your system administrator. If you are the first administrator to log in, type: admin 5 In the Password box, type your administrative password. The initial default password is symantec. Contact your system administrator if you do not know the password. 6 Click Login. Warning: Do not create an account for an administrator that is identical to a user account name. Do not create an end user account that is identical to an administrator account name. If a naming conflict occurs, the administrator will take precedence and the end user will be denied access to their account. In the unlikely event that both the username and the password for an administrator and an end user are identical, the end user will be granted access to the administrator account.

41 Installing Symantec Mail Security for SMTP Accessing the Control Center 41 To log in as an end user with an iplanet or Sun ONE Directory Server Note: To do this, LDAP authentication must be enabled. Refer to the Symantec Mail Security for SMTP Administration Guide for more information on LDAP support. 1 Access your Control Center from a browser. The default login address is: where <hostname> is the hostname of the machine on which you installed the Control Center. You can also use the IP address in place of <hostname>. You may see a security alert message. 2 If you see a security alert message, accept the self-signed certificate to continue. The Control Center log in page is displayed. 3 If necessary, choose the language in which you want to operate the Control Center. Below the text entry fields you will see a list of names of languages. The name of the language currently in use is displayed in normal text. The names of other languages are displayed underlined and highlighted. Click the name of another language to use that language instead. 4 In the User name box, type your full address (for example, [email protected]). 5 In the Password box, type the password you normally use to log in to your system. 6 Click Login. To log in as an end user with an Active Directory account 1 Access your Control Center from a browser. The default login address is: where <hostname> is the hostname of the machine on which you installed the Control Center. You can also use the IP address in place of <hostname>. You may see a security alert message. 2 If you see a security alert message, accept the self-signed certificate to continue. The Control Center log in page is displayed. 3 If necessary, choose the language in which you want to operate the Control Center.

42 42 Installing Symantec Mail Security for SMTP Accessing the Control Center Below the text entry fields you will see a list of names of languages. The name of the language currently in use is displayed in normal text. The names of other languages are displayed underlined and highlighted. Click the name of another language to use that language instead. 4 In the User name box, type your user name (for example, kris). 5 In the Password box, type the password you normally use to log in to your system. 6 Select the LDAP server you use to verify your credentials. 7 Click Login. To log in as an end user with an Exchange 5.5 account 1 Access your Control Center from a browser. The default login address is: where <hostname> is the hostname of the Control Center. Or, you can use the IP address in place of <hostname>. You may see a security alert message. 2 If you see a security alert message, accept the self-signed certificate to continue. The Control Center log in page is displayed. 3 If necessary, choose the language in which you want to operate the Control Center. Below the text entry fields you will see a list of names of languages. The name of the language currently in use is displayed in normal text. The names of other languages are displayed underlined and highlighted. Click the name of another language to use that language instead. 4 In the User name box, type your full primary address (for example, [email protected]). 5 In the Password box, type the password you normally use to log in to your Windows system. 6 Click Login. To determine your primary address for Exchange 5.5, check the following in Outlook 2000 or Outlook Click Tools, click Address Book. 2 Type your name in the Type Name or Select from List box. 3 Double-click your name in the list displayed, and then click Addresses.

43 Installing Symantec Mail Security for SMTP Areas of localization 43 The mail address on the line starting with SMTP: in capitals is your primary address. Logging out Follow these steps to log out. To log out 1 Click the Log Out link in the upper right corner of the current page. 2 For security purposes, close your browser window to clear your browser s memory. Having trouble logging in or out? Areas of localization If you are having trouble logging in or logging out, consider the following: When logging in, make sure you type your user name and password in the correct case. Note the difference between kris, Kris, and KRIS. You are automatically logged out if you don t use the Control Center for 30 minutes. If it happens, log in again. The following portions of the Control Center are available in multiple languages: Table 2-2 Localized portions of the Control Center Topic Administrators End-Users Spam Quarantine Virus Quarantine Blocked Senders Allowed Senders Language settings Note that end users will view the Control Center in the language they selected at login. The Control Center as a whole is internationalized. You can enter non-us ASCII characters into most fields. However, end users and administrators should be warned not to enter non-us ASCII characters into any of the following fields:

44 44 Installing Symantec Mail Security for SMTP Areas of localization Under Policies > Compliance, the conditions for From: address, To: address, CC: address, BCC: address, Envelope sender, Envelope recipient, and Envelope HELO. Also under Policies > Compliance, any text entered under Actions. Under Policies > Attacks, the text entry fields for the Forward the message and Add BCC recipients actions. Under Policies > Sender Groups, addresses or domain names or names of third party allowed sender services. In Attachment Lists, Add attachment type entries for MIME-type and File name. In Notifications, under Notification Content, entries in the Send from field. In Archive, the Archive address or Archive server host. In Alert Settings, the Send from address. Also, in Administration, administrator addresses. In Quarantine Settings, the Notification Templates Send from, and, under Misidentified Messages, the Administrator. Under Reports, addresses (Report addresses). In Spam and Virus Quarantine, the following search criteria: From, To, Message ID. Any field that asks for a domain name. Internationalized domain names are not supported. For end users, addresses or domain names of blocked or allowed senders. Importing configuration files Configuring system locale To import files with extended ASCII or non-ascii characters, the files must be in the UTF-8 format. The Control Center can be configured for single and double-byte character sets. This is done through the Locale setting. To configure the Control Center to handle single and double-byte character sets 1 In the Control Center, click Settings > Control Center.

45 Installing Symantec Mail Security for SMTP Areas of localization 45 2 Using the dropdown list in the System Locale section of the page, select a language from the list.

46 46 Installing Symantec Mail Security for SMTP Uninstalling Symantec Mail Security for SMTP Uninstalling Symantec Mail Security for SMTP Symantec Mail Security for SMTP includes an uninstallation tool. Use the following instructions to uninstall the application. Uninstalling from Windows An uninstaller is included in the Symantec Mail Security for SMTP product when you install it on your Windows machine. To uninstall Symantec Mail Security for SMTP from a Windows machine Click Start > Programs > Symantec > SMSSMTP > Uninstall SMS for SMTP The uninstaller is launched. All Symantec Mail Security for SMTP processes are stopped by the uninstaller. A number of files and directories will remain after the uninstaller is finished. You can remove them by deleting the \SMSSMTP directory, for which you specified the location at install time, as well as c:\program Files\Symantec c:\program Files\Common Files\Symantec Shared\ Warning: If you are uninstalling and plan to reinstall, you must remove these files and directories, as the data that they contain will interfere with a subsequent installation of Symantec Mail Security for SMTP. Uninstalling from Linux and Solaris To uninstall Symantec Mail Security for SMTP from a Linux or Solaris machine, you must know the location of its installation directory, sometimes called the LOADPOINT. To find this location, type cat /etc/symantec/smssmtp/resources and look for the value of LOADPOINT. To uninstall Symantec Mail Security for SMTP from a Linux or Solaris machine As the root user, type <LOADPOINT>/uninstall The uninstaller is launched. All Symantec Mail Security for SMTP processes are stopped by the uninstaller. You can verify this using ps -ef. All packages are uninstalled. You can verify this using the pkginfo command on Solaris or the rpm command on Linux.

47 Installing Symantec Mail Security for SMTP Uninstalling Symantec Mail Security for SMTP 47 The users and groups you created before installing are not removed. If you are planning to reinstall Symantec Mail Security for SMTP, you do not have to recreate them. The following directories/files will remain: common/ install_log.txt jre/ ldapsync/ mta/ mysql/ scanner/ tomcat/ On Solaris, the _jvm directory is also left behind. Warning: If you are uninstalling and plan to reinstall, you must remove these directories, as the data that they contain will interfere with a subsequent installation of Symantec Mail Security for SMTP. You can remove these directories with the following command: rm -rf /opt/symantec/smssmtp (If you specified a non-default installation location, specify it instead of /opt/symantec/smssmtp.) Note: At install time, an InstallShield directory was created in root s home directory. This directory is not completely removed by the uninstaller. To ensure that is removed, do the following: cd to root s home directory and check to see if an InstallShield directory exists. If it does exist, check to see if it contains directories for products other than Symantec Mail Security for SMTP. If there are directories for other products, remove only the one for Symantec Mail Security for SMTP, otherwise, you can remove the entire InstallShield directory.

48 48 Installing Symantec Mail Security for SMTP Uninstalling Symantec Mail Security for SMTP

49 Appendix A Integrating Symantec Mail Security with Symantec Security Information Manager This chapter includes the following topics: About Symantec Security Information Manager Interpreting events in the Information Manager Installing and configuring event logging to the Information Manager Uninstalling Information Manager components About Symantec Security Information Manager In addition to using the Symantec Mail Security for SMTP logging features, you can also log events to the Symantec Security Information Manager appliance for event management and correlation. Symantec Security Information Manager (SSIM) integrates multiple Symantec Enterprise Security products and thirdparty products to provide a central point of control of security within an organization. It provides a common management framework for Information Manager-enabled security products, such as Symantec Mail Security for SMTP, that protect your IT infrastructure from malicious code, intrusions, and blended threats. The Information Manager increases your organization s security posture by simplifying the task of monitoring and managing the multitude of security-related events and products that exist in today s corporate environments.

