WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
|
|
|
- Sharleen McGee
- 10 years ago
- Views:
Transcription
1 2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group
2 White Paper: Symantec Best Practices Contents Introduction... 4 The challenge of sizing security protection in the enterprise... 4 System design and planning... 5 Architecture... 5 Site Design... 6 Single-site design... 6 Multiple-site design... 7 Distributed... 7 Central Logging... 8 High Availability... 8 Determining Client-to-server Ratios... 9 Client-Server Communication... 9 Communication modes Pull mode Push mode Heartbeat Interval Heartbeat Sizing Example Calculating Content Distribution Time About Group Update Providers About LiveUpdate Servers Application learning and impact to the database Database maintenance settings Logging options Log Size Examples Symantec Manager Hardware Recommendations Database recommendations Database performance enhancement recommendations Database backups... 22
3 Recommended SQL database maintenance Recommended backup plans Backup storage requirement calculation Impact of Content Updates and Installation packages Calculating Total Disk Space Requirements Symantec Network Access Control Enforcer Appliance Throughput Preventing and Correcting False Positive Detections with Symantec 12.x False Positive Prevention Correcting a False-Positive Detection... 29
4 Introduction Symantec provides best-of-breed endpoint security to enterprises of all sizes. Several decisions factor into correctly sizing and deploying the Symantec environment for optimum protection and serviceability. This white paper provides the following information: Detailed recommendations for single- and multiple-site environments Client-to-server ratios Database sizing recommendations Log-keeping and maintenance Please note the following: The architectures, designs, and recommendations provided in this guide are based on metrics from internal testing of the product. These tests are performed in an isolated environment. Implementations in production environments may result in performance metrics that vary from the testing scenarios. These variations can alter the recommended sizing and architecture. This guide references possible changes and modifications to Symantec capability, functions, metrics, and features. These changes are subject to ongoing evaluation and should not be considered as firm commitments by Symantec. The challenge of sizing security protection in the enterprise Successful Symantec configurations and deployments depend on several variables, including the following: The Symantec technologies to be deployed Whether different security policies are needed for users in different locations Whether different policies are needed for desktops, servers, laptops, users, and departments The number of geographic locations within the company The frequency at which content updates are applied Whether Symantec patches should be automatically deployed The desired method of content distribution Whether High Availability infrastructure is present or desired Log retention times 4
5 The frequency of requests for log or reporting data older than one week, one month, and one year Frequently gathered metrics Who and where people are that need access to the data Whether multiple administrative groups exist within the organization (for example, IT, Security, Desktop, Server) Requirements to tie into an existing third-party tool or authentication scheme Knowing how to evaluate these variables is crucial to establishing an effective, efficient, and sustainable endpoint protection solution. System design and planning Effective and efficient endpoint security requires a balance of protection technologies, a manageable infrastructure, and adequate forensic data to properly monitor network security activities. Before the solution is deployed, several decisions need to be made about the best ways to configure the Symantec components for your particular environment. Architecture Symantec contains four main architectural components that work together to protect your company from security threats: Symantec Manager ( SEPM or manager ) The management server that is used to configure clients, reports, and alerts. Symantec SQL Data Store ( database ) The database that stores all configuration, updates, and reporting information. Symantec Client ( client ) Software that is deployed to networked computers. The client is used to monitor policies and automate policy compliance activities. Symantec Center (formerly, the Symantec console) A lightweight user interface that is used to access the Symantec Manager. The Symantec Center is used to manage and view deployment activity, configurations, updates, and Symantec client reports. 5
6 Basic Symantec Architecture Site Design A Symantec site design begins with the choice of the basic site architecture. At the highest level, designs are divided between single-site designs and multiple-site designs. Single-site design 6
7 An organization with one datacenter can generally use a single-site design with the following attributes: Two Symantec Managers (for redundancy and load balancing) Database clustering (to support high availability) Multiple-site design An organization with more than one datacenter or with multiple large physical locations should use a multiple-site design. There are three primary designs for a multiple-site environment: Distributed Central Logging High Availability Distributed The Distributed design is recommended when immediate access to remote site data is not critical. This design has the following attributes: Each site performs bi-directional replication of Groups and Policies. Logs and content are not replicated by default. To view the site reports, administrators use the console to connect to the Symantec Manager at each remote site. 7
