PGP NetShare FlexResponse Plug-In for Data Loss Prevention

Size: px
Start display at page:

Download "PGP NetShare FlexResponse Plug-In for Data Loss Prevention"

Transcription

1 PGP NetShare FlexResponse Plug-In for Data Loss Prevention Implementation Guide 10.2

2

3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version Last updated: April Legal Notice Copyright (c) 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, PGP, Pretty Good Privacy, and the PGP logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED"AS IS"AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , et seq. Commercial Computer Software and Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA Symantec Home Page ( Printed in the United States of America

4

5 Contents Introducing the PGP NetShare FlexResponse Plug-In Overview Audience and Scope Installing the PGP NetShare FlexResponse Plug-In Requirements How to Install the PGP NetShare FlexResponse Plug-In Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention Configuration Steps Summary Uninstalling the PGP NetShare FlexResponse Plug-In

6

7 1 Introducing the PGP NetShare FlexResponse Plug-In The PGP NetShare FlexResponse Plug-In for Data Loss Prevention automatically encrypts sensitive files without end-user intervention. In This Chapter Overview... 1 Audience and Scope... 1 Overview The PGP NetShare FlexResponse Plug-In for Data Loss Prevention integrates the detection and enforcement capabilities of Symantec Data Loss Prevention with the encryption features of PGP NetShare. The integrated products interact as follows: 1 The Symantec Data Loss Prevention administrator defines organizational policies with rules that define file sensitivity and responsive actions. Sensitive files can be in transit (downloaded from or uploaded to the network by a user, or copied, moved, or saved on a user's computer) or stored locally on a user's computer. 2 Symantec Data Loss Prevention determines that a file conforms to the Symantec Data Loss Prevention detection rule. 3 Symantec Data Loss Prevention performs the action specified in its response rule, which is to execute the PGP NetShare FlexResponse Plug-In. 4 The PGP NetShare FlexResponse Plug-In attempts to encrypt the file with the provided encryption credentials: The file is encrypted if the keys provided can be resolved locally or by connecting with the PGP Universal Server, if necessary. The file is not encrypted if the encryption keys cannot be resolved. Audience and Scope This guide is written for the Symantec Data Loss Prevention administrator. The administrator configures the Symantec Data Loss Prevention product to work with PGP NetShare by defining policies, detection rules, and response rules that include actions, conditions, and parameters.

8 2 Introducing the PGP NetShare FlexResponse Plug-In Audience and Scope Detailed information on how to use the Symantec Data Loss Prevention product can be found in these documents: Symantec Data Loss Prevention Installation Guide for Windows, version 11.1 or 11.5 Symantec Data Loss Prevention Administration Guide, version 11.1 or 11.5 A large part of the administrator's job is to define parameters that consist of roles (the level of accessibility to the encrypted file) and their associated encryption credentials. Even if the Symantec Data Loss Prevention administrator is not also the PGP administrator, the Data Loss Prevention administrator must understand the key concepts and terminology used in the PGP products, to effectively define Symantec Data Loss Prevention policies and rules. PGP product information can be found in these documents: PGP Universal Server Installation Guide, version PGP Universal Server Administrator s Guide, version PGP Desktop for Windows User s Guide, version PGP NetShare Quick Start Guide, version The scope of this guide is to define only the areas where the two products intersect. This guide contains a summary of the steps required for policy and rule configuration. A section with definitions and best practices explains the advantages for choosing specific settings; a table lists the syntax for entering response rule parameters.

