PGP Portable Quick Start Guide Version 10.3

Size: px
Start display at page:

Download "PGP Portable Quick Start Guide Version 10.3"

Transcription

1 Quick Start Guide Version 10.3 Introduction to Use to distribute encrypted files to users who do not have software. Use to transport files securely to other systems that do not or cannot have PGP software installed. provides: Portability of secured documents Ease of distribution of secured documents There are two types of users of : the user who creates the Disk containing secured data, and the user who does not have PGP software but needs to access that secured data. You might also be both types of users: creating a Disk that you can take and use on a computer at a customer's site, for example. Contents Introduction to (page 1) Terms Used in (page 1) Creating Disks (page 1) Accessing Data on a Disk (page 3) Logging Messages (page 5) Recovering Data using an ADK (page 5) Using the Command Line Tool (page 5) Getting Assistance (page 7) Terms Used in Term Creation Disk Definition The name of the product that includes both the application to create Disks and to access those disks. The application itself that is used to create a Disk on a flash drive, removable drive, CD, DVD, or other device, drive or media on which a PGP Portable Disk is created. The collection of files that, together, provide access to protected data on a system that does not have PGP software installed. It includes the Disk File, a Windows executable, a Mac OS X executable, and an autorun file. Term Disk File Definition The actual file that contains your encrypted data. The Disk file is a.pgd file. Creating Disks Disks can be created in one of two ways: using a Windows Explorer shortcut menu, or using a command line tool. This section describes normal use of the shortcut menu. For information on the command line, see Using the PGP Portable Command Line Tool (on page 5). To create a Disk, be sure that you: Have installed on a Windows system that is already running. Properly licensed the installation that is bound to a Symantec Encryption Management Server. Are using a Windows BIOS-based system. ( is not compatible with Windows UEFI-based systems.) A Disk can be created on one of two targets: A folder on a local drive, remote file share, or CD/DVD. A locally mounted removable device, such as a USB flash drive, that is no larger than 128 GB. When you create a Disk, Symantec Encryption Management Server policy also enforces passphrase strength. If you use a passphrase that does not meet Symantec Encryption Management Server policy, an error message is displayed. Creating a Disk from a Folder When you want to eventually burn a CD or DVD containing the Disk, use this option. Note: Be sure that you have copied the data you want to protect and share into the folder. To create a Disk from a folder 1 Locate and right-click the source folder, and then select Create Disk Folder from the shortcut menu. 2 In the Create Disk dialog box, enter and confirm the passphrase. This passphrase will be required to access the data in the Disk. 3 Click Create. 1