8 Central Logging The Central Logging design is recommended when centralized reporting is required. The principal feature of this design is log forwarding to a centralized repository. In the following example, the Corporate Headquarters site is the central repository for logs forwarded from Corporate Sites 1 and 2. High Availability High Availability (HA) designs take advantage of multiple Symantec Manager installations and multiple, clustered databases to provide redundancy, failover, and disaster recovery. Several options are available to optimize performance, fail-over, and recovery. For instance, the HA design can be configured to have client computers automatically switch to an alternate Symantec Manager server should the primary server become unavailable. 8
9 Determining Client-to-server Ratios Deploying Symantec with the proper client-to-server ratio is crucial to providing a high performance endpoint security environment. Chief among the parameters that affect the client-to-server ratio are client-server communication, desired update speeds, and the security technologies deployed in the network environment. Client-Server Communication Symantec clients and managers exchange status information and content data. Clients initiate this communication with the Symantec Manager from an ephemeral port to the Symantec Manager server on TCP port 8014 (or 443 if using SSL). In the event of a conflict, this port is configurable. The frequency of communication depends on the heartbeat (also called "polling interval") and communication configuration. When there are no new client-side logs to upload to the management server, or policy or content to download from the server, the size of the Symantec client heartbeat is between 3KB and 5KB. When all client protection technologies are enabled and the maximum level of client logging is enabled (with the exception of packet-level firewall logging, which is not recommended in production environments), the size of a typical heartbeat is between 200 KB and 300 KB. Symantec clients can be configured to communicate with the Symantec Manager using either push mode or pull mode. For best performance, keep the Symantec database close to the Symantec Manager server, and use pull mode. 9
10 Communication modes Each communication mode has advantages and disadvantages that need to be assessed for each environment. Pull mode In pull mode, the client connects to the manager according to the heartbeat frequency. This procedure repeats indefinitely. The number of clients that can be supported in pull mode depend on the following conditions: Server performance Network bandwidth used for clients Server communication Heartbeat (polling) frequency In general, the less frequent the heartbeat, the more clients a server can support. There is no maximum number of clients that can connect to a particular Management Server. Push mode In push mode, the client establishes a persistent TCP connection to the server. If a client cannot connect to the management server, it retries periodically, depending on the heartbeat frequency. The following conditions apply to push-mode communication: The server notifies the client whenever the server changes status 10
11 Logs are sent from the client to the Symantec Manager server at the heartbeat interval Push mode is more resource intensive than pull mode because of the persistent TCP connection In push mode, the theoretical maximum ratio of clients to Symantec Manager servers is 50,000:1. However, Symantec generally recommends a maximum ratio of 5000:1 for push mode communication. Heartbeat Interval The performance figures provided in tables 1-5 are based on testing performed in a controlled environment using servers with the following specifications and configured as a single site. All times are measured in minutes. Symantec Server CPU: Intel Core 2 Duo E6600, 2.40 GHz Physical Memory (RAM): 4 GB Operating System: Microsoft Windows Server 2008, 64-bit. Microsoft SQL Server CPU: Intel Xeon E GHz (see below for CPU core performance) Physical Memory (RAM): 64GB Operating System: Microsoft Windows Server 2008, 64-bit Database Software: Microsoft SQL Server 2008 Table Clients SQL Server CPU 1 Symantec Manager 2 Symantec Managers Single Core Dual core Quad core x Quad core
12 Table 2-15,000 Clients SQL Server CPU 1 Symantec Manager 2 Symantec Managers 3 Symantec Managers Dual core Quad core x Quad core Table 3-25,000 Clients SQL Server CPU 1 Symantec Manager 2 Symantec Managers 3 Symantec Managers 4 Symantec Managers 5 Symantec Managers Dual core Quad core x Quad core Table 4-50,000 Clients SQL Server CPU 2 Symantec Managers 3 Symantec Managers 4 Symantec Managers 5 Symantec Managers Dual core Quad core x Quad core