9 2 Installing the PGP NetShare FlexResponse Plug-In This section provides information on the requirements and installation procedure. The products may be installed in any sequence. In This Chapter Requirements... 3 How to Install the PGP NetShare FlexResponse Plug-In... 4 Requirements Required Products Before the PGP NetShare FlexResponse Plug-In can be used, the following products must be purchased and installed. Table 2.1 Required Products, Versions, and Product Components Product Name Version Components PGP Universal Server PGP Desktop for Windows With licensed PGP NetShare running in a PGP Universal Server managedusers environment Symantec Data Loss Prevention Endpoint Prevent Symantec Data Loss Prevention Standard 11.1.x, 11.5.x 11.1.x, 11.5.x Enforce Server Endpoint Server Endpoint Agents Additional Component Before you begin, make sure you have the following additional component. If you don t have it, contact your sales representative. Table 2.2 Required Additional Component Component Name Endpoint FlexResponse utility File Name flrinst.exe

10 4 Installing the PGP NetShare FlexResponse Plug-In How to Install the PGP NetShare FlexResponse Plug-In How to Install the PGP NetShare FlexResponse Plug-In To install the PGP NetShare FlexResponse Plug-In, complete the following steps, shown in summary form below. Start by reviewing the steps, then go to the appropriate guide for details: For step 1, refer to the Symantec Data Loss Prevention Installation Guide. For steps 2 and 3, refer to the Symantec Data Loss Prevention Administration Guide. For step 4, refer to one or more of these guides: PGP Universal Server Administrator s Guide PGP Desktop for Windows User s Guide PGP NetShare Quick Start Guide To install the PGP NetShare FlexResponse Plug-In 1 Install a Symantec DLP Agent on each endpoint. 2 Locate the folder in which the Symantec DLP Agent was installed. By default, the path is C:\Program Files\Manufacturer\Endpoint Agent\. 3 Place the Endpoint FlexResponse utility (flrinst.exe) in the Symantec DLP Agent installation directory. 4 Make sure PGP Desktop for Windows, version , is installed in this directory: C:\Program Files\PGP Corporation\PGP Desktop\. The settings should support: The PGP NetShare feature enabled Server Key Mode, where the PGP Universal Server manages the encryption keys Managed users, where PGP Desktop software settings and policies are preconfigured by the PGP administrator The PGP NetShare FlexResponse Plug-In (nsplugin_flexresponse.zip) is located in the PGP Desktop installation directory. 5 (optional) Copy the PGP NetShare FlexResponse Plug-In to the Symantec DLP Agent installation directory. 6 With administrator privileges, navigate to the flrinst.exe file, using either a command prompt window or a batch script. 7 From your command prompt or batch script, issue the following command: flrinst.exe -op=install -package=[path\]nsplugin_flexresponse.zip -p=<password> The path is needed if the ZIP file resides in a location other than the Symantec DLP Agent installation directory. Note: The -p command is required if you are using Data Loss Prevention version or later.

11 Installing the PGP NetShare FlexResponse Plug-In How to Install the PGP NetShare FlexResponse Plug-In 5 8 Remove the flrinst.exe file from the endpoint. Tip: The removal of the Endpoint FlexResponse utility is a best practice to prevent end users from tampering with and circumventing Symantec Data Loss Prevention endpoint security policies.

12

13 3 Configuring the PGP NetShare FlexResponse Plug-In No configuration of the PGP NetShare product is required in order to work with the PGP NetShare FlexResponse Plug-In. When PGP Desktop for Windows, version , is installed on a client, the PGP NetShare FlexResponse Plug-In is in the installation folder. Once you deploy the PGP NetShare FlexResponse Plug-In, the integration is complete and ready for you to configure Symantec Data Loss Prevention. In This Chapter Configuring Symantec Data Loss Prevention... 7 Configuring Symantec Data Loss Prevention You must configure Symantec Data Loss Prevention to work with the PGP NetShare Flex Response Plug-In, using the console on Symantec Data Loss Prevention Endpoint Protect or Symantec Data Loss Prevention Standard. You will be setting policies and detection rules, and defining response rules that specify conditions, actions, and parameters. Review the steps in Configuration Steps Summary (on page 7). These high-level steps specify any field values required or recommended for the PGP NetShare integrated functionality; however, you must refer to the Symantec Data Loss Prevention Administration Guide for details on using the server console interface. Configuration Steps Summary To configure Data Loss Prevention 1 Enable Endpoint FlexResponse. 2 Configure the DLP Agent. To do this, under System-->Agents-->Agent Configuration, for Agent Monitoring: Under Destinations, select Local Drive. Under Network Shares, select Copy to local drive and Copy to share. 3 Create or edit a policy and then add a detection rule to the policy that identifies the files that should be encrypted. Note: The PGP administrator may identify for PGP NetShare the files for which encryption is prevented (blacklisted) or forced (whitelisted). If you identify files for detection that are also on a blacklist or whitelist, the precedence for encryption/non-encryption is: 1) blacklist, 2) Data Loss Prevention detection rule, 3) whitelist. For details on blacklists and whitelists, refer to the PGP Universal Server Administrator s Guide.

