Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection
|
|
- Kristopher Wheeler
- 5 years ago
- Views:
Transcription
1 Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection
2 Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Altiris and any Altiris or Symantec trademarks used in the product are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION, INCLUDING WITHOUT LIMITATION ITS AFFILIATES AND SUBSIDIARIES, SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , Rights in Commercial Computer Software or Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display, or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation Stevens Creek Blvd. Cupertino, CA Altiris, Inc. 588 W. 400 S. Lindon, UT II :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
3 Table of Contents Introduction...4 What s New in Symantec Endpoint Protection 11.0?...4 How Does the Free Symantec Endpoint Protection I ntegration Component Add Value?...5 Installing the Symantec Endpoint Protection Integration Component...7 How it Works...8 What is Dell Client Manager?...8 Value of Dell Client Manager in Symantec Endpoint Protection Environments...9 Conclusion...12 Additional Resources...12 III :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
4 Introduction With the release of Symantec Endpoint Protection 11.0, Symantec has secured its position as the leading provider of antivirus and advanced threat prevention technologies. No other security vendor offers such a comprehensive solution in a single, integrated console and agent. In an effort to facilitate the migration and deployment to this new solution, Altiris now part of Symantec has released the Symantec Endpoint Protection Integration Component. This free tool runs on the Altiris Notification Server architecture. The integration component is designed to ease the rollout of Symantec Endpoint Protection and provides additional benefits for organizations that use Altiris software to manage their environments. So what does this mean for users of Dell Client Manager? Dell Client Manager is also based on the Altiris Notification Server and, given the extensible framework of that architecture, Dell customers can realize additional value from this integration. To start, let s take a look at what the free Symantec Endpoint Protection Integration Component from Altiris offers. Then, we ll discuss how Dell Client Manager extends that integration for Dell customers. What s New in Symantec Endpoint Protection 11.0? Symantec Endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for notebooks, desktops and servers. It seamlessly integrates essential security technologies (much more than just antivirus) into a single agent and intuitive management console, increasing protection and helping lower total cost of ownership. The new Symantec Endpoint Protection agent also has a significantly smaller footprint than previous versions of just the AntiVirus agent, and it has been optimized for performance. Capabilities of this new Symantec Endpoint Protection release include: Antivirus Software that attempts to identify, thwart and eliminate computer viruses and other malicious software. Antispyware Software designed to remove or block spyware. Desktop firewall An application that controls network traffic to and from a computer, permitting or denying communications based on a security policy. Device control Controls access to ports and devices connecting to a computer. Intrusion prevention Monitors network and/or system activities for malicious or unwanted behavior and can react, in real time, to block or prevent those activities. [Note: Symantec intrusion prevention is unlike any other IPS because it includes anon-signature-based, behavior-blocking technologies with advanced accuracy.] Learn more about this new Symantec offering at 4 :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
5 What Value Does the Free Symantec Endpoint Protection Integration Component Add? The Symantec Endpoint Protection Integration Component is provided to bring power and simplicity to the process of upgrading and deploying your endpoints to the new Symantec Endpoint Protection 11.0 agent. The Symantec Endpoint Protection Integration Component snaps into the Altiris Notification Server, which is a free management platform used navigate, monitor and configure Altiris management solutions. Note that no prior Altiris solutions are required to use this free component; however, existing users of Altiris management solutions will find added value in running the Symantec Endpoint Protection Integration Component alongside their other Altiris solutions. So what specific benefits does this free Symantec Endpoint Protection Integration Component provide? Here s a partial listing: Robust remote install, upgrade or uninstall of Symantec agents via pre-built tasks, including options for multicasting, scheduling, bandwidth throttling, checkpoint recovery, tracking agent installation status, and deploying to WAN environments. Initiate scans from the Altiris Console leveraging collections built from the Altiris configuration management database (CMDB). If you re already using other Altiris solutions, you can target scans to machine collections built from any data in the Altiris CMDB. This provides fine-grained targeting of Symantec Endpoint Protection scans based on a variety of different device properties. Figure 1: Initiate Symantec Endpoint Protection scans from the Altiris Console Prebuilt tasks to help locate and uninstall agents from previous versions of Symantec (or from other vendors such as McAfee or Trend Micro). Active Directory Integration. 5 :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