13 Table 5-100, 000 Clients SQL Server CPU 2 Symantec Managers 3 Symantec Managers 4 Symantec Managers 5 Symantec Managers Quad core x Quad core Note: The heartbeat intervals listed in the preceding tables do not include the performance overhead introduced by actions such as site-to-site database replication or reporting activity. Other factors such as lower hardware specifications, available network bandwidth, or network congestion can adversely affect performance numbers and will require increasing the heartbeat intervals to achieve the desired performance in your environment. Test data provided in this document is based on performance in a physical environment. Do to the nature of resource allocation in a virtual environment you should added 25-30% more time to your calculation of the heartbeat interval setting. Heartbeat Sizing Example The following examples assume the Symantec Manager specifications shown on page 11: Number of total Clients Number of Symantec Managers SQL Server CPU Shortest recommended heartbeat interval 50,000 2 (25,000 Clients per manager) Dual core (2 CPU) 80 minutes 50,000 2 (25,000 Clients per manager) Quad core (4 CPU) 30 minutes Calculating Content Distribution Time A key metric for provisioning a Symantec environment is the time it takes to distribute content updates to an organization. Content updates can include: Antivirus definitions Intrusion Prevention signatures Symantec engines updates Content updates vary in size and frequency depending upon content types and content update availability. The time required to perform a content distribution update in a best-case scenario can be calculated with the following formula: 13
14 Concurrent Connections X Average Content Size Available Bandwidth = Content Distribution Time*, where Average Content Size = KB *Note that latency is also affected by network utilization and protocol overhead Example Content Distribution Time using 70KB update The example assumes the use of the entire bandwidth Bandwidth Number of Clients Time T1 (1.54 Mbps) , Mbps , Mbps ,000 1 Gbps , Minutes 2 Hours 4 Minutes 14 Minutes 30 Seconds 2 Minutes 3 Seconds 9 Seconds To decrease the time required to distribute content distribution updates, do one or more of the following: Distribute the client load across multiple managers Deploy Group Update Providers Use alternative methods to distribute the content such as LiveUpdate Servers or thirdparty distribution tools 14
15 About Group Update Providers The Group Update Provider (GUP) provides updates to clients belonging to a Group, and any subgroups that are configured to inherit Group policies as set on the Clients tab. If there is a concern of multiple updates occurring across a given connection, then Administrators should consider deploying a GUP. With the release of Symantec MR3, the GUP can support up to 10,000 clients. The performance of the GUP is dictated by the throughput of the hardware for the system that is designated as a GUP. Typically, a client configured as a GUP will require an additional 50MB of disk space to store content updates. This number can vary depending upon the age of the clients connecting for updates, and the size of the delta created to update them. If you need to deploy updates to more than 10,000 nodes, Symantec recommends you consider an alternative update method, such as: Additional GUPs Additional Symantec Managers A Symantec LiveUpdate Server About LiveUpdate Servers Environments that provide content updates to more than 10,000 nodes, but cannot provide an additional Symantec Manager or additional GUPs can use a Symantec LiveUpdate Server. The following graphic depicts an architecture design that uses a LiveUpdate Server to provide content updates: 15
16 This design features a LiveUpdate Server at the Corporate Site (HQ) which redistributes content to LiveUpdate Servers at each remote site. LiveUpdate distribution servers act as simple redistribution points and use HTTP, FTP, or Network Shares to distribute content updates. LiveUpdate Distribution Servers add very little overhead to an existing server, and so have negligible impact on server resources. For a complete list of hardware and software requirements for the Symantec components, see the Installation Guide for Symantec and Network Access Control. Application learning and impact to the database Application Learning allows Symantec (SEP) clients to report information and statistics about the executables that are run on them. This information is provided to the Symantec Manager (SEPM) and aggregated into the SEPM database. The purpose of this information is to build a list of known applications in an environment to create Application-based firewall rules, Host Integrity (HI) rules and can be used as a reference for developing Application Control rules and Centralized Exceptions. 16
17 If left to run indefinitely, the database can grow considerably and eventually slow processing or cause other database problems. For this reason, it is strongly recommended for systems using the embedded database, that application learning is turned off. For more information, see the Symantec Technical Support knowledge base article, Best Practices Guide to Application Learning in Symantec Manager 17
18 Symantec Manager Server and Database Sizing Several factors influence the size of the Symantec database and the storage space required on a Symantec Manager server. These factors include the following variables: Database maintenance settings Log size and expiration timeframes Content update sizes Client installation package sizes Backup information requirements Database maintenance settings Administrators can configure database maintenance options for the data that are stored in the database. Database maintenance options help you to manage the size of your database by specifying compression settings and how long to keep data. Scheduled deletion of events ensures log entries are deleted regularly to prevent your database from growing too large. Event compression consolidates multiple "risk-found" events into a single security event. Over time, and especially during a security event, event compression can help keep the database size within manageable limits. 18