2 If the folder you are using to create the Disk is on a read-only device (such as CD or DVD), a Save As dialog box is displayed. Browse for the location on your local drive where you want the PGP Portable Disk destination folder to be created and click Save. When completed, the destination folder is created. The folder name is the source folder name with "-PGP Portable" appended to the name. 4 Burn the entire contents of the destination folder to the CD/DVD. The Disk destination folder contains: The Windows executable (pgpportable.exe) The Mac OS X executables (PGP Portable App) A Windows autorun file (autorun.inf) A Disk File (pgpportable.pgd) The Disk File (pgpportable.pgd) contains within it all files found in the original target folder. The Disk File is encrypted to the passphrase specified. Be sure that you do not delete any of these files from the Disk. Tip: Be sure that you burn only the contents of the folder to disc, and not the folder itself. If you burn the folder to a disc, will not automatically launch on systems where autorun is enabled. Creating a Disk from a Removable USB Device When you want to create the Disk directly onto a removable USB device, such as a flash drive, use this option. Removable USB devices, such as a flash drive, that are larger than 4 GB must be formatted as NTFS. NTFS drives are treated as read-only when accessed on Mac OS X systems (unless a third-party program, such as NTFS-3G for Mac OS X, is used to enable read-write access). Disks created on removable USB devices that are smaller than 4 GB can be formatted as FAT or NTFS. Symantec Corporation recommends that you create PGP Portable Disks on FAT formatted removable devices. If you try to create a Disk that is larger than 4 GB, PGP will automatically convert the filesystem of the removable device to NTFS with NTFS permissions similar to FAT. If you want to create a Disk on an NTFS formatted removable device, be sure that you understand NTFS permissions, as you may create a disk that cannot be modified by anyone but the creator. Note: The removable USB device must be smaller than 128 GB ( bytes). If you attempt to create a PGP Portable Disk on a removable USB device that is larger than 128 GB, you will receive an error message. Note: When creating a Disk on USB drives that are 256 MB or smaller, folders created on the disk cannot be renamed using Mac OS X systems. Create Disks on USB drives larger than 256 MB if Mac OS X users will want or need to rename folders. To create a Disk from a removable USB device 1 Locate and right-click the mounted removable USB device, and then select Create Disk from the shortcut menu. 2 The Disk creation application is displayed with a warning that the contents of the drive will be erased. 3 In the Create Disk dialog box, to securely erase any data that exists on the device, select the check box to Securely erase contents of the disk. 4 To require the user of the Disk to change the passphrase on first use (the first time the user inserts the device into the system), select the check box to Change passphrase on first use. This option is useful if you plan to create several Disks to be handed out, such as at a conference or trade show. 5 Enter and confirm the passphrase. This passphrase will be required to access the data in the Disk. 6 Click Format. When completed, the Disk is created. The Disk File is encrypted to the passphrase specified. 7 You are prompted to enter the passphrase and then the Disk is mounted. A notification message is displayed from the system tray informing you of the drive number for the mounted Disk. 8 If desired, copy the data that you want to protect to the mounted Disk. The Disk contains no files when it is first created. 9 Unmount the Disk (in the system tray, click the icon and select Unmount and Exit). The drive that was mounted for the Disk is unmounted. 10 Properly eject the USB device and remove the device from your computer. You can now access the contents of the Disk on another system that supports PGP Portable. Warning: Be sure that you properly unmount a removable USB device before physically removing it from the system. Failure to do so may result in corrupted file contents. The removable device contains the following files: The Windows executable (pgpportable.exe) The Mac OS X executables (PGP Portable.app) A Windows autorun file (autorun.inf) The Disk File (pgpportable.pgd) 2

3 Be sure that you do not delete any of these files from the Disk. Creating Read/Write or Read-Only PGP Portable Disks To have read/write access to a Disk, the PGP Portable Disk must be located on read/write media (such as a flash drive or other removable disk). Read/write access is enabled for a Disk only while it resides on the removable device on which it was created. Disks created on read-only media are themselves read-only (for example, CD-ROMs). Disks accessed on the removable device on which they were created are read/write (for example, a USB drive that is mounted as read-write). Accessing Data on a Disk Disks are not compatible on Windows 8/8.1or Mac OS X systems. The contents of a Disk can be accessed in three ways: By mounting the CD, DVD, or removable USB drive on a Windows system, and running the Disk application (which launches automatically if autorun is enabled). By mounting the CD, DVD, or removable USB drive on a Mac OS X system, and running the Disk application. When you access data on a Disk, remember that you are actually mounting two items: the removable device on which the Disk resides, and the Disk itself (which is mounted as a separate item). When you are finished, be sure to unmount the Disk before safely ejecting the removable device. The steps to access data on a Disk are similar for Windows and Mac OS X systems. Warning: Be sure that you properly unmount a removable device before physically removing it from the system. Failure to do so may result in corrupted file contents. To access data on a Disk using a Windows system 1 Insert the removable device on which the 2 Do one of the following: On Windows systems where autorun is enabled, select Mount Disk. On Windows systems where autorun is disabled, open the mounted removable device and browse for the application (pgpportable.exe). Double-click the application. On Windows 7 systems, open the disk by doubleclicking the USB disk icon in Windows Explorer. The dialog box is displayed. 3 Enter the passphrase for the Disk. The PGP Portable Disk is mounted. Note: If the creator of the Disk requires that the passphrase be changed on first use, when the disk is first inserted into a drive after creation, the dialog box that appears requires that you enter the current passphrase, and then change and confirm the new passphrase. A notification message is displayed from the system tray informing you of the drive number for the mounted PGP Portable Disk, and the amount of disk space used and available. If the Disk is mounted as a readwrite device, you can add data to it. If the Disk is mounted as a read-only device, you cannot add data. Note: The volume name for the Disk is unique to and may not match the name of the volume when created. 4 When you are finished using the Disk, unmount the Disk (in the system tray, click the icon and select Unmount and Exit. The drive that was mounted for the Disk is unmounted. 5 Properly eject the USB device or disc from your computer. To view available disk space To view available disk space and total size of the PGP Portable Disk once the disk has been mounted, move your cursor over the task bar item for a few seconds. The notifier message reappears and displays the mount status of the Disk as well as the updated disk space information. To obtain additional information about To obtain more information about, in the left bottom corner of the dialog box, click the link for More Info. Your browser launches and the Symantec Corporation Support site page is displayed. To access data on a Disk using a Mac OS X system 1 Insert the removable device on which the 2 Open the mounted removable device and browse for the application (). Double-click the application. The dialog box is displayed. 3