6 Symantec Endpoint Protection operational dashboards. If you are using other Altiris solutions you may already be familiar with how the console can be used to create a custom portal view that combines dashboards and reports from many different solutions into one view. Symantec Endpoint Protection dashboards can also be combined and leveraged in this way. Figure 2: Symantec Endpoint Protection dashboards in the Altiris Console 6 :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
7 Graphical, Web-based reporting on signature status, installed clients and infected systems. Figure 3: Initiate Symantec Endpoint Protection scans from the Altiris Console Role-and-scope based security for the above functions. Installing the Symantec Endpoint Protection Integration Component The Symantec Endpoint Protection Integration Component can be downloaded from or, if Altiris Notification Server is already installed, it can be downloaded from within Solution Center using the following steps. 1. Open the Altiris Notification Server console. 2. Select the Configure menu, and then select Solution Center. 3. In the Available Solutions tab view, click the Segments button. 4. Expand the Components list. 5. Select Symantec Endpoint Protection Integration Component. 6. Click Start. 7 :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
8 How it Works From the Altiris Console, you can view and act upon data generated from Symantec Endpoint Protection. This data is transferred from your Symantec Endpoint Protection Manager database to the Altiris Notification Database. This is done using basic data imports and a linked server connection created between the Altiris Notification Database and the Symantec Endpoint Protection Manager database. The configuration and scheduling of these imports can be user defined. When run, the import pulls a common identifier representing each computer from the Symantec Endpoint Protection Manager database into the Altiris Notification Database. If a computer that exists in the Symantec Endpoint Protection Manager database is not found in the Altiris Notification Database, then a new computer entry is created. Figure 4: Data Exchange with the Symantec Endpoint Protection Integration Component Computer resources imported from your Symantec Endpoint Protection Manager are automatically organized into collections. The Symantec Endpoint Protection Integration Component automatically adds each client computer to its applicable collection based on the inventory imported from the connector. Custom collections and reports may be created from this inventory to identify and target specific computers (for example, computers with outdated virus definitions). What is Dell Client Manager? Dell Client Manager is a free tool for managing Dell systems that is part of the Dell OpenManage product line. It is available for download to all Dell customers at (click the Client Management link). Additional for charge versions of the tool add operating system and application management features like system migration, software delivery, OS patching, application metering, and so on. Specifically, Dell Client Manager provides the ability to inventory hardware and BIOS settings on OptiPlex, Precision, and Latitude systems running a Windows 2000 or Windows XP operating system. Hardware and BIOS inventory properties can be used to automate common Dell client management tasks such as remotely updating the system BIOS. Administrators can also use Dell Client Manager to remotely configure BIOS settings via policies, monitor hardware health and system settings, remotely perform power management operations and apply power schemes. 8 :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
9 Learn more about Dell Client Manager at or Value of Dell Client Manager in Symantec Endpoint Protection Environments Dell Client Manager provides several valuable functions for Dell customers, but what value does it add for customers who are also running Symantec Endpoint Protection? See below for a partial listing. Comprehensive security Symantec Endpoint Protection customers are clearly interested in securing their environments. Dell Client Manager can help with this effort in some key ways including the enforcement of critical BIOS settings via policies. Such settings may include: o o Setting BIOS passwords that keep other BIOS settings protected or even preventing a system boot without an end-user password Securing device boot order (for example, eliminating the ability to boot to a CD or USB device, or disabling Wake on LAN or Preboot Execution Environment settings) Figure 5: Enforcing Dell BIOS settings via a policy 9 :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
10 Leveraging Dell Client Manager data or functions as part of your Symantec Endpoint Protection agent rollout: o Use Dell Client Manager s support for Intel vpro as a secure alternative to Wake on LAN to wake up systems during off-peak hours for SEP agent deployment. Figure 6: Leveraging Intel vpro for SEP Agent Deployment o Dell Client Manager collections and BIOS/HW inventory data can be used to target Symantec Endpoint Protection agent distribution to Dell systems Figure 7: Leveraging Intel vpro processor technology for Symantec Endpoint Protection agent deployment 10 :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