19 Logging options Logging options are configured by the Administrator to optimize storage requirements and comply with company policies that control retention of logged data. The following parameters are commonly used to control logging activity: Maximum number of entries stored in the logs Length of time (days) to store log entries Log Size Examples The following examples illustrate the key factors affecting log size and storage requirements: Log data sizes Log Size per 10,000 log entries (MB) System Admin 10 System Client Server Activity 9 System Enforcer 6 Audit Log 6 System Server Activity 66 19
20 Log Size per 10,000 log entries (MB) Client Activity 45 Security Log 45 Traffic Log 45 Packet 45 Control 45 Enforcer Client 16 Enforcer Server 14 Enforcer Traffic 9 Approximate detected/quarantined virus event sizes Number of viruses in database Approximate space (MB) 1, , , , , The average database requirements for a 17,000 node deployment is roughly 15,000 detected and quarantined virus events every 60 days. Example of log data statistics for a 17,000 node environment* Log System Admin System Client Server Activity Audit Log System Server Activity Client Activity Security Log Avg. events per log 10 events per day per admin 9 events per day per machine Usually very small 650 events per server per day 120 events per machine per day 1 event per day per machine 20
21 Log Traffic Log Packet Control Viruses Avg. events per log 2400 events per machine per day Could be extremely large depending on policies Could be extremely large depending on policies 250 per month per 1000 Clients *Log Metric Data will vary from customer to customer Symantec Manager Hardware Recommendations Hardware requirements vary depending on the number of clients served by the Symantec Manager. Symantec makes the following recommendations for Symantec Manager hardware: Symantec Managers serving less than 10,000 clients: 2GB RAM minimum Single Processor Symantec Managers serving more than 10,000 clients: 4GB RAM minimum Dual Processor Database recommendations For installations with a client-to-server ratio of 5,000 clients or less, using the default log settings, Symantec recommends using the embedded Sybase database. For installations with a client-to-server ratio greater than 5,000 clients, or using a higher level of log settings, Symantec recommends using a separate Microsoft SQL database. For SQL database sizing, Symantec recommends using the database vendor's recommended sizing tools or guides. Database performance enhancement recommendations For added performance, Symantec recommends the following options: Use Microsoft Windows Server 2003 or bit operating system Microsoft SQL Server bit 21
22 High-throughput hard drives with 10,000 RPM or higher drive speed. Install the different Symantec components (manager software, IIS server, and database) on different disk drives Use a SAN environment with a management product such as Symantec Storage Foundation Additional optimization can be obtained for disk I/O performance on the Symantec Manager. Database backups Database backups create a copy of the database. In the event that data corruption or hardware failure occur, the Administrator can revert to a previous copy of a backup to restore lost data. A database backup is created using the Symantec Manager console or by using the Symantec Database Backup and Restore utility. The Symantec Database Backup and Restore utility is automatically installed during the installation of the Symantec Manager server. For more information, see the Administration Guide for Symantec and Symantec Network Access Control. Recommended SQL database maintenance If you use a Microsoft SQL database, Symantec recommends that you periodically defragment and reindex the database. Reindexing can improve performance and ensure an optimal database structure, particularly in large environments. Reindexing and defragmenting should be included as part of the regular database maintenance plan that is described in the Symantec Support Knowledge Base article, Create database maintenance plans in MS SQL Server 2005 using SQL Server Integration Services (SSIS) Recommended backup plans Symantec recommends the following backup plans: Microsoft SQL database only: Use the Microsoft SQL Server Enterprise Manager to set up a maintenance plan that includes automatic backups. Embedded or an MS SQL database: Use the Symantec Manager console to perform on-demand backups and also schedule automatic backups. 22