14 8 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention 4 Create and Configure a Response Rule: Define Conditions, Actions, and Parameters. For the rule type, select Automated Response. 5 Examples of how to set the Conditions follow: For data in transit, set the Conditions like this: Select Protocol or Endpoint Monitoring. Select Is Any Of. Select Endpoint Copy to Network Share and Endpoint Local Drive. For stored data, set the Conditions like this: Select Incident Type. Select Is Any Of. Select Discover. For data in transit as well as stored data, set the Conditions like this: Select Protocol or Endpoint Monitoring. Select Is None Of. Select Removable Storage Endpoint Device. Note: Another option is that if you have only one FlexResponse Plug-In, do not set any Conditions. Data in transit is monitored and stored data is discovered. Be sure to specify Actions and Parameters, however. 6 Set the Actions. To do this: For the action type, choose Endpoint FlexResponse, then click Add Action. In the Python Plugin box, type nsplugin_flexresponse. When you enter the plug-in name, ensure that your entry is all lowercase and does not include the file name extension. For example, if the plug-in file name is nsplugin_flexresponse.zip, remove the.zip file extension. 7 Define one or more Parameters. Each encryption Key/Value pair constitutes one parameter. The key(s) are used by the PGP NetShare FlexResponse Plug-In to encrypt the PGP NetShare symmetric key of a file identified by a Data Loss Prevention policy as sensitive. Before defining Key/Value pairs, read the definition of terms and best practices by referring to Understanding Parameters: Key/Value Pairs (on page 9). When you are ready to enter them, refer to Setting Parameters: Key/Value Pairs (on page 9) for proper syntax. Add one or more Key/Value pair parameters. Note: The Key/Value pairs are not validated against the PGP Universal Server keys when added; they are validated/resolved at the time of attempted encryption. 8 Save the rule, give it a meaningful name and optional useful description. 9 Add the response rule to the policy.

15 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention 9 Note: Once data is encrypted by the NetShare Flex Response Plug-In in accord with the current policy, if that policy is modified (that is, the encryption access control list changes), the files that are already encrypted will not be modified to use the new policy. Only newly encrypted files will be affected. Refer to Best Practices for Setting Key/Value Pairs (on page 11) for the recommendation to use Group Keys in addition to a local_user to encrypt files. This practice will help you address access changes to previously encrypted files. Understanding Parameters: Key/Value Pairs For each Response Rule parameter, you define a user role, identified as Key in the Data Loss Prevention console interface, coupled with encryption credentials, identified as Value. (Note that the Data Loss Prevention console s fields Key/Value correspond to PGP NetShare s concepts of Role/Key.) Key/Value pairs allow you: To define the role (access relationship) you would like a user or group to have to a sensitive file, and To specify the encryption credentials of one or more users or groups who would have such access. Roles ("Key" field) The three types of roles you can assign to users in the Key field are described below briefly. For an in-depth explanation of these roles, refer to the PGP Desktop for Windows User s Guide. Admin The owner of the protected file. The Admin can add and remove users to the Access Control List. The Admin has full read/write access to the protected file. A file must have an Admin. There can be only one Admin. Group Admin An administrator of the protected file. The Group Admin can add and remove users. There can be multiple Group Admins. A Group Admin has full read/write access to the protected file. User One of a potential set of users allowed access to the protected file. Although the file is encrypted to a user s key, the user cannot decrypt the file. A User has full read/write access to the protected file. Setting Parameters: Key/Value Pairs The following table lists the syntax and behavior of Key/Value pairs. For additional information, see Best Practices for Setting Key/Value Pairs (on page 11).