11 Dell Client Manager reports and dashboards can be combined with Symantec Endpoint Protection status information in one console view Figure 8: Combined Dashboards from Dell Client Manager and Symantec Endpoint Protection in a Single Portal Page Dell Client Manager provides monitoring of hardware related events - such as detecting a chassis intrusion - that may be helpful as part of an overall company security policy. 11 :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
12 Conclusion The Symantec Endpoint Protection Integration Component from Altiris adds value to your organization by simplifying the deployment and ongoing management of systems running Symantec Endpoint Protection. Leveraging free tools such as Dell Client Manager with the Symantec Endpoint Protection Integration Component broadens management capabilities by providing additional data and functionality to more precisely secure Dell client systems. The Altiris Notification Server architecture allows integration between many other management solutions to increase management capability while reducing the overall cost to manage Dell environments. Additional Resources Important links for additional information are listed below. Symantec Endpoint Protection 11.0 Overview Symantec Endpoint Protection Integration Component from Altiris - Data sheet: - Documentation: - Release notes: Dell Client Manager :: DELL CLIENT MANAGER AND SYMANTEC ENDPOINT PROTECTION
Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes
Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is
More informationAltiris Client Management Suite 7.1 from Symantec User Guide
Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationAltiris Software Management Solution 7.1 from Symantec User Guide
Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationSymantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started
Symantec Cloud Workload Protection on AWS Marketplace Buyer's Guide for Getting Started The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationVeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide
VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished
More informationPartner Information. Integration Overview. Remote Access Integration Architecture
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise
More informationSymantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.
Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.0) Release Notes Express Security Content Update for Microsoft Windows Server 2008
More informationSymantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide
Symantec Mail Security for Microsoft Exchange 7.9 Guide Symantec Mail Security for Microsoft Exchange Guide The software described in this book is furnished under a license agreement and may be used only
More informationSymantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide
Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationAltiris IT Analytics Solution 7.1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may
More informationSymantec Workflow 7.1 MP1 Release Notes
Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSymantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
More informationSymantec Enterprise Security Manager JRE Vulnerability Fix Update Guide
Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationDell Client Manager 2.0 FAQ
; Dell Client Manager 2.0 FAQ Table of Contents Do I need to license Dell Client Manager Standard Edition?... 2 What are the system requirements and prerequisites for installation?... 2 When installing
More informationSymantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017
VIP Credential Development Kit Release Notes Version 2.0.8 May 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important information about the Symantec
More informationSymantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.
Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.x For Windows 2000, Windows Server 2003, and Windows XP SQL
More informationSymantec Protection Center Getting Started Guide. Version 2.0
Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationPatch Assessment Content Update Getting Started Guide for CCS 12.0
Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license agreement and may
More informationVeritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)
Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service
More informationSymantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes
Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3 Release Notes Express Security Content Update for JBoss Enterprise Application Platform 6.3
More informationQ A F 2.2 ger A n A m client dell dell client manager 2.2 FAQ
DELL CLIENT MANAGER 2.2 FAQ dell client manager 2.2 FAQ Do i need to license dell client manager standard edition? 2 What are the system requirements and prerequisites for installation? 2 When installing
More informationSymantec Ghost Solution Suite Web Console - Getting Started Guide
Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.
More informationSymantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017
VIP Credential Development Kit Release Notes Version 2.0.7 January 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important and late-breaking information
More informationVeritas Desktop and Laptop Option Mobile Application Getting Started Guide
Veritas Desktop and Laptop Option Mobile Application Getting Started Disclaimer Contents The software described in this document is furnished under a license agreement and may be used only in accordance
More informationPartner Information. Integration Overview Authentication Methods Supported
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security
More informationVeritas System Recovery 18 Management Solution Administrator's Guide
Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationPatch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x
Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license
More informationConfiguring Symantec. device
Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be
More informationEnterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later
Versions of FSA Agent and 2007 or later : Versions of FSA Agent and Last updated: 2018-04-05. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo,, Compliance
More informationPartner Management Console Administrator's Guide
Partner Management Console Administrator's Guide Partner Management Console Administrator's Guide Documentation version: November 17, 2017 Legal Notice Copyright 2017 Symantec Corporation. All rights reserved.
More informationUser Guide. We protect more people from more online threats than anyone in the world.
User Guide We protect more people from more online threats than anyone in the world. Care for our Environment, It's the right thing to do. Symantec has removed the cover from this manual to reduce the
More informationVeritas Data Insight Software Compatibility List 6.1.1
Veritas Data Insight Software Compatibility List 6.1.1 Documentation version: 6.1.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks
More informationConfiguring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms
Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified
More informationDell PowerVault DL Backup to Disk Appliance and. Storage Provisioning Option
Dell PowerVault DL Backup to Disk Appliance and the Symantec Backup Exec Storage Provisioning Option The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Network Access Control Linux Agent User Guide
Symantec Network Access Control 5.1.7 Linux Agent User Guide Symantec Network Access Control 5.1.7 Linux Agent User Guide The software described in this book is furnished under a license agreement and
More informationVeritas System Recovery 16 Management Solution Administrator's Guide
Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationVeritas Desktop and Laptop Option 9.2
1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.
More informationSymantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.
Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement
More informationCreating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility
Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationSymantec ServiceDesk 7.1 SP1 Implementation Guide
Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationPGP NetShare FlexResponse Plug-In for Data Loss Prevention
PGP NetShare FlexResponse Plug-In for Data Loss Prevention Implementation Guide 10.2 The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationSymantec ediscovery Platform
Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished
More informationVeritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios
Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only
More informationSymantec Workflow Solution 7.1 MP1 Installation and Configuration Guide
Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement
More informationVeritas Desktop and Laptop Option Mac Getting Started Guide
Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationINFOBrief. Dell OpenManage Client Administrator 3.0. Key Points
Dell OpenManage Client Administrator 3.0 Key Points Dell OpenManage Client Administrator is an integrated suite of client management applications developed in partnership with Altiris. This product provides
More informationNetBackup Self Service Release Notes
NetBackup Self Service Release Notes 7.7.3 Document version: 1 Veritas NetBackup Self Service Release Notes Document version: 7.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC. All rights reserved.
More informationVeritas System Recovery 18 Linux Edition: Quick Installation Guide
Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationEnterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later
Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal
More informationSymantec Endpoint Encryption Full Disk Release Notes
Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk 7.0.8 Symantec Endpoint Encryption Framework 7.0.8 www.symantec.com About Symantec Endpoint Encryption Full Disk
More informationVeritas Data Insight 6.1 Software Compatibility List 6.1
Veritas Data Insight 6.1 Software Compatibility List 6.1 November 2017 Documentation version: 6.1.0 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationReporting User's Guide
Reporting User's Guide Reporting User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software
More informationEnterprise Vault Requesting and Applying an SSL Certificate and later
Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas
More informationVeritas Desktop Agent for Mac Getting Started Guide
Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec System Recovery 2013 R2 Management Solution Administrator's Guide
Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide The software described in this book is furnished under
More informationSymantec Multi-tier Protection