23 Create backups regularly and store them on a separate disk drive, preferably at a secure off-site facility. Backup storage requirement calculation The size and number of retained backups impact the required disk space on the Symantec Manager server. The backup size is approximately 75% of the database size, multiplied by the number of copies being retained. For instance, 1GB database X 0.75 X 3 Copies = 2.3 GB of disc space. Impact of Content Updates and Installation packages Client update packages, patches, and content updates are also stored in the Symantec database and affect the storage requirements. Product updates and patches contain information for client packages and information for each language or locale. Note that patches also create new, full client builds. Full client builds are approximately 120 MB. Content updates require approximately 300MB each. These updates contain information for the following technologies: Definitions and Eraser Intrusion Prevention Signatures Proactive Threat Scan Engine Proactive Threat Scan White Lists Decomposer Calculating Total Disk Space Requirements The following example scenario shows the space required for a Symantec implementation with 17,000 nodes. This example assumes the following metrics: An average 15,000 viruses over 60 days Retain 20,000 Events for each Log Retain five versions of each Symantec client ( 32/64 Bit, English and French language) Retain seven backups 23
24 Item 15,000 viruses detected/quarantined Space required (MB) ,000 events per log Client versions 2400 Content updates 300 TOTAL Database Size = 4.80 GB* *The database size of 3.43 GB must be multiplied by 1.4 to account for the overhead of indexes and other tables in the database. The space required on the Symantec Manager server to store seven backups is approximately 33.6 GB. A key component of the Symantec Manager server is the Internet Information Server (IIS). IIS content requires approximately 4GB. Symantec Network Access Control Enforcer Appliance Throughput When the Symantec Network Access Control Enforcer Appliance is part of the security environment, use the following values to determine throughput rates: Gateway Enforcer: 25,000 concurrent sessions (1 Gbps throughput) DHCP Enforcer: 50,000 concurrent sessions LAN Enforcer: 10,000 concurrent sessions 24
25 Preventing and Correcting False-Positive Detections with Symantec 12.x Security technology has always had the potential of identifying a good file as bad. Symantec works hard to balance this risk of a false positive versus the need for aggressive detection. Symantec 12.1 adds many features to reduce the risk of a false-positive detections (FPD). Among these are new security technologies that require some machinelearning to avoid false positives. As a result, during the initial testing and implementation of Symantec 12.1, some customers may initially see higher rates of FPD. However, any disruption to the organization due to FPD can be avoided with some simple precautions. Additionally, improvements to the false positive workflow enable a false positive to be corrected quickly and with minimum disruption. Symantec Insight technology uses file reputation data to recognize and block malicous code from running on protected computers. The following table describes the three bands of threshold sensitivity associated with Insight and the use-cases appropriate for each.. Range Description 1-3 Appropriate for scenarios or for test environments that cannot tolerate false positive detections or the conviction of good files that are still building reputation. At these levels, malware that is still building reputation may evade detection, but the system is very unlikely to convict good files. 4-6 Appropriate for most desktop users running normal software. These bands balance false-positive (FP) risk and detection to capture most malware with low FPs. Based on Symantec s experience and understanding of the threat landscape, Level 5 is the appropriate threshold for the majority of the users. Symantec discourages users from changing the value unless advised by Symantec Technical Support personnel. 7-9 Appropriate for highly secure environments where you wish to lockdown a server or desktop that does not frequently install new or unproven software. False-positive detections will occur at this level, but very little malware will evade detection. 25
26 False Positive Prevention Symantec 12.1 will not detect known good files as malware. There are several ways to make sure your good files are known as good. The following steps will help prevent false positives when installing Symantec Step 1 Using Digital Signatures One of the easiest ways to identify that a file is good is to know where it came from and who created it. One of the most important factors in building a positive file reputation is to check its digital signature. Executable files without a digital signature are at risk of being identified as unknown. Custom or home grown application should be digitally signed with class three digital certificates Customers should insist that their software vendors digitally sign their application Step 2 - Add to the Symantec White List Symantec has a growing white list of over 25 million good files. These files are used to test signatures before the signatures are released to the public. The hash values of these files are also stored in the cloud and are used as a real time check to avoid FPD on the Symantec client. White-listing files provides a powerful method to avoid FPD. Customers and vendors can add files to this list. Software vendors: Submit executables for inclusion to the Symantec white list: BCS Customers: Submit system images to the Symantec white list: NOTES: Tools to help simplify the submission of files are available through the white listing program Do not use these web sites to correct a false positive. Instructions to correct a false positive are provided below. Step 3 - Exclude Symantec 12.1 provides multiple methods to exclude good files from detection. Exclusions can be added from within the Symantec Manager console to provide false-positive mitigation on the client. 26