4 3 Enter the passphrase for the Disk. Note: If the creator of the Disk requires that the passphrase be changed on first use, when the disk is first inserted into a drive after creation, the dialog box that appears requires that you enter the current passphrase, and then change and confirm the new passphrase. When the correct passphrase has been entered, the PGP Portable Disk is mounted. If the Disk is mounted as a read-write device, you can add data to it. If the Disk is mounted as a read-only device, you cannot add data. Note: The volume name for the Disk is unique to and may not match the name of the volume when created. 4 When you are finished using the Disk, unmount the Disk (in the dock, click the icon and then click Unmount. The drive that was mounted for the Disk is unmounted. 5 Properly eject the USB device or disc from your computer. Warning: Be sure that you properly unmount a removable device before physically removing it from the system. Failure to do so may result in corrupted file contents. To view available disk space To view available disk space and total size of the PGP Portable Disk once the disk has been mounted, select the icon in the dock. If is still calculating the amount of free space, the message Calculating available space is displayed. To obtain additional information about To obtain more information about, in the left bottom corner of the dialog box, click the link for More Info. Your browser launches and the Symantec Support site page is displayed. Changing the Passphrase for a PGP Portable Disk There may be times when it is necessary to change the passphrase associated with a Disk. Note that you cannot change the passphrase on any Disk that is read-only (including Disks burned to CD/DVD media). To change the passphrase on a Disk using a Windows system 1 Insert the removable device on which the 2 Do one of the following: On Windows systems where autorun is enabled, select Mount Disk. On Windows systems where autorun is disabled, open the mounted removable device and browse for the application (pgpportable.exe). Double-click the application. On Windows 7 systems, open the disk by doubleclicking the USB disk icon in Windows Explorer. 3 Enter the passphrase for the Disk when prompted. The Disk is mounted. A notification message is displayed from the system tray informing you of the drive number for the mounted PGP Portable Disk. 4 Open by right-clicking the system tray icon and choosing Open. 5 In the dialog box, click Change Passphrase. 6 Enter the current passphrase, enter and confirm the new passphrase, and click Change. The passphrase is changed. The Passphrase Quality bar provides a basic guideline for the strength of the passphrase you are creating. For more information, see The Passphrase Quality Bar. To change the passphrase on a Disk using a Mac OS X system 1 Insert the removable device on which the 2 Open the removable device and locate the application (). Double-click the application, and enter the passphrase for the Disk when prompted. When the correct passphrase has been entered, the Disk is mounted. 3 Open by clicking the icon in the dock and in the dialog box, clicking Change Passphrase. 4 Enter the current passphrase, Enter and confirm the new passphrase, and click Change. Unmounting a Disk Be sure that you properly unmount a removable device before physically removing it from the system. Failure to do so may result in corrupted file contents. To unmount a Disk 1 Open. To do this, do one of the following: 4