50 50 Integrating Symantec Mail Security with Symantec Security Information Manager Interpreting events in the Information Manager The event categories and classes include threats, security risks, content filtering, network security, spam, and systems management. The range of events varies depending on the Symantec applications that are installed and managed by the Information Manager. The Information Manager provides you with an open, standards-based foundation for managing security events from Symantec clients, gateways, servers, and Web servers. SSIM Agents collect events from Symantec security products and send the events to the Symantec Security Information Manger which uses a sophisticated set of rules to filter, aggregate, and correlate the events into security incidents and allows for full tracking and response. The Symantec Security Information Manager allows you to manage and respond to incidents from threat and vulnerability from discovery through resolution. The Symantec Incident Manager evaluates the impact of incidents on the associated systems and assigns incident severities. A built-in Knowledge Base provides information about the vulnerabilities that are associated with the incident. The Knowledge Base also suggests tasks that you can assign to a help desk ticket for resolution. Symantec Security Information Manager is purchased and installed separately. The appliance must be installed and working properly before you can configure Symantec Mail Security to log events to the SSIM. For more information, see the Symantec Security Information Manager documentation. Interpreting events in the Information Manager SSIM provides extensive event management capabilities, such as common logging of normalized event data for Information Manager-enabled security products like Symantec Mail Security for SMTP. The event categories and classes include threats (such as viruses), security risks (such as adware and spyware), content filtering rule violations, network security, spam, and systems management. For more information about interpreting events in the Information Manager and on the event management capabilities of the Information Manager, see the Symantec Security Information Manager documentation. Symantec Mail Security for SMTP can send the following types of events to the Information Manager: Firewall events Definition Update events Message events

51 Integrating Symantec Mail Security with Symantec Security Information Manager Interpreting events in the Information Manager 51 Administration events Note: Although some Information Manager Event IDs are the same for multiple events, the event descriptions and occasionally the severity is different. Firewall events that are sent to the Information Manager Table A-1 lists the firewall events that Symantec Mail Security for SMTP can send to the Information Manager. Table A-1 Event ID (SES_EVENT_<Unique ID>) SES_EVENT_CONNECTION_ACCEPTED (512000) SES_DETAIL_CONNECTION_REJECTED (517242) SES_DETAIL_CONNECTION_REJECTED (517247) Firewall events that are sent to the Information Manager Severity Event class Rule description (Reason sent) Informational symc_firewall_network Connection Permitted Informational symc_firewall_network Connection Rejected Informational symc_firewall_network Connection Deferred Definition Update events that are sent to the Information Manager Table A-2 lists the definition update events that Symantec Mail Security for SMTP can send to the Information Manager. Table A-2 Event ID (SES_EVENT_<Unique ID>) SES_EVENT_VIRUS_DEFINITION_UPDAT E (92004) Definition Update events that are sent to the Information Manager Severity Event class Rule Description (Reason sent) Informational symc_def_update Antivirus definition update SES_EVENT_LIST_UPDATE (92009) Informational symc_def_update Body hash definition update SES_EVENT_LIST_UPDATE (92009) Informational symc_def_update BLRM definition update SES_EVENT_LIST_UPDATE (92009) Informational symc_def_update Spamsig definition update SES_EVENT_LIST_UPDATE (92009) Informational symc_def_update Spamhunter definition update SES_EVENT_LIST_UPDATE (92009) Informational symc_def_update Intsig definition update

52 52 Integrating Symantec Mail Security with Symantec Security Information Manager Interpreting events in the Information Manager Table A-2 Event ID (SES_EVENT_<Unique ID>) Definition Update events that are sent to the Information Manager Severity Event class Rule Description (Reason sent) SES_EVENT_LIST_UPDATE (92009) Informational symc_def_update Permit definition update Message events that are sent to the Information Manager Table A-3 lists the message events that Symantec Mail Security for SMTPcan send to the Information Manager. Table A-3 Event ID (SES_EVENT_<Unique ID>) Message events that are sent to the Information Manager Severity Event class Rule Description (Reason sent) SES_EVENT_VIRUS (122000) Informational symc_data_virus_incident Virus message SES_EVENT_UNSCANNABLE_VIOL ATION (112056) SES_EVENT_MALWARE_CONTENT (122001) SES_EVENT_SPAM_CONTENT (132001) SES_EVENT_GENERIC_CONTENT (132000) SES_EVENT_SENSITIVE_CONTENT _VIOLATION (182000) SES_EVENT_GENERIC_CONTENT (132000) Informational symc_data_incident Unscannable violation Informational symc_data_virus_incident Malware message Informational symc_data_incident Spam message Informational symc_data_incident Suspect Spam message Informational symc_data_incident Content violation message Informational symc_data_incident Encrypted message Administration events that are sent to the Information Manager Table A-4 lists the administration events that Symantec Mail Security for SMTP can send to the Information Manager. Table A-4 Event ID (SES_EVENT_<Unique ID>) SES_EVENT_CONFIGURATION_CHANGE (92008) Administration events that are sent to the Information Manager Severity Event class Rule Description (Reason sent) Informational symc_config_update Registration success