27 Exclude your domain from Insight detections In the Symantec Manager, add exclusions or exceptions for critical files, directories, URLs, and IPs 27
28 A known-good application can appear in the Risk Logs as a false-positive. You can configure log settings to allow the application to be ignored, which prevents it from appearing in the Risk Log. This same functionality is also present in the SONAR Logs. NOTES: You can select more than one application, file, URL, or IP at a time. You can use Trust Web domain to add a Web Domain to the Exceptions policy. For more information, see the Symantec and Symantec Network Access Control Implementation Guide. Step 4 - Test The initial deployment of Symantec 12.1 during testing should include test machines with representative images of the software you run in your environment, including common 3 rd party applications Monitor for potential issues during testing Step 5 - Feedback Each security technology in Symantec 12.1 can collect and send file metadata to Symantec. These submissions are used to identify and mitigate false positives through forensic analysis, heuristic training against collected data sets, and custom and generic white-listing. Enable automated submission of metadata on detections. 28
29 Correcting a False-Positive Detection During the testing, Symantec wants to know about false-positive detections on customer systems: To identify the causes of false-positive detections. To make adjustments to the detection subsystem that reduce the number of future false-positive detections. Step 1 - Submit False positives submissions can be made immediately to Symantec via a web form. For SONAR, Reputation (Download Insight), CloudScan, Canary and any other suspected false positive detection, use: NOTE: It is critical for resolution of false positives that the SHA256 value of the file be included with the submission. 1 During the beta-testing, for false positives caused by antivirus technologies, continue to make submission at Once the submission has been processed and the file is white-listed by Symantec, the quarantine rescan feature will automatically restore files detected as heuristic false-positives. Step 2 - Exclude Symantec 12.1 provides multiple methods to exclude good files from detection. Exclusions can be added from within the Symantec Manager console to provide false-positive mitigation on the client. 1 The hash value of a file is presented in a notice on the client. Third-party tools are also available 29
30 About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Cupertino, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA +1 (408) (800) Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper
Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper Symantec Endpoint Protection Sizing and Scalability Best Practices White Paper Product version: 12.1.5 Documentation
Insight. Security Response. Deployment Best Practices
Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Symantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
Symantec Endpoint Protection
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
AppSense Environment Manager. Enterprise Design Guide
Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...
Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010
W H I T E P A P E R : T E C H N I C A L S E C U R I T Y S O L U T I O N S Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper Updated 7/20/2010 White Paper: Symantec
Hardware/Software Guidelines
There are many things to consider when preparing for a TRAVERSE v11 installation. The number of users, application modules and transactional volume are only a few. Reliable performance of the system is
Symantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Best Practices Guide Revision B. McAfee epolicy Orchestrator 5.1.0 Software
Best Practices Guide Revision B McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
Symantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Ignify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
How To Protect Your Computer From A Malicious Virus
Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,
How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook
SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents
Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control
Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in
Best Practices Guide. McAfee epolicy Orchestrator 5.0.0 Software
Best Practices Guide McAfee epolicy Orchestrator 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
Symantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in
Symantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement
Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through
Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who
Norton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
Client Hardware and Infrastructure Suggested Best Practices
Client Hardware and Infrastructure Suggested Best Practices While it is the responsibility of our Clients to support their hardware and infrastructure, the Pretty Good Practices below are provided for
Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1
Data Sheet Symantec TM Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops,
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc
Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described
Symantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
Symantec Endpoint Protection 12.1.5 Getting Started Guide
