PGP NetShare FlexResponse Plug-In for Data Loss Prevention
|
|
- Martina Russell
- 6 years ago
- Views:
Transcription
1 PGP NetShare FlexResponse Plug-In for Data Loss Prevention Implementation Guide 10.2
2
3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version Last updated: April Legal Notice Copyright (c) 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, PGP, Pretty Good Privacy, and the PGP logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED"AS IS"AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , et seq. Commercial Computer Software and Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA Symantec Home Page ( Printed in the United States of America
4
5 Contents Introducing the PGP NetShare FlexResponse Plug-In Overview Audience and Scope Installing the PGP NetShare FlexResponse Plug-In Requirements How to Install the PGP NetShare FlexResponse Plug-In Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention Configuration Steps Summary Uninstalling the PGP NetShare FlexResponse Plug-In
6
7 1 Introducing the PGP NetShare FlexResponse Plug-In The PGP NetShare FlexResponse Plug-In for Data Loss Prevention automatically encrypts sensitive files without end-user intervention. In This Chapter Overview... 1 Audience and Scope... 1 Overview The PGP NetShare FlexResponse Plug-In for Data Loss Prevention integrates the detection and enforcement capabilities of Symantec Data Loss Prevention with the encryption features of PGP NetShare. The integrated products interact as follows: 1 The Symantec Data Loss Prevention administrator defines organizational policies with rules that define file sensitivity and responsive actions. Sensitive files can be in transit (downloaded from or uploaded to the network by a user, or copied, moved, or saved on a user's computer) or stored locally on a user's computer. 2 Symantec Data Loss Prevention determines that a file conforms to the Symantec Data Loss Prevention detection rule. 3 Symantec Data Loss Prevention performs the action specified in its response rule, which is to execute the PGP NetShare FlexResponse Plug-In. 4 The PGP NetShare FlexResponse Plug-In attempts to encrypt the file with the provided encryption credentials: The file is encrypted if the keys provided can be resolved locally or by connecting with the PGP Universal Server, if necessary. The file is not encrypted if the encryption keys cannot be resolved. Audience and Scope This guide is written for the Symantec Data Loss Prevention administrator. The administrator configures the Symantec Data Loss Prevention product to work with PGP NetShare by defining policies, detection rules, and response rules that include actions, conditions, and parameters.
8 2 Introducing the PGP NetShare FlexResponse Plug-In Audience and Scope Detailed information on how to use the Symantec Data Loss Prevention product can be found in these documents: Symantec Data Loss Prevention Installation Guide for Windows, version 11.1 or 11.5 Symantec Data Loss Prevention Administration Guide, version 11.1 or 11.5 A large part of the administrator's job is to define parameters that consist of roles (the level of accessibility to the encrypted file) and their associated encryption credentials. Even if the Symantec Data Loss Prevention administrator is not also the PGP administrator, the Data Loss Prevention administrator must understand the key concepts and terminology used in the PGP products, to effectively define Symantec Data Loss Prevention policies and rules. PGP product information can be found in these documents: PGP Universal Server Installation Guide, version PGP Universal Server Administrator s Guide, version PGP Desktop for Windows User s Guide, version PGP NetShare Quick Start Guide, version The scope of this guide is to define only the areas where the two products intersect. This guide contains a summary of the steps required for policy and rule configuration. A section with definitions and best practices explains the advantages for choosing specific settings; a table lists the syntax for entering response rule parameters.