53 Integrating Symantec Mail Security with Symantec Security Information Manager Interpreting events in the Information Manager 53 Table A-4 Event ID (SES_EVENT_<Unique ID>) Administration events that are sent to the Information Manager Severity Event class Rule Description (Reason sent) SES_EVENT_CONFIGURATION_FAILED (92058) Warning symc_config_update Registration failure SES_EVENT_APPLICATION_STOP (92002) Informational symc_base BCC/service stopping SES_EVENT_APPLICATION_START (92001) Informational symc_base BCC/service starting SES_EVENT_HOST_INTRUSION ( ) Informational symc_host_intrusion User login successful SES_EVENT_HOST_INTRUSION ( ) Informational symc_host_intrusion User logout successful SES_EVENT_HOST_INTRUSION ( ) Warning symc_host_intrusion User login failed SES_EVENT_CONFIGURATION_CHANGE (92008) SES_EVENT_CONFIGURATION_CHANGE (92008) Informational symc_config_update Enable/add host Informational symc_config_update Disable/remove host SES_EVENT_HOST_INTRUSION ( ) Minor symc_host_intrusion Prohibited action SES_EVENT_CONFIGURATION_CHANGE (92008) SES_EVENT_CONFIGURATION_CHANGE (92008) Informational symc_config_update Delete all Informational symc_config_update Change group policy SES_EVENT_LIST_UPDATE_FAILED (92059) Minor symc_defupdate Antispam filters old SES_EVENT_VIRUS_DEFINITION_UPDATE_FAI LED (92054) Major symc_defupdate Antivirus filters old SES_EVENT_LIST_UPDATE_FAILED (92059) Critical symc_defupdate Antispam license expired SES_EVENT_VIRUS_DEFINITION_UPDATE_FAI LED (92054) SES_EVENT_CONFIGURATION_CHANGE (92008) SES_EVENT_CONFIGURATION_CHANGE (92008) SES_EVENT_CONFIGURATION_CHANGE (92008) SES_EVENT_CONFIGURATION_CHANGE (92008) Critical symc_defupdate Antivirus license expired Informational symc_config_update Certificate imported Informational symc_config_update Dictionary items imported Informational symc_config_update Sender group members imported Informational symc_config_update Group policy members imported

54 54 Integrating Symantec Mail Security with Symantec Security Information Manager Installing and configuring event logging to the Information Manager Table A-4 Event ID (SES_EVENT_<Unique ID>) SES_EVENT_CONFIGURATION_CHANGE (92008) SES_EVENT_CONFIGURATION_CHANGE (92008) Administration events that are sent to the Information Manager Severity Event class Rule Description (Reason sent) Informational symc_config_update Component is not active Informational symc_config_update Administrator account change SES_EVENT_VIRUS (122000) Major symc_config_update Virus outbreak Installing and configuring event logging to the Information Manager The logging of events to the Information Manager is in addition to, and independent of, the logging of events within the Symantec Mail Security for SMTP logging feature. To configure logging to the Information Manager, you must complete the following steps: Configure the Information Manager to recognize Symantec Mail Security for SMTP For the Information Manager to receive events from Symantec Mail Security for SMTP, you must run the SIP Integration Wizard that is specific to Symantec Mail Security for SMTP. The SIP Integration Wizard installs the appropriate integration components for identifying the individual security product (in this case, Symantec Mail Security for SMTP) to the Information Manager. See Configuring the Information Manager on page 55. Install a local SSIM Agent and Collector on the computer that is running Symantec Mail Security for SMTP The local SSIM Agent and Collector handles the communication between Symantec Mail Security and the Information Manager. See Installing the local SSIM Agent on page 57 and See Installing the Collector on page 58. Configure data sources in the Information Manager Web interface These are the events that the Information Manager will receive and display. You must provide this information so that the Information Manager knows where to look for the event data.