5 To open on a Windows system, rightclick the system tray icon and choose Unmount and Exit. To open on a Mac OS system, click the icon in the dock and choose Unmount and Exit. The Disk is unmounted. 2 Safely eject and remove the device from your system. Logging Messages When a new Disk is created, a log message is sent to the Symantec Encryption Management Server. The message appears in the client log. For USB-based Disks: Portable Disk Create: User [login name] on machine [computer name] created a USB-based disk osf size [disk size] bytes (Disk ID=[disk UUID], vendor=[usb vendor ID] '[USB vendor name]', product=[usb product ID] '[USB product name]', s/n=[usb serial number]) For folder-based Disks: Portable Disk Create: User [login name] on machine [computer name] created a folderbased disk of size [disk size] bytes (DiskID=[disk UUID]) Recovering Data using an ADK If Symantec Encryption Management Server policy specifies that an Additional Decryption Key (ADK) be used with all PGP Portable operations (such as encrypting messages), then all Disks are encrypted to that ADK. This ensures that Disk can be accessed if the passphrase is forgotten or unavailable. The addition of the ADK to the Disk is automatic and transparent to the user. For more information on the ADK, refer to your Symantec Encryption Desktop for Windows User's Guide or your Symantec Encryption Management Server Administrator's Guide. To use an ADK to access a Disk, you must be using a system on which is installed and you must have access to the private portion of the ADK as well as the passphrase for it. ("Access" means you are using the system on which the ADK was created, or have imported the ADK on a token or into on another system.) To access a Disk using an ADK 1 Insert the removable device on which the 2 If autorun is enabled, when prompted for the passphrase click Cancel. 3 Browse for and double-click the Disk file (.pgd) on the device. 4 When prompted for the passphrase, enter the passphrase for the ADK. 5 When the correct passphrase has been entered, the PGP Portable Disk is mounted. If the device is mounted as a read-write device, you can add data to the Disk. If the device is mounted as a read-only device, you cannot add data. Using the Command Line Tool includes a command-line application, pgpp.exe, for the creation of Disks. The application can create a Disk from a folder or from a USB drive. Although the commands for creating these two types of Disks are similar, they are described separately for ease of use. pgpp.exe also supports options that let you view the online help, see what version of pgpp.exe you are using, and control the message display settings. These options are not required to create Disks. pgpp.exe commands can easily be inserted into scripts written with scripting languages such as Perl or Python. By default, pgpp.exe is installed in C:\Program Files\PGP Corporation\PGP Desktop\ on Windows systems. To use pgpp.exe from the Windows Command Prompt application, you must either navigate to this directory to execute commands or change the path on the system to include the location of pgpp.exe. Folder The usage format for creating a Disk from a folder is: pgpp create <source-folder> --output <target-folder> --user-name <username> -- passphrase <phrase> --volume-name <volname> Where: create is the command to create a Disk. <source-folder> is the path to the folder you want to be encrypted. --output specifies that a Disk folder is to be created by this operation. <target-folder> is the path to the Disk folder created by this operation. --user-name specifies that a passphrase user will be used to authorize the operation. <username> is the username of the passphrase user. --passphrase specifies that a passphrase will decrypt the Disk folder being created. 5