9 2 Installing the PGP NetShare FlexResponse Plug-In This section provides information on the requirements and installation procedure. The products may be installed in any sequence. In This Chapter Requirements... 3 How to Install the PGP NetShare FlexResponse Plug-In... 4 Requirements Required Products Before the PGP NetShare FlexResponse Plug-In can be used, the following products must be purchased and installed. Table 2.1 Required Products, Versions, and Product Components Product Name Version Components PGP Universal Server PGP Desktop for Windows With licensed PGP NetShare running in a PGP Universal Server managedusers environment Symantec Data Loss Prevention Endpoint Prevent Symantec Data Loss Prevention Standard 11.1.x, 11.5.x 11.1.x, 11.5.x Enforce Server Endpoint Server Endpoint Agents Additional Component Before you begin, make sure you have the following additional component. If you don t have it, contact your sales representative. Table 2.2 Required Additional Component Component Name Endpoint FlexResponse utility File Name flrinst.exe
10 4 Installing the PGP NetShare FlexResponse Plug-In How to Install the PGP NetShare FlexResponse Plug-In How to Install the PGP NetShare FlexResponse Plug-In To install the PGP NetShare FlexResponse Plug-In, complete the following steps, shown in summary form below. Start by reviewing the steps, then go to the appropriate guide for details: For step 1, refer to the Symantec Data Loss Prevention Installation Guide. For steps 2 and 3, refer to the Symantec Data Loss Prevention Administration Guide. For step 4, refer to one or more of these guides: PGP Universal Server Administrator s Guide PGP Desktop for Windows User s Guide PGP NetShare Quick Start Guide To install the PGP NetShare FlexResponse Plug-In 1 Install a Symantec DLP Agent on each endpoint. 2 Locate the folder in which the Symantec DLP Agent was installed. By default, the path is C:\Program Files\Manufacturer\Endpoint Agent\. 3 Place the Endpoint FlexResponse utility (flrinst.exe) in the Symantec DLP Agent installation directory. 4 Make sure PGP Desktop for Windows, version , is installed in this directory: C:\Program Files\PGP Corporation\PGP Desktop\. The settings should support: The PGP NetShare feature enabled Server Key Mode, where the PGP Universal Server manages the encryption keys Managed users, where PGP Desktop software settings and policies are preconfigured by the PGP administrator The PGP NetShare FlexResponse Plug-In (nsplugin_flexresponse.zip) is located in the PGP Desktop installation directory. 5 (optional) Copy the PGP NetShare FlexResponse Plug-In to the Symantec DLP Agent installation directory. 6 With administrator privileges, navigate to the flrinst.exe file, using either a command prompt window or a batch script. 7 From your command prompt or batch script, issue the following command: flrinst.exe -op=install -package=[path\]nsplugin_flexresponse.zip -p=<password> The path is needed if the ZIP file resides in a location other than the Symantec DLP Agent installation directory. Note: The -p command is required if you are using Data Loss Prevention version or later.
11 Installing the PGP NetShare FlexResponse Plug-In How to Install the PGP NetShare FlexResponse Plug-In 5 8 Remove the flrinst.exe file from the endpoint. Tip: The removal of the Endpoint FlexResponse utility is a best practice to prevent end users from tampering with and circumventing Symantec Data Loss Prevention endpoint security policies.
12
13 3 Configuring the PGP NetShare FlexResponse Plug-In No configuration of the PGP NetShare product is required in order to work with the PGP NetShare FlexResponse Plug-In. When PGP Desktop for Windows, version , is installed on a client, the PGP NetShare FlexResponse Plug-In is in the installation folder. Once you deploy the PGP NetShare FlexResponse Plug-In, the integration is complete and ready for you to configure Symantec Data Loss Prevention. In This Chapter Configuring Symantec Data Loss Prevention... 7 Configuring Symantec Data Loss Prevention You must configure Symantec Data Loss Prevention to work with the PGP NetShare Flex Response Plug-In, using the console on Symantec Data Loss Prevention Endpoint Protect or Symantec Data Loss Prevention Standard. You will be setting policies and detection rules, and defining response rules that specify conditions, actions, and parameters. Review the steps in Configuration Steps Summary (on page 7). These high-level steps specify any field values required or recommended for the PGP NetShare integrated functionality; however, you must refer to the Symantec Data Loss Prevention Administration Guide for details on using the server console interface. Configuration Steps Summary To configure Data Loss Prevention 1 Enable Endpoint FlexResponse. 2 Configure the DLP Agent. To do this, under System-->Agents-->Agent Configuration, for Agent Monitoring: Under Destinations, select Local Drive. Under Network Shares, select Copy to local drive and Copy to share. 3 Create or edit a policy and then add a detection rule to the policy that identifies the files that should be encrypted. Note: The PGP administrator may identify for PGP NetShare the files for which encryption is prevented (blacklisted) or forced (whitelisted). If you identify files for detection that are also on a blacklist or whitelist, the precedence for encryption/non-encryption is: 1) blacklist, 2) Data Loss Prevention detection rule, 3) whitelist. For details on blacklists and whitelists, refer to the PGP Universal Server Administrator s Guide.