55 Integrating Symantec Mail Security with Symantec Security Information Manager Installing and configuring event logging to the Information Manager 55 Configuring the Information Manager The Symantec Security Information Manager Web configuration interface provides a link that you can use to download and install the SIP Integration Wizard. The wizard installs SSIM Integration Packages (SIPs) for Symantec Mail Security for SMTP. The SIP contains the configuration settings and event schemas that the Information Manager requires to recognize and log events from Symantec Mail Security for SMTP. You must run the SIP Integration Wizard for each Symantec Security Information Manager to which you are forwarding events from Symantec Mail Security for SMTP. To download the SIP Integration Wizard 1 Log onto your SSIM appliance and navigate to the Symantec Security Information Manager configuration page. 2 Click Configure Appliance, and then enter the Information Manager administrator login information. 3 If prompted, type the Log on name, password, and domain, and then click Log On. 4 In the Symantec Security Information Manager console, in the left pane, click Register SIPs. 5 Click Download SIP Integration Wizard. 6 In the File Download dialog box, click Save. 7 Type or browse to the location in which you want to save the Integration Wizard installation file. SIPI.zip is the file that is downloaded. 8 In the Download complete dialog box, click Close. 9 Locate the SIPI.zip file, double-click it, and then unpack the file to the desired folder. Note: You can also use the SIPI.zip file that came on the Symantec Mail Security for SMTP CD. To configure the Information Manager to recognize Symantec Mail Security for SMTP 1 Navigate to the folder where you unpacked the SIPI.zip file and if you are using Windows, double-click setup.jar if you are using Linux or Solaris, type java -jar setup.jar

56 56 Integrating Symantec Mail Security with Symantec Security Information Manager Installing and configuring event logging to the Information Manager The Integration Wizard is displayed. 2 In the Integration Wizard, click Next until you see the Directory Domain Administrator Information panel. 3 In the Directory Domain Administrator Information panel, enter the specific information about the Domain Administrator and the Directory, and then click Next. Directory Domain Administrator Name Directory Domain Administrator Password Enter the name for the Domain Administrator account. This account provides access to its associated administrative domain. Enter the Directory Domain Administrator password. Log on to the domain (in dotted notation) Enthe administrative domain. An example of dotted notation is: NorthAmerica.SES Host Name or IP Address of Directory Do one of the following: If the Information Manager is using default, anonymous SSL communications, enter the IP address of the computer on which the Directory is installed (it may be the same as the Information Manager IP address if they are installed on the same computer). If the Information Manager is using authenticated SSL communications, enter the host name of the Directory computer. To change the IP address, you must use the Information Manager console. For more information about Information Manager defaults, anonymous SSL and upgrading to authenticated SSL, see the Symantec Enterprise Security Architecture Installation Guide. Secure Directory Port Type the number of the Security Directory SSL port (by default, 636). 4 In the Integration Package to Install panel, type or browse to the location in which you saved the Integration Package (datapackage.sip), and then click Next. 5 Click Next and follow the on-screen instructions to install the appropriate Integration Package and complete the SIP Integration Wizard.

57 Integrating Symantec Mail Security with Symantec Security Information Manager Installing and configuring event logging to the Information Manager 57 6 Repeat steps 1 through 5 on each Information Manager appliance to which you are forwarding Symantec Mail Security for SMTP events. Installing the local SSIM Agent The local SSIM Agent handles the communication between Symantec Mail Security and the Information Manager and is installed on the same computer that is running Symantec Mail Security. The local SSIM Agent is provided as part of the software distribution package for Symantec Mail Security for SMTP. When you have more than one SSIM-enabled product installed on a single computer, these products can share a local SSIM Agent. However, each product must register with the SSIM Agent. Thus, even if a SSIM Agent has already been installed on the computer for another SSIM-enabled security product, you must run the installer to register Symantec Mail Security for SMTP. You must install the local SSIM Agent on all computers on which Symantec Mail Security for SMTP is installed. To install the local SSIM Agent on Windows 1 Ensure you are logged into the Symantec Mail Security for SMTP machine on the console or via SSH as an administrative user. 2 Insert the Symantec Mail Security for SMTP product CD in the CD drive. 3 Launch a Command window, navigate to the \Agents\ directory on the product CD, and use the following command: setup.exe [ -debug ] [-log] [-a{prodid}] [-f{filename}] [- s{server}] [-p{port}] [-i{install path}] where -s{server} specifies the hostname or IP of the management server, and -i{install path} specifies the destination path where the SSIM Agent will be installed. If you omit this parameter, the SSIM Agent will be installed in the default folder, which is C:\Program Files\Symantec\SESA\Agent (example: setup.exe -s ) The installer runs and completes. To install the local SSIM Agent on Linux/Solaris 1 Ensure you are logged into the Symantec Mail Security for SMTP machine on the console or via SSH as root. 2 Navigate to the /Agents/ directory on the product CD and copy the Unix.tar.gz file to a temporary directory on the hard drive. 3 After you have copied the file, decompress the SSIM Agent directory using the following commands:

58 58 Integrating Symantec Mail Security with Symantec Security Information Manager Installing and configuring event logging to the Information Manager gunzip Unix.tar.gz tar xvf Unix.tar 4 Navigate to the decompressed AgtInst directory and launch the installation program with the command./install.sh [ -debug ] [-log] [-a{prodid}] [-f{filename}] [- s{server}] [-p{port}] [-i{installpath}] where -s{server} specifies the hostname or IP of the management server, and -i{install path} specifies the destination path where the SSIM Agent will be installed. If you omit this parameter, the SSIM Agent will be installed in the default folder. (example:./install.sh -i/opt/symantec/sesa/agent -s ) The installer runs and completes. Installing the Collector To install the Collector on Windows 1 Ensure that you are logged into the Symantec Mail Security for SMTP machine on the console or via SSH as an administrative user. 2 Insert the Symantec Mail Security for SMTP product CD into the drive and execute the following command from the product CD: \collectors\sms_smtp\install\install.bat You can view the installation logs in installcollector.log in the Information Manager Agent folder. To install the Collector on Linux/Solaris 1 Ensure that you are logged into the Symantec Mail Security for SMTP machine on the console or via SSH as root. 2 Insert the Symantec Mail Security for SMTP product CD into the drive and execute the following command from the product CD: /collectors/sms_smtp/install/install.sh You can view the installation logs in /tmp/collector-install.log Configuring data sources You must configure the following data sources on the Information Manager to receive events from Symantec Mail Security for SMTP. You can add a new sensor for each data source. Once you have configured these sources, you must distribute the configuration to the Collector for it to take effect. For more

59 Integrating Symantec Mail Security with Symantec Security Information Manager Installing and configuring event logging to the Information Manager 59 information, refer to the Symantec Security Information Manager documentation. Note: You must ensure that the Configure as: setting is configured exactly as indicated in the Value column. Table A-5 Setting Type: Settings for Message statistics Value Message stats Path for Linux/Solaris: Path for Windows: Filename: Configure as: /opt/symantec/smssmtp/scanner/stats/ c:\program Files\Symantec\SMSSMTP\scanner\stats\ bmi_eng_stats Monitor in Real Time Table A-6 Setting Type: Settings for Firewall statistics Value Firewall stats Path for Linux/Solaris: Path for Windows: Filename: Configure as: /opt/symantec/smssmtp/scanner/stats c:\program Files\Symantec\SMSSMTP\scanner\stats bmi_fw_stats Monitor in Real Time Table A-7 Setting Type: Settings for Administrative and Definition Update statistics Value Admin and Definition Update stats Path for Linux/Solaris: Path for Windows: Filename: Configure as: /opt/symantec/smssmtp/logs/tomcat/bmi_sesa c:\program Files\ Symantec\SMSSMTP\logs\tomcat\BMI_SESA Brightmail_SESA_Events Dynamic Filename, Monitor in Real Time

60 60 Integrating Symantec Mail Security with Symantec Security Information Manager Uninstalling Information Manager components Uninstalling Information Manager components When Symantec Mail Security for SMTP is no longer forwarding messages to the Information Manager, you can uninstall the Information Manager components. For information on how to uninstall the Integration Package, see the Symantec Security Information Manager documentation. Uninstalling the Collector To uninstall the Information Manager Collector on Windows 1 Ensure that you are logged into the Symantec Mail Security for SMTP machine on the console or via SSH as an administrative user. 2 Insert the Symantec Mail Security for SMTP product CD into the drive and execute the following command from the product CD \collectors\sms_smtp\install\uninstall.bat To uninstall the Collector on Linux/Solaris 1 Ensure that you are logged into the Symantec Mail Security for SMTP machine on the console or via SSH as root. 2 Insert the Symantec Mail Security for SMTP product CD into the drive and ungzip and untar the contents of the Agents/Unix.tar.gz file into the Agent/ folder. 3 Launch the Collector uninstaller with the command./collectors/sms_smtp/install/uninstall.sh Uninstalling the Information Manager Agent To uninstall the local Information Manager Agent on Windows 1 Ensure that you are logged into the Symantec Mail Security for SMTP machine on the console or via SSH as an administrative user. 2 Insert the Symantec Mail Security for SMTP product CD into the drive and execute the following command from the product CD \Agents\setup.exe -u To uninstall the local Information Manager Agent on Linux/Solaris 1 Ensure that you are logged into the Symantec Mail Security for SMTP machine on the console or via SSH as root.