6 <phrase> is the passphrase the end user will enter to decrypt the Disk. --volume-name specifies the name for the volume you are creating. If --volume-name is omitted, the default name, PGPSECURED, will be used. <volname> is the name for the folder you are creating. If you use --volume-name, you must enter text for <volname>; you will see an error if no text is entered or if you enter a space in quotation marks. Example: pgpp create c:\dir1 --output c:\dir2 -- user-name "Alice Cameron" --passphrase 'Frodo*1*Baggins22' --volume-name 'Encrypted' --noprompt This example shows a Disk being created from the contents of the directory C:\dir1 on the local system. It will be located on the local system at C:\dir2. The user on the system authorizing the operation is Alice Cameron. The passphrase to access the encrypted data in the folder is 'Frodo*1*Baggins22' (without the quotation marks). The volume will be called 'Encrypted' (without the quotation marks). Only errors and warnings will appear when the command is executed. USB drive The usage format for creating a Disk from a USB drive is: pgpp create <usb-drive> --usb --user-name <username> --passphrase <phrase> --volumename <volname> Where: create is the command to create a Disk. <usb-drive> is the path to the USB drive on the local system. --usb specifies that a Disk folder is to be created from the specified USB drive. --user-name specifies that a passphrase user will be used to authorize the operation. <username> is the username of the passphrase user. --passphrase specifies that a passphrase will decrypt the Disk folder being created. <phrase> is the passphrase the end user will enter to decrypt the Disk. --volume-name specifies the name for the volume you are creating. If --volume-name is omitted, the default name, PGPPORTABLE, will be used. <volname> is the name for the USB disk you are creating. If you use --volume-name, you must enter text for <volname>; you will see an error if no text is entered or if you enter a space in quotation marks. Example: pgpp create f: --usb --user-name "Alice Cameron" --passphrase 'Frodo*1*Baggins42' - -volume-name 'PGP-USB' This example shows a Disk being created on a USB drive, drive f on the local system. The user on the system authorizing the operation is Alice Cameron. The passphrase to access the encrypted data in the folder is 'Frodo*1*Baggins42' (without the quotation marks). The volume will be called 'PGP-USB' (without the quotation marks). No message display level is set, so errors, warnings, and normal status information will display when the command is executed. Additional Options pgpp.exe supports several options: --help, which displays the online help. --version, which displays information about the version of pgpp.exe you are using. Options that control what is displayed when a command is executed. These options are not required to create Disks. --help The --help option displays the pgpp.exe online help, which shows supported commands and options. The usage format is: pgpp --help The online help appears. --version The --version option displays which version of pgpp.exe you are using. The usage format is: pgpp --version The version information appears. --change-passphrase The --change-passphrase option is used to force the user to change the original passphrase on first use of the PGP Portable disk. The usage format is: pgpp create <usb-drive> --usb --user-name <username> --passphrase <phrase> --volumename <volname> --change-passphrase The disk is created requiring the user change the passphrase on first use. 6

7 Message Display Settings pgpp.exe provides several options that control what messages are displayed when a command is executed: Quiet mode (--quiet). Nothing gets displayed. No prompt mode (--noprompt). Only errors and warnings get displayed. Normal mode. Displays errors and warnings, plus some status information. This option is used if nothing is specified on the command line. Verbose mode (--verbose). Displays all Normal mode information, plus additional status information. To specify a message display mode other than Normal, simply use it on the command line. For example: pgpp create c:\dir1 --output c:\dir2 -- passphrase 'Frodo*1*Baggins22' --verbose This command creates a Disk from a folder in Verbose mode. All errors, warnings, and status information will appear when the command is executed. Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s support offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services For information about Symantec s support offerings, you can visit our website at the following URL: All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Contacting Technical Support Customers with a current support agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support web page at the following URL: Customer service Customer service information is available at the following URL: Customer Service is available to assist with non-technical questions, such as the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals 7

8 Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, Africa North America, Latin America Copyright and Trademarks Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton Zone, PGP, Pretty Good Privacy, and the PGP logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Java is a registered trademark of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. 8

PGP NetShare Quick Start Guide Version 10.2

PGP NetShare Quick Start Guide Version 10.2 PGP NetShare Quick Start Guide Version 10.2 What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. Use PGP NetShare to: Let authorized