14 8 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention 4 Create and Configure a Response Rule: Define Conditions, Actions, and Parameters. For the rule type, select Automated Response. 5 Examples of how to set the Conditions follow: For data in transit, set the Conditions like this: Select Protocol or Endpoint Monitoring. Select Is Any Of. Select Endpoint Copy to Network Share and Endpoint Local Drive. For stored data, set the Conditions like this: Select Incident Type. Select Is Any Of. Select Discover. For data in transit as well as stored data, set the Conditions like this: Select Protocol or Endpoint Monitoring. Select Is None Of. Select Removable Storage Endpoint Device. Note: Another option is that if you have only one FlexResponse Plug-In, do not set any Conditions. Data in transit is monitored and stored data is discovered. Be sure to specify Actions and Parameters, however. 6 Set the Actions. To do this: For the action type, choose Endpoint FlexResponse, then click Add Action. In the Python Plugin box, type nsplugin_flexresponse. When you enter the plug-in name, ensure that your entry is all lowercase and does not include the file name extension. For example, if the plug-in file name is nsplugin_flexresponse.zip, remove the.zip file extension. 7 Define one or more Parameters. Each encryption Key/Value pair constitutes one parameter. The key(s) are used by the PGP NetShare FlexResponse Plug-In to encrypt the PGP NetShare symmetric key of a file identified by a Data Loss Prevention policy as sensitive. Before defining Key/Value pairs, read the definition of terms and best practices by referring to Understanding Parameters: Key/Value Pairs (on page 9). When you are ready to enter them, refer to Setting Parameters: Key/Value Pairs (on page 9) for proper syntax. Add one or more Key/Value pair parameters. Note: The Key/Value pairs are not validated against the PGP Universal Server keys when added; they are validated/resolved at the time of attempted encryption. 8 Save the rule, give it a meaningful name and optional useful description. 9 Add the response rule to the policy.
15 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention 9 Note: Once data is encrypted by the NetShare Flex Response Plug-In in accord with the current policy, if that policy is modified (that is, the encryption access control list changes), the files that are already encrypted will not be modified to use the new policy. Only newly encrypted files will be affected. Refer to Best Practices for Setting Key/Value Pairs (on page 11) for the recommendation to use Group Keys in addition to a local_user to encrypt files. This practice will help you address access changes to previously encrypted files. Understanding Parameters: Key/Value Pairs For each Response Rule parameter, you define a user role, identified as Key in the Data Loss Prevention console interface, coupled with encryption credentials, identified as Value. (Note that the Data Loss Prevention console s fields Key/Value correspond to PGP NetShare s concepts of Role/Key.) Key/Value pairs allow you: To define the role (access relationship) you would like a user or group to have to a sensitive file, and To specify the encryption credentials of one or more users or groups who would have such access. Roles ("Key" field) The three types of roles you can assign to users in the Key field are described below briefly. For an in-depth explanation of these roles, refer to the PGP Desktop for Windows User s Guide. Admin The owner of the protected file. The Admin can add and remove users to the Access Control List. The Admin has full read/write access to the protected file. A file must have an Admin. There can be only one Admin. Group Admin An administrator of the protected file. The Group Admin can add and remove users. There can be multiple Group Admins. A Group Admin has full read/write access to the protected file. User One of a potential set of users allowed access to the protected file. Although the file is encrypted to a user s key, the user cannot decrypt the file. A User has full read/write access to the protected file. Setting Parameters: Key/Value Pairs The following table lists the syntax and behavior of Key/Value pairs. For additional information, see Best Practices for Setting Key/Value Pairs (on page 11).