61 Integrating Symantec Mail Security with Symantec Security Information Manager Uninstalling Information Manager components 61 2 Insert the Symantec Mail Security for SMTP product CD into the drive and ungzip and untar the contents of the Agents/Unix.tar.gz file into the Agent/ folder. 3 Navigate to the /Agents directory on the product CD and copy the Unix.tar.gz file to a temporary directory on the hard drive. After you have copied the file, decompress the Information Manager Agent directory using the following commands: gunzip Unix.tar.gz tar xvf Unix.tar 4 Navigate to the decompressed AgtInst directory and launch the uninstaller with the command./install.sh -u To uninstall the Collector SIP file 1 At the command prompt, in the directory from which you ran the SIP Install Wizard, run the following command: java -jar setup.jar -r 2 Follow the onscreen instructions. For more information, see the Symantec Event Collector Integration Guide.

62 62 Integrating Symantec Mail Security with Symantec Security Information Manager Uninstalling Information Manager components

63 Appendix B Sample options file The following is a sample options file for use with the -options command line installation flag. You must edit the contents of this file to replace the default values provided with the values you want to use for your installation. The default values are for Linux/Solaris installations, but you can replace them with the Windows-appropriate values. Other sample options files (with additional features, such as invoking the custom installation scenario), are available on the product CD in the /tools/options_files directory. To call an options file so that its contents are substituted for the answers in the installation procedure: On Linux/Solaris: navigate to the installation directory for your platform and type: sudo./install -silent -options <filename> On Windows: launch a command window, navigate to the Windows installation directory on the product CD and type: setup.bat -silent -options <filename> ################################################################### # # InstallShield Options File # # Wizard name: Install # Wizard source: assembly.dat # Created on: Thu Sep 29 11:12:53 PDT 2005 # Created by: InstallShield Options File Generator # # This file contains values that were specified during a recent # execution of Install. It can be used to configure Install with the # options specified below when the wizard is run with the "-options"

64 64 Sample options file # command line option. Read each setting's documentation for # information on how to change its value. # # A common use of an options file is to run the wizard in silent # mode. This lets the options file author specify wizard settings # without having to run the wizard in graphical or console mode. To # use this options file for silent mode execution, use the following # command line arguments when running the wizard: # # -silent -options "default.txt" # ################################################################### ################################################################### # # Custom Dialog: License # # The initial state of the License panel. The accept and reject # option states are stored as Variables and must be set with -V # -V LICENSE_ACCEPT_BUTTON="true" ################################################################### # # Custom Dialog: License # # The initial state of the License panel. The accept and reject # option states are stored as Variables and must be set with -V # -V LICENSE_REJECT_BUTTON="false" ################################################################### # # Symantec Mail Security for SMTP 5.0 Install Location

65 Sample options file 65 # # The install location of the product. Specify a valid directory # into which the product should be installed. If the directory # contains spaces, enclose it in double-quotes. For example, to # install the product to C:\Program Files\My Product, use # # -P installlocation="c:\program Files\My Product" # -P installlocation="/opt/symantec/smssmtp" ################################################################### # # Custom Dialog: InstallType # # The Installation Type to be used when installing the product. # Stored as a Variable and must be set with -V. # -V IS_SELECTED_INSTALLATION_TYPE=custom ################################################################### # # "Control Center" Feature # # The selection state of the "Control Center" feature. Legal values # are: # # true - Indicates that the feature is selected for installation # false - Indicates that the feature is not selected for # installation # # For example, to select "Control Center" for installation, use # # -P feature1.active=true #

66 66 Sample options file -P feature1.active=true ################################################################### # # "Scanner" Feature # # The selection state of the "Scanner" feature. Legal values are: # # true - Indicates that the feature is selected for installation # false - Indicates that the feature is not selected for # installation # # For example, to select "Scanner" for installation, use # # -P bean32.active=true # -P bean32.active=true ###################################################################

67 Index A administrator address for alerts 32 alerts address to send to 32 Architectural overview 15 C Control Center 13 E events Symantec Security Information Manager 50 F features discontinued from Symantec Mail Security for SMTP name changes 11 new 8 new features 9 Symantec Brightmail Antispam, new or changed features from 12 Symantec Mail Security for SMTP, new or changed features 10 files, importing 44 filters settings 33, 36 settings, default 39 settings, outbound 34, 37 H help 16 I Information Manager uninstall 60 installation Symantec Security Information Manager Agent 57 L local domains initial settings 32 M mail filters. See filters N new features 8 O outbound filters, settings 34, 37 Overview architectural 15 R registration initial, Scanners 36 S Scanners 13 registration, initial 36 set up registration, Scanners, initial 36 settings alert address for administrator 32 default filters 39 filters 33, 36 filters, outbound 34, 37 local domain 32 time 32 SSIM see also Symantec Security Information Manager 49

68 68 Index Symantec Security Information Manager about 49 events 50 install Agent 57 T time settings 32 U uninstall Symantec Security Information Manager 60 UTF-8, importing UTF-8 characters 44

