Symantec Indepth for. Technical Note

Size: px
Start display at page:

Download "Symantec Indepth for. Technical Note"

Transcription

1 Symantec Indepth for Microsoft.NET postinstallation and configuration Technical Note

2 Symantec Indepth for Microsoft.NET postinstallation and configuration Copyright 2006 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Symantec i 3, Symantec Indepth, Symantec Inform, and Symantec Insight are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Microsoft, Microsoft Windows, and Microsoft Excel are registered trademarks of Microsoft Corporation. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THIS DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON- INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID, SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software and commercial computer software documentation as defined in FAR Sections and DFARS Section Symantec Corporation Stevens Creek Blvd. Cupertino, CA Technical support For technical assistance, index.jsp and select phone or support. Use the Knowledge Base search feature to access resources such as TechNotes, product alerts, software downloads, hardware compatibility lists, and our customer notification service.

3 Contents Chapter 1 Symantec Indepth for Microsoft.NET post-installation and configuration Scope... 3 Configuring DLLs, classes, and methods to instrument... 4 Permission settings for a Symantec i 3 installation folder... 5 Changing the activity tracking threshold... 5 Configuring Indepth for Microsoft.NET to monitor SQL Server 2005.NET instances... 7 About Indepth for Microsoft.NET agent ports... 9

4 2 Contents

5 Chapter 1 Symantec Indepth for Microsoft.NET postinstallation and configuration This chapter includes the following topics: Scope Configuring DLLs, classes, and methods to instrument Permission settings for a Symantec i 3 installation folder Changing the activity tracking threshold Configuring Indepth for Microsoft.NET to monitor SQL Server 2005.NET instances About Indepth for Microsoft.NET agent ports Scope The scope of this technical note is to elaborate on and to give examples of the manual action items that need to be performed after adding a new.net instance. The actions are needed to configure the product correctly and to be able see data in the product's user interface.

6 4 Symantec Indepth for Microsoft.NET post-installation and configuration Configuring DLLs, classes, and methods to instrument Configuring DLLs, classes, and methods to instrument You can add the DLLs you wish to monitor using the DLLs dialog box in the Instrumentation Settings menu, as explained in the Indepth for Microsoft.NET Users Guide. But afterwards you must edit the file instrumentation.xml manually to define which classes and methods to instrument. The Indepth for Microsoft.NET activity tracking is based on instrumentation of your application DLLs. This information is configured in the instrumentation.xml file. The way you configure this file (this means which DLLs to instrument and which classes or methods) affect how much information will be tracked and also the overhead of the Indepth for Microsoft.NET activity tracking on your application. The instrumentation.xml file contains many configurable settings, which are explained in the Administration Guide in detail. The following file is an example section of the instrumentation.xml file which configures the instrumentation of the Microsoft Petshop sample Web application: <instance name="aspnetiis5"> <dlls> <dll name="pet*.dll" /><!- instrument all DLLs that start with pet* -!> </dlls> <instrument> <classes> <class> <name>petshop.*</name><!- instrument all classes of which the namespace begins with Petshop -!> <called-method> <methods> <method> <name>*</name><!- instrument all methods in each class -!> </method> </methods> </called-method> </class> </classes> </instrument>.

7 Symantec Indepth for Microsoft.NET post-installation and configuration Permission settings for a Symantec i 3 installation folder 5 Permission settings for a Symantec i 3 installation folder The Indepth for Microsoft.NET hooks that are injected into the monitored.net process, are run under the same user account on which your.net application is running. This user must have full access rights the <i3_root> folder and all its sub-folders. You can change the security settings of the <i3_root> folder with the Windows File Explorer Security tab. Use the following guidelines to find out to which user you need to add permissions: For an ASP.NET instance, the working process user account depends on the IIS configuration:. IIS5 IIS6 The default account is usually ASPNET. Use... to verify under which account the working process aspnet_wp.exe executes. The default account is usually NETWORK SERVICE, but it depends on your application pool settings. Use... to verify under which account(s) the working process w3wp.exe executes, or check the different application pools in the IIS Management Console. If you have several application pools which translate into different Windows users, all these users must be granted full permission to the <i3_root> folder. Changing the activity tracking threshold The Indepth for Microsoft.NET installation pre-configures the activity data tracking threshold and sets it to 50 milliseconds. This means that only methods, service requests, SQL statements, and Web services that have a service time that is equal or greater than 50 milliseconds will be collected. You can change this default value in the ActivityCollector.xml file, located in the <i3_root>/products/dotnet/config folder any time after the installation:

8 6 Symantec Indepth for Microsoft.NET post-installation and configuration Changing the activity tracking threshold <activity-collector-config> <!-- psdn_act_col.exe configuration, configurable per server (default) & per instance --> <aggregator> <topnsql>5</topnsql><!-- Top n SQL statement to monitor --> <sla>5000</sla><!-- Red SLA breach value for top HTTP invocations in msec. --> <nearsla>1000</nearsla><!-- Yellow SLA breach value for top http invocations in msec. --> <insane-rt>300</insane-rt><!-- Long running thread timeout in seconds --> <bit-vector>false</bit-vector> <last-level-bit-vector>false</last-level-bit-vector> </aggregator> <!-- Tracker.dll settings, configurable per server (default) & per instance --> <tracker> <threshold>50</threshold><!-- Threshold in msec for filtering out events before forwarding it to the Collector agent. --> </tracker> </activity-collector-config> Note: The new setting will only take affect after your.net application is restarted. For ASP.NET that means an IIS reset or recycling the application pool. Note: This setting has a significant affect on the overall overhead of Indepth for Microsoft.NET agent on your system. Lowering this value too much can cause your Web application and server to slow down considerably. If Indepth for Microsoft.NET is installed on a development server, you can set this value to 0 to collect all data. On heavy loaded production systems, it is advisable not to change the default. More information about controlling the Indepth for Microsoft.NET overhead on your.net application in the Symantec i 3 Administration guide.

9 Symantec Indepth for Microsoft.NET post-installation and configuration Configuring Indepth for Microsoft.NET to monitor SQL Server 2005.NET instances 7 Configuring Indepth for Microsoft.NET to monitor SQL Server 2005.NET instances SQL Server 2005 has built-in capabilities that allows you to run stored procedures or functions written in.net. The SQL Server 2005 executable contains a.net Framework 2.0 CLR that is in charge of this task. The.NET stored procedures or functions are compiled with Visual Studio 2005 into assemblies (DLLs) and deployed in one or more databases of the SQL Server 2005 instance. When deploying an assembly in the database, either using the SQL Server 2005 Management Studio or using the SQL command CREATE ASSEMBLY, you must specify the security permissions of the DLL. This can be one of the following: SAFE, EXTERNAL, or UNSAFE. Figure 1-1 shows an example of an assembly named mysqlcode.dll that is deployed in the SQL Server 2005 database, using Management Studio: Figure 1-1 New Assembly

10 8 Symantec Indepth for Microsoft.NET post-installation and configuration Configuring Indepth for Microsoft.NET to monitor SQL Server 2005.NET instances After adding a SQL Server 2005 instance to Indepth for Microsoft.NET, you can add the DLL names (hosted in SQL Server 2005) you wish to monitor with Indepth for Microsoft.NET in the instrumentation.xml file using the DLL Instrumentation Settings dialog box in the Indepth for Microsoft.NET user interface (as you would for any other DLL). Indepth for Microsoft.NET is only capable of monitoring.net activity in SQL Server 2005 if its permission is set to UNSAFE. Trying to monitor a DLL that was deployed with type SAFE or EXTERNAL may result in a security exception that your.net code raises when invoked inside SQL Server To minimize the risk of adding a DLL for instrumentation that is not of type UNSAFE, you must specify the permission type of the DLL you wish to instrument. This must be done manually in the instrumentation.xml file. For example, adding mysqlcode.dll to the instrumentation.xml file requires the following line to be present: <instance name="sqlserver2005" tracker="trackersql"> <dlls> <dll name="mysqlcode.dll" permission="unsafe"/> </dlls> The permission="unsafe" should be added manually to the instrumentation.xml file using a text editor. Without adding this, the Indepth for Microsoft.NET will not be able to monitor your stored procedure.net assembly. Note that the Indepth for Microsoft.NET Collector tracking agent must be installed on each database where an instrumented DLL exist. For example, the mysqlcode.dll is deployed in master and tempdb databases. When installing the Indepth for Microsoft.NET SQL Server 2005.NET instance, you must specify both databases in the databases selection screen. If you are unsure where mysqlcode.dll is deployed, you can specify all databases of the SQL Server 2005 instance that need to be monitored and installed with the Indepth for Microsoft.NET tracking agent.