16 10 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention Table 3.1: Key/Value Pairs: Syntax and Behavior Key Value Behavior admin A single key, or multiple keys, separated by semicolons* One key value is used to encrypt. If multiple keys are specified: Keys are scanned left to right. The first key resolved is used. If Value is not specified, the configuration is invalid. If Value is specified but cannot be resolved, encryption fails. Role granted: admin This parameter is required. group_admin 1 through n keys, separated by semicolons* If multiple keys are specified: All resolved key values are used. If one or more keys cannot be resolved, the remaining resolved keys are used. If the group_admin key is not resolved, it is ignored. Role granted: group admin This parameter is optional. user 1 through n keys, separated by semicolons* If multiple keys are specified: All resolved key values are used. If one or more keys cannot be resolved, the remaining resolved keys are used. If the user key is not resolved, it is ignored. Role granted: user This parameter is optional. discovery_key 1 through n keys, separated by semicolons This key is required for stored data discovery. This list of keys will be substituted for local_user value, if local_user is specified in Value for admin, group_admin, or user. Role granted: Assumes the role of admin, group admin, or user, depending on where the substitution occurs. *Value can be the literal local_user ; the Key ID or Key Name for an end user, a group, or Additional Decryption Key (ADK); and/or an exported Public Key. (For more information on using public keys, see How to Export a Public Key (on page 12).) When used for data-in-transit monitoring, local_user resolves to the key of the authenticated Windows user logged in to the system where the PGP NetShare FlexResponse Plug-In is executing the encryption. When used for stored data discovery, local_user resolves to the discovery_key. When specifying an ADK for discovering stored files, add the ADK Key ID as part of the discovery_key.

17 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention 11 Best Practices for Setting Key/Value Pairs For a detailed description of all key concepts, see the PGP Universal Server Administrator s Guide and the PGP Desktop for Windows User s Guide. Best practices recommended as you set the Key/Value pair Response Rule parameters follow: For the majority of your data-in-transit parameters, simply define one Key/Value pair as admin=local_user. The benefits of using this configuration are: Allowing the user of the data to continue to have access while protecting the data from those who do not require access, Executing encryption quickly: a local user is by definition logged on to Windows on the endpoint computer. Their credentials are cached and readily available for encryption. No overhead or time delay is involved trying to connect to the PGP Universal Server to resolve the key. An alternative way to configure your data-in-transit parameters is to define two Key/Value pairs: admin=local_user and user=<group_key public key>. In this scenario, a sensitive file is made available not only to the primary owner, but also to multiple users who have a common need. Using a group key not only simplifies data entry in the Value field, but it provides a method to change the existing access list for an encrypted file. To change the list of users that a file is encrypted to, have the PGP administrator change the membership of that group. The next time the file is touched, it is re-encrypted to the new access list. Using a public key enables you or the PGP administrator to export the public-key portion of a public/private key pair and paste it directly into the parameter s Value field. By providing this explicit value to the PGP NetShare FlexResponse Plug-In, no overhead or time delay is involved trying to connect to the PGP Universal Server to resolve the key for encryption. To see how to export a public key, see How to Export a Public Key (on page 12). If you do specify individual user keys, be as precise with Key Names as possible to avoid incorrect key resolution. A better option is to use Key ID (or address), which is always unique. For a policy targeted at discovering sensitive stored data, defining two Key/Value pairs is recommended: admin=local_user and discovery_key=<group_key public key>. The discovery_key provides a list of users and/or groups whose credentials will be used to encrypt stored data. If the local user is not available, the discovery_key credentials are substituted so that encryption can proceed. Consider specifying an Additional Decryption Key (ADK) in the Value field, in addition to a Group Key or individual keys, or as part of the discovery_key. Using an ADK provides a key that is at the company level and that an administrator can use to decrypt a file, especially if an employee is unavailable or has left the company.