Trusted protection from malware and email-bourne threats for multiplatform environments Overview Symantec Multi-tier Protection is designed to safeguard enterprise assets and lower risk by providing unmatched
More informationEnterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3
Enterprise Vault.cloud Archive Migrator Guide Archive Migrator versions 1.2 and 1.3 Enterprise Vault.cloud: Archive Migrator Guide Last updated: 2018-01-09. Legal Notice Copyright 2018 Veritas Technologies
More informationConfiguring Symantec AntiVirus for BlueArc Storage System
Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be
More informationVeritas Storage Foundation and High Availability Solutions Getting Started Guide
Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 21271162 (October 2012) Veritas Storage Foundation and High
More informationThe Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008
The Convergence of Management and Security Stephen Brown, Sr. Product Manager December 2008 Agenda 1 A Robust Management Foundation 2 The Value of Security and Management Convergence 3 Symantec Endpoint
More informationSymantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10
Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this
More informationVeritas SaaS Backup for Salesforce
Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software
More informationVeritas Storage Foundation and High Availability Solutions Getting Started Guide
Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 21213723 (October 2011) Veritas Storage Foundation and High
More informationSymantec Deployment Solution 8.0 powered by Altiris technology User Guide
Symantec Deployment Solution 8.0 powered by Altiris technology User Guide Symantec Deployment Solution 8.0 powered by Altiris technology User Guide Legal Notice Copyright 2016 Symantec Corporation. All
More informationVeritas SaaS Backup for Office 365
Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationSymantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App
Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished
More informationIM: Symantec Security Information Manager Patch 4 Resolved Issues
IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only
More informationVeritas System Recovery 16 Management Solution Readme
Veritas System Recovery 16 Management Solution Readme About this readme System requirements for software delivery policies of Veritas System Recovery 16 System requirements for Veritas System Recovery
More informationSymantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018
Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018 Symantec Endpoint Protection Mobile - Admin Guide Documentation version: 3.0 This document was last updated on: August 21, 2017 Legal Notice
More informationSymantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide
Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationImplementation Guide for Symantec Endpoint Protection Small Business Edition
Implementation Guide for Symantec Endpoint Protection Small Business Edition Implementation Guide for Symantec Endpoint Protection Small Business Edition The software described in this book is furnished
More informationSymantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in
More informationVeritas Access Enterprise Vault Solutions Guide
Veritas Access Enterprise Vault Solutions Guide Linux 7.4.1 Veritas Access Enterprise Vault Solutions Guide Last updated: 2018-07-31 Document version: 7.4.1 Rev 0 Legal Notice Copyright 2018 Veritas Technologies
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement
More informationVeritas ediscovery Platform
Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license
More informationVeritas Backup Exec Quick Installation Guide
Veritas Backup Exec Quick Installation Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationVeritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server
Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Storage
More informationSymantec NetBackup Vault Operator's Guide
Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationVeritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2
Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017
More informationVeritas Deployment Manager User's Guide
Veritas Deployment Manager User's Guide Last updated: 2017-10-03 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationVeritas NetBackup Vault Operator's Guide
Veritas NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 8.1.1 Veritas NetBackup Vault Operator's Guide Last updated: 2018-09-19 Document version: NetBackup 8.1 Legal Notice Copyright
More informationAltiris PC Transplant 6.8 SP4 from Symantec User Guide
Altiris PC Transplant 6.8 SP4 from Symantec User Guide Altiris PC Transplant 6.8 SP4 from Symantec User Guide The software described in this book is furnished under a license agreement and may be used
More informationEnterprise Vault.cloud Journaling Guide
Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas
More informationAltiris Deployment Solution 7.1 SP1a MR1 from Symantec User Guide
Altiris Deployment Solution 7.1 SP1a MR1 from Symantec User Guide Altiris Deployment Solution 7.1 SP1a from Symantec User Guide The software described in this book is furnished under a license agreement
More informationPGP Viewer for ios. Administrator s Guide 1.0
PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.
More informationIntroducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing
Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection Bernard Laroche Endpoint security Product marketing Agenda 1 Organizational Risk and Endpoint Challenges 32 Symantec Endpoint
More informationStorage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013
Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013 Windows 7.1 April 2016 Storage Foundation and High Availability Solutions HA and
More information