16 10 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention Table 3.1: Key/Value Pairs: Syntax and Behavior Key Value Behavior admin A single key, or multiple keys, separated by semicolons* One key value is used to encrypt. If multiple keys are specified: Keys are scanned left to right. The first key resolved is used. If Value is not specified, the configuration is invalid. If Value is specified but cannot be resolved, encryption fails. Role granted: admin This parameter is required. group_admin 1 through n keys, separated by semicolons* If multiple keys are specified: All resolved key values are used. If one or more keys cannot be resolved, the remaining resolved keys are used. If the group_admin key is not resolved, it is ignored. Role granted: group admin This parameter is optional. user 1 through n keys, separated by semicolons* If multiple keys are specified: All resolved key values are used. If one or more keys cannot be resolved, the remaining resolved keys are used. If the user key is not resolved, it is ignored. Role granted: user This parameter is optional. discovery_key 1 through n keys, separated by semicolons This key is required for stored data discovery. This list of keys will be substituted for local_user value, if local_user is specified in Value for admin, group_admin, or user. Role granted: Assumes the role of admin, group admin, or user, depending on where the substitution occurs. *Value can be the literal local_user ; the Key ID or Key Name for an end user, a group, or Additional Decryption Key (ADK); and/or an exported Public Key. (For more information on using public keys, see How to Export a Public Key (on page 12).) When used for data-in-transit monitoring, local_user resolves to the key of the authenticated Windows user logged in to the system where the PGP NetShare FlexResponse Plug-In is executing the encryption. When used for stored data discovery, local_user resolves to the discovery_key. When specifying an ADK for discovering stored files, add the ADK Key ID as part of the discovery_key.
17 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention 11 Best Practices for Setting Key/Value Pairs For a detailed description of all key concepts, see the PGP Universal Server Administrator s Guide and the PGP Desktop for Windows User s Guide. Best practices recommended as you set the Key/Value pair Response Rule parameters follow: For the majority of your data-in-transit parameters, simply define one Key/Value pair as admin=local_user. The benefits of using this configuration are: Allowing the user of the data to continue to have access while protecting the data from those who do not require access, Executing encryption quickly: a local user is by definition logged on to Windows on the endpoint computer. Their credentials are cached and readily available for encryption. No overhead or time delay is involved trying to connect to the PGP Universal Server to resolve the key. An alternative way to configure your data-in-transit parameters is to define two Key/Value pairs: admin=local_user and user=<group_key public key>. In this scenario, a sensitive file is made available not only to the primary owner, but also to multiple users who have a common need. Using a group key not only simplifies data entry in the Value field, but it provides a method to change the existing access list for an encrypted file. To change the list of users that a file is encrypted to, have the PGP administrator change the membership of that group. The next time the file is touched, it is re-encrypted to the new access list. Using a public key enables you or the PGP administrator to export the public-key portion of a public/private key pair and paste it directly into the parameter s Value field. By providing this explicit value to the PGP NetShare FlexResponse Plug-In, no overhead or time delay is involved trying to connect to the PGP Universal Server to resolve the key for encryption. To see how to export a public key, see How to Export a Public Key (on page 12). If you do specify individual user keys, be as precise with Key Names as possible to avoid incorrect key resolution. A better option is to use Key ID (or address), which is always unique. For a policy targeted at discovering sensitive stored data, defining two Key/Value pairs is recommended: admin=local_user and discovery_key=<group_key public key>. The discovery_key provides a list of users and/or groups whose credentials will be used to encrypt stored data. If the local user is not available, the discovery_key credentials are substituted so that encryption can proceed. Consider specifying an Additional Decryption Key (ADK) in the Value field, in addition to a Group Key or individual keys, or as part of the discovery_key. Using an ADK provides a key that is at the company level and that an administrator can use to decrypt a file, especially if an employee is unavailable or has left the company.