Symantec Endpoint Protection 12.1.5 Getting Started Guide Symantec Endpoint Protection Getting Started Guide Product version: 12.1.5 Documentation version: 1 This document was last updated on: September
Identikey Server Performance and Deployment Guide 3.1
Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'
Performance characterization report for Microsoft Hyper-V R2 on HP StorageWorks P4500 SAN storage
Performance characterization report for Microsoft Hyper-V R2 on HP StorageWorks P4500 SAN storage Technical white paper Table of contents Executive summary... 2 Introduction... 2 Test methodology... 3
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
ACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Infor Web UI Sizing and Deployment for a Thin Client Solution
Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
Symantec Backup Exec System Recovery
Symantec Backup Exec System Recovery The Gold Standard in Complete Windows System Recovery Overview 7.0 is a complete, disk-based system recovery solution for Microsoft Windows based servers, desktops,
CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
msuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described
Symantec Workspace Streaming 6.1
Workspace Management: Simplify IT Organizations Data Sheet: Endpoint Virtualization Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops, and
Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide
Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book
Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60
Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
McAfee epolicy Orchestrator
Best Practices Guide McAfee epolicy Orchestrator for use with epolicy Orchestrator versions 4.5.0 and 4.0.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be
Securing the endpoint and your data
#SymVisionEmea #SymVisionEmea Securing the endpoint and your data Piero DePaoli Sr. Director, Product Marketing Marcus Brownell Sr. Regional Product Manager Securing the Endpoint and Your Data 2 Safe harbor
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014
Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on
Managing Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP
Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink
Improving the Customer Support Experience with NetApp Remote Support Agent
NETAPP WHITE PAPER Improving the Customer Support Experience with NetApp Remote Support Agent Ka Wai Leung, NetApp April 2008 WP-7038-0408 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 NETAPP SUPPORT REMOTE
Online Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
Workflow Solutions Data Collection, Data Review and Data Management
Data Collection, Data Review and Data Management Workflow Finding more efficient ways to support patient needs begins with better workflow management. MGC Diagnostics has developed a complete workflow
Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2
Improve Backup Performance by Upgrading to Symantec Backup Exec 12.5 with Service Pack 2 Test Report to Show How Existing Backup Exec Customers Can Improve Backup Performance and Reduce Backup Windows
Minimize the impact of downtime and disruption. Replace time-consuming manual processes with fast, automated recovery.
Protect Against Business Downtime and Disaster with Rapid, Reliable Backup and Recovery Overview Symantec Backup Exec System Recovery 2010 is a simple, cost-effective backup and recovery solution for small
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
INFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
Attix5 Pro Storage Platform
Attix5 Pro Storage Platform V6.0 User Manual Cover for Microsoft Windows Your guide to configuring the Attix5 Pro Storage Platform. SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice and Proprietary
Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Backup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
Citrix XenDesktop Modular Reference Architecture Version 2.0. Prepared by: Worldwide Consulting Solutions
Citrix XenDesktop Modular Reference Architecture Version 2.0 Prepared by: Worldwide Consulting Solutions TABLE OF CONTENTS Overview... 2 Conceptual Architecture... 3 Design Planning... 9 Design Examples...
You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?
QUESTION 1 Your network contains the following: 20 Hyper-V hosts 100 virtual machines 2,000 client computers You need to recommend an update infrastructure design to meet the following requirements: Deploy
WHITE PAPER: ENTERPRISE SOLUTIONS. Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d Agent for Active Directory
WHITE PAPER: ENTERPRISE SOLUTIONS Quick Recovery of Microsoft Active Directory Using Symantec Backup Exec 11d For use with Microsoft Windows 2000 Server and Windows Server 2003 White Paper: Enterprise
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Symantec Backup Exec 2010
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
Netwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Mediasite for the enterprise. Technical planner: TP-05
Mediasite for the enterprise Technical planner: TP-05 2011 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc.
Atempo, Inc. LIVE BACKUP DEPLOYMENT GUIDE PLANNING AND DEPLOYING LIVE BACKUP IN YOUR CORPORATE ENTERPRISE. Author: Amy Gracer,
... Atempo, Inc. LIVE BACKUP DEPLOYMENT GUIDE PLANNING AND DEPLOYING LIVE BACKUP IN YOUR CORPORATE ENTERPRISE Date: May 2011 Author: Amy Gracer, Version: alb.lbdg.333.3 en . Copyright 2006-11 Atempo Inc.
1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