18 12 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention How to Export a Public Key A public key is half of a public/private encryption key pair. It digitally identifies a user or group with the portion of the encryption key intended for wide distribution. To export a public key 1 Access the PGP Universal Server administrative interface (or ask the PGP administrator to do so). 2 From this console, navigate to Keys > Managed Keys. 3 From the list of Managed Keys, identify the key in which you are interested and click Export. 4 In the Export Key dialog box, select Export Public Key. 5 Select Export simple character string format. This option removes newline characters. 6 Click Export and save it as a text file to a desired location. You can now copy and paste the text into the Value field of a Key/Value pair parameter.

19 4 Uninstalling the PGP NetShare FlexResponse Plug-In To uninstall the PGP NetShare FlexResponse Plug-In, complete the following steps. Review the following summary of steps, then refer to the Symantec Data Loss Prevention Administration Guide for details. To uninstall the PGP NetShare FlexResponse Plug-In 1 Locate the folder in which the Symantec DLP Agent was installed. By default, the path is C:\Program Files\Manufacturer\Endpoint Agent\. 2 Place the Endpoint FlexResponse utility (flrinst.exe) in the same directory. 3 Navigate to the flrinst.exe file, using either a command prompt window or batch script. 4 With administrator privileges, from your command prompt window or batch script, issue the following command: flrinst.exe -op=uninstall -package=nsplugin_flexresponse.zip -p=<password> Note: The -p command is required if you are using Data Loss Prevention version or later. 5 Remove the flrinst.exe file from the endpoint.

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1. Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.0) Release Notes Express Security Content Update for Microsoft Windows Server 2008

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes

Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3 Release Notes Express Security Content Update for JBoss Enterprise Application Platform 6.3

More information

PGP Viewer for ios. User s Guide 1.0

PGP Viewer for ios. User s Guide 1.0 PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:

More information

Symantec PGP Viewer for ios

Symantec PGP Viewer for ios Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.

More information

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017 VIP Credential Development Kit Release Notes Version 2.0.8 May 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important information about the Symantec

More information

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide Veritas Desktop and Laptop Option Mobile Application Getting Started Disclaimer Contents The software described in this document is furnished under a license agreement and may be used only in accordance

More information

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017 VIP Credential Development Kit Release Notes Version 2.0.7 January 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important and late-breaking information

More information

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started Symantec Cloud Workload Protection on AWS Marketplace Buyer's Guide for Getting Started The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

PGP Viewer for ios. Administrator s Guide 1.0

PGP Viewer for ios. Administrator s Guide 1.0 PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

Symantec Protection Center Getting Started Guide. Version 2.0

Symantec Protection Center Getting Started Guide. Version 2.0 Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide Symantec Mail Security for Microsoft Exchange 7.9 Guide Symantec Mail Security for Microsoft Exchange Guide The software described in this book is furnished under a license agreement and may be used only

More information

Veritas Desktop Agent for Mac Getting Started Guide

Veritas Desktop Agent for Mac Getting Started Guide Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement

More information

Veritas Desktop and Laptop Option Mac Getting Started Guide

Veritas Desktop and Laptop Option Mac Getting Started Guide Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later Versions of FSA Agent and 2007 or later : Versions of FSA Agent and Last updated: 2018-04-05. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo,, Compliance

More information

Altiris Client Management Suite 7.1 from Symantec User Guide

Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service

More information

Veritas Desktop and Laptop Option 9.2

Veritas Desktop and Laptop Option 9.2 1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Symantec Enterprise Security Manager Modules for Oracle Release Notes