18 12 Configuring the PGP NetShare FlexResponse Plug-In Configuring Symantec Data Loss Prevention How to Export a Public Key A public key is half of a public/private encryption key pair. It digitally identifies a user or group with the portion of the encryption key intended for wide distribution. To export a public key 1 Access the PGP Universal Server administrative interface (or ask the PGP administrator to do so). 2 From this console, navigate to Keys > Managed Keys. 3 From the list of Managed Keys, identify the key in which you are interested and click Export. 4 In the Export Key dialog box, select Export Public Key. 5 Select Export simple character string format. This option removes newline characters. 6 Click Export and save it as a text file to a desired location. You can now copy and paste the text into the Value field of a Key/Value pair parameter.
19 4 Uninstalling the PGP NetShare FlexResponse Plug-In To uninstall the PGP NetShare FlexResponse Plug-In, complete the following steps. Review the following summary of steps, then refer to the Symantec Data Loss Prevention Administration Guide for details. To uninstall the PGP NetShare FlexResponse Plug-In 1 Locate the folder in which the Symantec DLP Agent was installed. By default, the path is C:\Program Files\Manufacturer\Endpoint Agent\. 2 Place the Endpoint FlexResponse utility (flrinst.exe) in the same directory. 3 Navigate to the flrinst.exe file, using either a command prompt window or batch script. 4 With administrator privileges, from your command prompt window or batch script, issue the following command: flrinst.exe -op=uninstall -package=nsplugin_flexresponse.zip -p=<password> Note: The -p command is required if you are using Data Loss Prevention version or later. 5 Remove the flrinst.exe file from the endpoint.
Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility
Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationSymantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.
Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.0) Release Notes Express Security Content Update for Microsoft Windows Server 2008
More informationSymantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide
Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationSymantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes
Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3 Release Notes Express Security Content Update for JBoss Enterprise Application Platform 6.3
More informationPGP Viewer for ios. User s Guide 1.0
PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:
More informationSymantec PGP Viewer for ios
Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.
More informationVeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide
VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished
More informationPartner Information. Integration Overview. Remote Access Integration Architecture
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise
More informationSymantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017
VIP Credential Development Kit Release Notes Version 2.0.8 May 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important information about the Symantec
More informationVeritas Desktop and Laptop Option Mobile Application Getting Started Guide
Veritas Desktop and Laptop Option Mobile Application Getting Started Disclaimer Contents The software described in this document is furnished under a license agreement and may be used only in accordance
More informationSymantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017
VIP Credential Development Kit Release Notes Version 2.0.7 January 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important and late-breaking information
More informationSymantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started
Symantec Cloud Workload Protection on AWS Marketplace Buyer's Guide for Getting Started The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationPGP Viewer for ios. Administrator s Guide 1.0
PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.
More informationPartner Information. Integration Overview Authentication Methods Supported
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security
More informationSymantec Protection Center Getting Started Guide. Version 2.0
Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationSymantec ediscovery Platform
Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished
More informationAltiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes
Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is
More informationSymantec Ghost Solution Suite Web Console - Getting Started Guide
Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationSymantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide
Symantec Mail Security for Microsoft Exchange 7.9 Guide Symantec Mail Security for Microsoft Exchange Guide The software described in this book is furnished under a license agreement and may be used only
More informationVeritas Desktop Agent for Mac Getting Started Guide
Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation
More informationVeritas System Recovery 18 Management Solution Administrator's Guide
Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement
More informationVeritas Desktop and Laptop Option Mac Getting Started Guide
Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationEnterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later
Versions of FSA Agent and 2007 or later : Versions of FSA Agent and Last updated: 2018-04-05. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo,, Compliance
More informationAltiris Client Management Suite 7.1 from Symantec User Guide
Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
More informationVeritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)
Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service
More informationVeritas Desktop and Laptop Option 9.2
1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.