11 Symantec Indepth for Microsoft.NET post-installation and configuration About Indepth for Microsoft.NET agent ports 9 About Indepth for Microsoft.NET agent ports The Indepth for Microsoft.NET data collection is based on establishing a TCP connection between a tracking module (tracker.dll), the activity collector agent and instrumentation agent. The default port numbers for the installation are respectively and If any of these port numbers are in use by another application on the server, you can change its value respectively in the collector.xml and instrumenter.xml files. Port conflicts can cause the Indepth for Microsoft.NET Collector agent not to work and to submit errors. The following is an error example that can appear in the dotnet.collector.activity.trc file: ======================================== ID : CONFIG Time : :03: GMT+02 i3 Time : :03: GMT Process : psdn_dncol_act.exe -l (ID:2704) Logger : com.symantec.apm.i4dotnet.collector.activity Msg : Exception in remoting : System.Net.Sockets.SocketException: Only one usage of each socket address (protocol/network address/port) is normally permitted ======================================== The following is an error example that can appear in the dotnet.collector.dncol_isntr.trc file: ======================================== ID : CONFIG Time : :09: GMT+02 i3 Time : :09: GMT Process : psdn_dncol_instr.exe (ID:4972) Logger : com.symantec.apm.i4dotnet.collector.dncol_instr Msg : Unable to setup TCP server on port 20756, check that it is not used by another process, ex=only one usage of each socket address (protocol/network address/port) is normally permitted ========================================

12 10 Symantec Indepth for Microsoft.NET post-installation and configuration About Indepth for Microsoft.NET agent ports

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows Symantec Enterprise Vault Technical Note Administering the Monitoring database Windows December 2006 Symantec Enterprise Vault Administering the Monitoring database Copyright 2006 Symantec Corporation.

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

Symantec Enterprise Vault Technical Note. Troubleshooting the Monitoring database and agents. Windows

Symantec Enterprise Vault Technical Note. Troubleshooting the Monitoring database and agents. Windows Symantec Enterprise Vault Technical Note Troubleshooting the Monitoring database and agents Windows December 2006 Symantec Enterprise Vault Troubleshooting the Monitoring database and agents Copyright

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Enterprise Vault Technical Note. Troubleshooting Operations Manager. Windows

Symantec Enterprise Vault Technical Note. Troubleshooting Operations Manager. Windows Symantec Enterprise Vault Technical Note Troubleshooting Operations Manager Windows December 2006 Symantec Enterprise Vault Troubleshooting Operations Manager Copyright 2006 Symantec Corporation. All rights

More information

Symantec Enterprise Vault Technical Note. Backing up Enterprise Vault in a clustered environment. Windows

Symantec Enterprise Vault Technical Note. Backing up Enterprise Vault in a clustered environment. Windows Symantec Enterprise Vault Technical Note Backing up Enterprise Vault in a clustered environment Windows December 2006 Symantec Enterprise Vault Backing up Enterprise Vault in a clustered environment Copyright

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Wise Package Studio 8.0 MR1 Release Notes

Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Using Backup Exec System Recovery's Offsite Copy for disaster recovery

Using Backup Exec System Recovery's Offsite Copy for disaster recovery Using Backup Exec System Recovery's Offsite Copy for disaster recovery The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

CA Nimsoft Monitor. Probe Guide for IIS Server Monitoring. iis v1.5 series

CA Nimsoft Monitor. Probe Guide for IIS Server Monitoring. iis v1.5 series CA Nimsoft Monitor Probe Guide for IIS Server Monitoring iis v1.5 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide

Symantec Protection for SharePoint Servers 6.0.4. Getting Started Guide Symantec Protection for SharePoint Servers 6.0.4 Getting Started Guide Symantec Protection for SharePoint Servers Getting Started Guide The software described in this book is furnished under a license

More information

Configuring Microsoft Internet Information Service (IIS6 & IIS7)

Configuring Microsoft Internet Information Service (IIS6 & IIS7) Configuring Microsoft Internet Information Service (IIS6 & IIS7) Configuring Microsoft Internet Information Service (IIS6 & IIS7) Guide Last revised: June 25, 2012 Copyright 2012 Nexent Innovations Inc.