Symantec Enterprise Security Manager Modules for Oracle Release Notes Symantec Enterprise Security Manager Modules for Oracle Release Notes Release 5.0 for Symantec ESM 9.0 and 10.0 For Red Hat Enterprise Linux, HP-UX, AIX, Solaris, and Windows Symantec Enterprise Security

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Veritas Backup Exec Quick Installation Guide

Veritas Backup Exec Quick Installation Guide Veritas Backup Exec Quick Installation Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Enterprise Vault.cloud Journaling Guide

Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas

More information

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:

More information

Patch Assessment Content Update Getting Started Guide for CCS 12.0

Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished

More information

Veritas CommandCentral Enterprise Reporter Release Notes

Veritas CommandCentral Enterprise Reporter Release Notes Veritas CommandCentral Enterprise Reporter Release Notes for Microsoft Windows and Solaris 5.2 RU3 February 2012 CommandCentral Enterprise Reporter Release Notes The software described in this book is

More information

Veritas Data Insight Software Compatibility List 6.1.1

Veritas Data Insight Software Compatibility List 6.1.1 Veritas Data Insight Software Compatibility List 6.1.1 Documentation version: 6.1.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks

More information

Symantec Workflow 7.1 MP1 Release Notes

Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal

More information

Veritas SaaS Backup for Office 365

Veritas SaaS Backup for Office 365 Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Veritas NetBackup for Microsoft SQL Server Administrator's Guide

Veritas NetBackup for Microsoft SQL Server Administrator's Guide Veritas NetBackup for Microsoft SQL Server Administrator's Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft SQL Server Administrator's Guide Last updated: 2018-04-10 Document version:netbackup

More information

Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013

Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013 Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013 Windows 7.1 April 2016 Storage Foundation and High Availability Solutions HA and

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Veritas Data Insight 6.1 Software Compatibility List 6.1

Veritas Data Insight 6.1 Software Compatibility List 6.1 Veritas Data Insight 6.1 Software Compatibility List 6.1 November 2017 Documentation version: 6.1.0 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Veritas ediscovery Platform

Veritas ediscovery Platform Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license

More information

Symantec pcanywhere 12.5 SP4 Release Notes

Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2018-02-16 Document version:netbackup

More information

Veritas Backup Exec Migration Assistant

Veritas Backup Exec Migration Assistant Veritas Backup Exec Migration Assistant Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

Clearwell ediscovery Platform

Clearwell ediscovery Platform Clearwell ediscovery Platform Utility Node Guide 7.1.2 Fix Pack 2 Clearwell ediscovery Platform : Utility Node Guide The software described in this book is furnished under a license agreement and may be

More information

Altiris IT Analytics Solution 7.1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

More information

Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x

Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license

More information

Symantec Drive Encryption Evaluation Guide

Symantec Drive Encryption Evaluation Guide Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a

More information

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later

Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator 12.2 or later Enterprise Vault : Migrating Data Using the Microsoft Azure Blob Storage Migrator Last updated: 2018-04-12.

More information

Dell PowerVault DL Backup to Disk Appliance and. Storage Provisioning Option

Dell PowerVault DL Backup to Disk Appliance and. Storage Provisioning Option Dell PowerVault DL Backup to Disk Appliance and the Symantec Backup Exec Storage Provisioning Option The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only

More information

Enterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator

Enterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator Enterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator 12 Enterprise Vault : Using SQL Database Roles in Enterprise Vault, Compliance Accelerator,

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide The software described in this book is furnished under

More information

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows VCS Library Management Pack Veritas Cluster Server Library Management Pack Guide for Microsoft

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

Veritas ediscovery Platform

Veritas ediscovery Platform Veritas ediscovery Platform Release Notes 9.0.1 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 9.0.1 The software described in this book is furnished under a license agreement and may