More informationVeritas System Recovery 16 Management Solution Administrator's Guide
Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationSymantec Enterprise Security Manager Modules for Oracle Release Notes
Symantec Enterprise Security Manager Modules for Oracle Release Notes Release 5.0 for Symantec ESM 9.0 and 10.0 For Red Hat Enterprise Linux, HP-UX, AIX, Solaris, and Windows Symantec Enterprise Security
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationVeritas Backup Exec Quick Installation Guide
Veritas Backup Exec Quick Installation Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement
More informationEnterprise Vault.cloud Journaling Guide
Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas
More informationSymantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide
Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:
More informationPatch Assessment Content Update Getting Started Guide for CCS 12.0
Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license agreement and may
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App
Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished
More informationVeritas CommandCentral Enterprise Reporter Release Notes
Veritas CommandCentral Enterprise Reporter Release Notes for Microsoft Windows and Solaris 5.2 RU3 February 2012 CommandCentral Enterprise Reporter Release Notes The software described in this book is
More informationVeritas Data Insight Software Compatibility List 6.1.1
Veritas Data Insight Software Compatibility List 6.1.1 Documentation version: 6.1.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks
More informationSymantec Workflow 7.1 MP1 Release Notes
Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationSymantec Workflow Solution 7.1 MP1 Installation and Configuration Guide
Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement
More informationEnterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later
Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal
More informationVeritas SaaS Backup for Office 365
Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationVeritas NetBackup for Microsoft SQL Server Administrator's Guide
Veritas NetBackup for Microsoft SQL Server Administrator's Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft SQL Server Administrator's Guide Last updated: 2018-04-10 Document version:netbackup
More informationStorage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013
Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013 Windows 7.1 April 2016 Storage Foundation and High Availability Solutions HA and
More informationAltiris Software Management Solution 7.1 from Symantec User Guide
Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationVeritas Data Insight 6.1 Software Compatibility List 6.1
Veritas Data Insight 6.1 Software Compatibility List 6.1 November 2017 Documentation version: 6.1.0 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationVeritas ediscovery Platform
Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license
More informationSymantec pcanywhere 12.5 SP4 Release Notes
Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationVeritas NetBackup for Microsoft Exchange Server Administrator s Guide
Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2018-02-16 Document version:netbackup
More informationVeritas Backup Exec Migration Assistant
Veritas Backup Exec Migration Assistant Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies
More informationClearwell ediscovery Platform
Clearwell ediscovery Platform Utility Node Guide 7.1.2 Fix Pack 2 Clearwell ediscovery Platform : Utility Node Guide The software described in this book is furnished under a license agreement and may be
More informationAltiris IT Analytics Solution 7.1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may
More informationPatch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x
Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license
More informationSymantec Drive Encryption Evaluation Guide
Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationSymantec ServiceDesk 7.1 SP1 Implementation Guide
Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationEnterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later
Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator 12.2 or later Enterprise Vault : Migrating Data Using the Microsoft Azure Blob Storage Migrator Last updated: 2018-04-12.