Symantec Mail Security Planning Guide

Symantec Mail Security Planning Guide Symantec Mail Security Planning Guide Syamantec Mail Security Planning Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Mail Security for SMTP. Administration Guide

Symantec Mail Security for SMTP. Administration Guide Symantec Mail Security for SMTP Administration Guide Symantec Mail Security for SMTP Administration Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Mail Security Administration Guide

Symantec Mail Security Administration Guide Symantec Mail Security Administration Guide Symantec Mail Security Administration Guide The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec Mail Security Appliance Version 7.5 Administration Guide

Symantec Mail Security Appliance Version 7.5 Administration Guide Symantec Mail Security Appliance Version 7.5 Administration Guide Symantec Information Foundation 12617000 Symantec Mail Security Appliance Version 7.5 Administration Guide The software described in this

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail

Symantec Messaging Gateway 10.0 Installation Guide. powered by Brightmail Symantec Messaging Gateway 10.0 Installation Guide powered by Brightmail The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector for SNARE for Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Configuring Symantec AntiVirus for NetApp Storage system

Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used

More information

bv-control for Active Directory v8.50 User Guide

bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 bv-control for Active Directory User Guide The software described in this book is furnished under a license agreement

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Mobile Security Manager Administration Guide

Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Symantec Event Collector 4.3 for Cisco PIX Quick Reference

Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used

More information

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Quick Start Guide 7.0 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector for Blue Coat Proxy Quick Reference The software described in this book is furnished under a license agreement

More information

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Symantec Messaging Gateway for Service Providers 10.5. Implementation Guide

Symantec Messaging Gateway for Service Providers 10.5. Implementation Guide Symantec Messaging Gateway for Service Providers 10.5 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Email Quick Reference. Administrator Guide

Email Quick Reference. Administrator Guide Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Symantec Security Information Manager 4.7.4 Administrator Guide

Symantec Security Information Manager 4.7.4 Administrator Guide Symantec Security Information Manager 4.7.4 Administrator Guide Symantec Security Information Manager 4.7.4 Administrator Guide The software described in this book is furnished under a license agreement

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010

Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010 Symantec Mail Security for Microsoft Exchange Server 2007/Server 2010 Implementation Guide Symantec Information Foundation Symantec Mail Security for Microsoft Exchange Implementation Guide The software

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Websense Email Security Transition Guide

Websense Email Security Transition Guide Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011

More information

Symantec Security Information Manager 4.6 Administrator's Guide

Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

GFI Product Manual. Getting Started Guide

GFI Product Manual. Getting Started Guide GFI Product Manual Getting Started Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty

More information

GFI Product Manual. Administration and Configuration Manual

GFI Product Manual. Administration and Configuration Manual GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"

More information

Symantec Security Information Manager 4.5 Administrator's Guide

Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Symantec Security Information Manager 4.5 Installation Guide

Symantec Security Information Manager 4.5 Installation Guide Symantec Security Information Manager 4.5 Installation Guide PN: 10912602 Symantec Security Information Manager 4.5 Installation Guide The software described in this book is furnished under a license agreement

More information

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide Symantec Protection for SharePoint Servers 6.0.4 Getting Started Guide Symantec Protection for SharePoint Servers Getting Started Guide The software described in this book is furnished under a license

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Symantec System Recovery 2011 Management Solution Administrator's Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

How To Use Symantec Mail Security For Windows 7.2.2 (X86) And 7.0 (X64) (X32) (For Windows 7) (Windows 7) And 8.2) (Msmsm

How To Use Symantec Mail Security For Windows 7.2.2 (X86) And 7.0 (X64) (X32) (For Windows 7) (Windows 7) And 8.2) (Msmsm Symantec Mail Security for Microsoft Exchange Server 2013 Implementation Guide v7.0.1 Symantec Mail Security for Microsoft Exchange Implementation Guide The software described in this book is furnished

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for

More information

Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7

Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 The software described

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

Symantec Mail Security for Microsoft Exchange Server 2013

Symantec Mail Security for Microsoft Exchange Server 2013 Symantec Mail Security for Microsoft Exchange Server 2013 Implementation Guide v7.0 Symantec Mail Security for Microsoft Exchange Implementation Guide The software described in this book is furnished under

More information

Symantec AntiVirus Enterprise Edition

Symantec AntiVirus Enterprise Edition Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Installing GFI MailEssentials

Installing GFI MailEssentials Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation

More information

Installing Policy Patrol with Lotus Domino

Installing Policy Patrol with Lotus Domino Policy Patrol 9 technical documentation May 21, 2013 If you have Lotus Domino R5/6/7/8/9 Mail Server, you must install Policy Patrol on a separate Windows 2003/2008/2012 machine and forward your mails

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information