More information

Enterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3

Enterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3 Enterprise Vault.cloud Archive Migrator Guide Archive Migrator versions 1.2 and 1.3 Enterprise Vault.cloud: Archive Migrator Guide Last updated: 2018-01-09. Legal Notice Copyright 2018 Veritas Technologies

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software

More information

Veritas Deployment Manager User's Guide

Veritas Deployment Manager User's Guide Veritas Deployment Manager User's Guide Last updated: 2017-10-03 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10 Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this

More information

Veritas SaaS Backup for Salesforce

Veritas SaaS Backup for Salesforce Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights

More information

Veritas NetBackup Plug-in for VMware vsphere Web Client Guide. Release 8.1.1

Veritas NetBackup Plug-in for VMware vsphere Web Client Guide. Release 8.1.1 Veritas NetBackup Plug-in for VMware vsphere Web Client Guide Release 8.1.1 Veritas NetBackup Plug-in for VMware vsphere Web Client Guide Last updated: 2018-02-16 Document version:netbackup 8.1.1 Legal

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Migrating Enterprise Vault to 64-bit hardware 9.0 Symantec Enterprise Vault: Migrating Enterprise Vault to 64-bit hardware The software described in this book is

More information

Enterprise Vault Requesting and Applying an SSL Certificate and later

Enterprise Vault Requesting and Applying an SSL Certificate and later Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018 Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018 Symantec Endpoint Protection Mobile - Admin Guide Documentation version: 3.0 This document was last updated on: August 21, 2017 Legal Notice

More information

Veritas Enterprise Vault Guide for Mac OS X Users 12.2

Veritas Enterprise Vault Guide for Mac OS X Users 12.2 Veritas Enterprise Vault Guide for Mac OS X Users 12.2 Veritas Enterprise Vault: Guide for Mac OS X Users Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.

More information

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

Veritas System Recovery 18 Linux Edition: Quick Installation Guide Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-12-03. Legal

More information

IM: Symantec Security Information Manager Patch 4 Resolved Issues

IM: Symantec Security Information Manager Patch 4 Resolved Issues IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement

More information

Veritas NetBackup for SQLite Administrator's Guide

Veritas NetBackup for SQLite Administrator's Guide Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the

More information

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Application Note: High Availability

More information

Symantec Information Centric Analytics Symantec ICT Integration Guide. Version 6.5

Symantec Information Centric Analytics Symantec ICT Integration Guide. Version 6.5 Symantec Information Centric Analytics Symantec ICT Integration Guide Version 6.5 Symantec ICA Symantec ICT Integration Guide, powered by Bay Dynamics Product version 6.5 Documentation version: 1 This

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

Veritas NetBackup Vault Operator's Guide

Veritas NetBackup Vault Operator's Guide Veritas NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 8.1.1 Veritas NetBackup Vault Operator's Guide Last updated: 2018-09-19 Document version: NetBackup 8.1 Legal Notice Copyright

More information

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017

More information

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Enterprise Vault Guide for Outlook Users

Enterprise Vault Guide for Outlook Users Enterprise Vault Guide for Outlook Users (Full Functionality) 12.3 Enterprise Vault : Guide for Outlook Users Last updated: 2018-03-29. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights

More information

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.0 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2016-11-07 Legal Notice

More information

Security Content Update Release Notes for CCS 12.x

Security Content Update Release Notes for CCS 12.x Security Content Update 2018-1 Release Notes for CCS 12.x SCU 2018-1 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,

More information

User Guide. We protect more people from more online threats than anyone in the world.

User Guide. We protect more people from more online threats than anyone in the world. User Guide We protect more people from more online threats than anyone in the world. Care for our Environment, It's the right thing to do. Symantec has removed the cover from this manual to reduce the

More information

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris Cluster Server 7.3.1 Generic Application Agent Configuration Guide - AIX, Linux, Solaris Last updated: 2017-11-04 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and

More information

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO Veritas Desktop and Laptop Option 9.2 High Availability (HA) with DLO 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used

More information