More informationDell PowerVault DL Backup to Disk Appliance and. Storage Provisioning Option
Dell PowerVault DL Backup to Disk Appliance and the Symantec Backup Exec Storage Provisioning Option The software described in this book is furnished under a license agreement and may be used only in accordance
More informationVeritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios
Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only
More informationEnterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator
Enterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator 12 Enterprise Vault : Using SQL Database Roles in Enterprise Vault, Compliance Accelerator,
More informationSymantec NetBackup Vault Operator's Guide
Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may
More informationSymantec System Recovery 2013 R2 Management Solution Administrator's Guide
Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide The software described in this book is furnished under
More informationVeritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007
Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows VCS Library Management Pack Veritas Cluster Server Library Management Pack Guide for Microsoft
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software
More informationVeritas ediscovery Platform
Veritas ediscovery Platform Release Notes 9.0.1 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 9.0.1 The software described in this book is furnished under a license agreement and may
More informationEnterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3
Enterprise Vault.cloud Archive Migrator Guide Archive Migrator versions 1.2 and 1.3 Enterprise Vault.cloud: Archive Migrator Guide Last updated: 2018-01-09. Legal Notice Copyright 2018 Veritas Technologies
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software
More informationVeritas Deployment Manager User's Guide
Veritas Deployment Manager User's Guide Last updated: 2017-10-03 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationSymantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10
Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this
More informationVeritas SaaS Backup for Salesforce
Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationNetBackup Copilot for Oracle Configuration Guide. Release 2.7.1
NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights
More informationVeritas NetBackup Plug-in for VMware vsphere Web Client Guide. Release 8.1.1
Veritas NetBackup Plug-in for VMware vsphere Web Client Guide Release 8.1.1 Veritas NetBackup Plug-in for VMware vsphere Web Client Guide Last updated: 2018-02-16 Document version:netbackup 8.1.1 Legal
More informationSymantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note Migrating Enterprise Vault to 64-bit hardware 9.0 Symantec Enterprise Vault: Migrating Enterprise Vault to 64-bit hardware The software described in this book is
More informationEnterprise Vault Requesting and Applying an SSL Certificate and later
Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas
More informationBlue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7
Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the
More informationSymantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018
Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018 Symantec Endpoint Protection Mobile - Admin Guide Documentation version: 3.0 This document was last updated on: August 21, 2017 Legal Notice
More informationVeritas Enterprise Vault Guide for Mac OS X Users 12.2
Veritas Enterprise Vault Guide for Mac OS X Users 12.2 Veritas Enterprise Vault: Guide for Mac OS X Users Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.
More informationVeritas System Recovery 18 Linux Edition: Quick Installation Guide
Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationEnterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later
Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-12-03. Legal
More informationIM: Symantec Security Information Manager Patch 4 Resolved Issues
IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement
More informationVeritas NetBackup for SQLite Administrator's Guide
Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the
More informationSymantec Enterprise Security Manager JRE Vulnerability Fix Update Guide
Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under
More informationVeritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server
Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Application Note: High Availability
More informationSymantec Information Centric Analytics Symantec ICT Integration Guide. Version 6.5
Symantec Information Centric Analytics Symantec ICT Integration Guide Version 6.5 Symantec ICA Symantec ICT Integration Guide, powered by Bay Dynamics Product version 6.5 Documentation version: 1 This
More informationSymantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2
Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished
More informationSymantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6
Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished
More informationBlue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks
More informationVeritas NetBackup Vault Operator's Guide
Veritas NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 8.1.1 Veritas NetBackup Vault Operator's Guide Last updated: 2018-09-19 Document version: NetBackup 8.1 Legal Notice Copyright
More informationVeritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2
Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017
More informationSymantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide
Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation
More informationEnterprise Vault Guide for Outlook Users
Enterprise Vault Guide for Outlook Users (Full Functionality) 12.3 Enterprise Vault : Guide for Outlook Users Last updated: 2018-03-29. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights
More informationVeritas NetBackup for Microsoft Exchange Server Administrator s Guide
Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.0 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2016-11-07 Legal Notice
More informationSecurity Content Update Release Notes for CCS 12.x
Security Content Update 2018-1 Release Notes for CCS 12.x SCU 2018-1 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,
More informationUser Guide. We protect more people from more online threats than anyone in the world.
User Guide We protect more people from more online threats than anyone in the world. Care for our Environment, It's the right thing to do. Symantec has removed the cover from this manual to reduce the
More informationCluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris
Cluster Server 7.3.1 Generic Application Agent Configuration Guide - AIX, Linux, Solaris Last updated: 2017-11-04 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and
More informationVeritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO
Veritas Desktop and Laptop Option 9.2 High Availability (HA) with DLO 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used
More information