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud: Microsoft Exchange Managed Folder Archiving Guide The software described in this book is furnished under

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

TD MOBILE. Guide to Publishing Applications. Product Version 1.2

TD MOBILE. Guide to Publishing Applications. Product Version 1.2 TD MOBILE Guide to Publishing Applications Product Version 1.2 TD Mobile : Guide to Publishing Applications, Product Version 1.2 The software described in this book is furnished under a license agreement

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003, Windows Server 2008 5.1 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Veritas Cluster Server Application Note: Disaster Recovery for Microsoft

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Enabling Windows Management Instrumentation Guide

Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for IIS Server Monitoring iis v1.5 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Symantec Enterprise Security Manager 6.5.3 Agent for Linux PPC 64 Release Notes

Symantec Enterprise Security Manager 6.5.3 Agent for Linux PPC 64 Release Notes Symantec Enterprise Security Manager 6.5.3 Agent for Linux PPC 64 Release Notes Symantec Enterprise Security Manager 6.5.3 Agent for Linux PPC 64 Release Notes The software described in this book is furnished

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide

Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide The software described in this book is furnished under a license

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series CA Nimsoft Monitor Probe Guide for Active Directory Server ad_server v1.4 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

Symantec Backup Exec Management Plug-in for VMware User's Guide

Symantec Backup Exec Management Plug-in for VMware User's Guide Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Symantec Mail Security for Microsoft Exchange

Symantec Mail Security for Microsoft Exchange Symantec Mail Security for Microsoft Exchange Getting Started Guide v7.0.2 Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes

Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes The software described in this book is furnished under a license

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Veritas CommandCentral Disaster Recovery Advisor Release Notes 5.1

Veritas CommandCentral Disaster Recovery Advisor Release Notes 5.1 Veritas CommandCentral Disaster Recovery Advisor Release Notes 5.1 Veritas CommandCentral Disaster Recovery Advisor Release Notes Copyright 2009 Symantec Corporation. All rights reserved. Product version:

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Norton Small Business. Getting Started Guide

Norton Small Business. Getting Started Guide Norton Small Business Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright 2015

More information

Quick Start Guide for Symantec Event Collector for ForeScout CounterACT

Quick Start Guide for Symantec Event Collector for ForeScout CounterACT Quick Start Guide for Symantec Event Collector for ForeScout CounterACT Quick Start Guide for Symantec Event Collector for ForeScout CounterACT The software described in this book is furnished under a

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Microsoft SQL Server 2014. Installation Guide

Microsoft SQL Server 2014. Installation Guide Microsoft SQL Server 2014 Installation Guide Notices 2015 XMPie Inc. All rights reserved. U.S. Patents 6948115, 7406194, 7548338, 7757169 and pending patents. JP Patent 4406364B and pending patents. Microsoft

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished

More information

TEAM DEVELOPER. Your First.NET/WPF Application. Product Version 6.3

TEAM DEVELOPER. Your First.NET/WPF Application. Product Version 6.3 TEAM DEVELOPER Your First.NET/WPF Application Product Version 6.3 Team Developer : Your First.NET/WPF Application, Product Version 6.3 The software described in this book is furnished under a license agreement

More information

Symantec ESM Agent For IBM iseries AS/400

Symantec ESM Agent For IBM iseries AS/400 Symantec ESM Agent For IBM iseries AS/400 Version 6.5 Release Notes Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec Enterprise Security

More information

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Windows Release 6.5 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Copyright 2002-2007 Symantec Corporation.

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

CA Nimsoft Monitor. Probe Guide for NT Event Log Monitor. ntevl v3.8 series

CA Nimsoft Monitor. Probe Guide for NT Event Log Monitor. ntevl v3.8 series CA Nimsoft Monitor Probe Guide for NT Event Log Monitor ntevl v3.8 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and

More information

Test Center Enterprise. ios Device Onboarding Guide

Test Center Enterprise. ios Device Onboarding Guide Test Center Enterprise ios Device Onboarding Guide Copyright Copyright 2012 Keynote DeviceAnywhere. All Rights Reserved. March 2012. Notice 2012 Keynote DeviceAnywhere. All rights reserved. THE INFORMATION

More information

Policy Based Encryption Essentials. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Email Compression for Enterprise Version 1.0 Published: 2015-12-09 SWD-20151209151544215 Contents What is BlackBerry Email Compression for Enterprise?...

More information

Symantec Endpoint Encryption Device Control Release Notes

Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control 8.2.0 www.symantec.com About Symantec Endpoint Encryption Device Control Symantec Endpoint Encryption

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec ApplicationHA agent for Internet Information Services Configuration Guide Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Web Security Firewall Setup. Administrator Guide

Web Security Firewall Setup. Administrator Guide Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for

More information

Installing Sage ACT! 2013 for New Users

Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 2 New features

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information