More information

Symantec Encryption Desktop Version 10.2 for Mac OS X Release Notes. About Symantec Encryption Desktop

Symantec Encryption Desktop Version 10.2 for Mac OS X Release Notes. About Symantec Encryption Desktop Symantec Encryption Desktop Version 10.2 for Mac OS X Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of Encryption

More information

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of

More information

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

About Symantec Encryption Management Server

About Symantec Encryption Management Server Symantec Encryption Management Server Version 3.3.0 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

More information

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

More information

PGP Viewer for ios. User s Guide 1.0

PGP Viewer for ios. User s Guide 1.0 PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:

More information

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec PGP Viewer for ios

Symantec PGP Viewer for ios Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.

More information

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

PGP Viewer for ios. Administrator s Guide 1.0

PGP Viewer for ios. Administrator s Guide 1.0 PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software

More information

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10 Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this

More information

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of

More information

Symantec Drive Encryption for Mac OS X Quick Start Guide Version 10.3

Symantec Drive Encryption for Mac OS X Quick Start Guide Version 10.3 Symantec Drive Encryption for Mac OS X Quick Start Guide Version 10.3 What is Symantec Drive Encryption? Symantec Drive Encryption is used to lock down the entire contents of your system or an external

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified

More information

Configuring Symantec. device

Configuring Symantec. device Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be

More information

Veritas CommandCentral Enterprise Reporter Release Notes

Veritas CommandCentral Enterprise Reporter Release Notes Veritas CommandCentral Enterprise Reporter Release Notes for Microsoft Windows and Solaris 5.2 RU3 February 2012 CommandCentral Enterprise Reporter Release Notes The software described in this book is

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 21213723 (October 2011) Veritas Storage Foundation and High

More information

Altiris Client Management Suite 7.1 from Symantec User Guide

Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

IM: Symantec Security Information Manager Patch 4 Resolved Issues

IM: Symantec Security Information Manager Patch 4 Resolved Issues IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement

More information

Altiris PC Transplant 6.8 SP4 from Symantec User Guide

Altiris PC Transplant 6.8 SP4 from Symantec User Guide Altiris PC Transplant 6.8 SP4 from Symantec User Guide Altiris PC Transplant 6.8 SP4 from Symantec User Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec NetBackup for Lotus Notes Administrator's Guide. Release 7.6

Symantec NetBackup for Lotus Notes Administrator's Guide. Release 7.6 Symantec NetBackup for Lotus Notes Administrator's Guide Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec Enterprise Security Manager Modules for Oracle Release Notes

Symantec Enterprise Security Manager Modules for Oracle Release Notes Symantec Enterprise Security Manager Modules for Oracle Release Notes Release 5.0 for Symantec ESM 9.0 and 10.0 For Red Hat Enterprise Linux, HP-UX, AIX, Solaris, and Windows Symantec Enterprise Security

More information

Symantec NetBackup Appliance Fibre Channel Guide

Symantec NetBackup Appliance Fibre Channel Guide Symantec NetBackup Appliance Fibre Channel Guide Release 2.6.1.2 NetBackup 52xx and 5330 Symantec NetBackup Appliance Fibre Channel Guide Documentation version: 2.6.1.2 Legal Notice Copyright 2015 Symantec

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Application Note: High Availability

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 21271162 (October 2012) Veritas Storage Foundation and High

More information

Security Content Update Release Notes for CCS 12.x

Security Content Update Release Notes for CCS 12.x Security Content Update 2018-1 Release Notes for CCS 12.x SCU 2018-1 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec NetBackup OpsCenter Reporting Guide. Release 7.7

Symantec NetBackup OpsCenter Reporting Guide. Release 7.7 Symantec NetBackup OpsCenter Reporting Guide Release 7.7 Symantec NetBackup OpsCenter Reporting Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Security Content Update Release Notes. Versions: CCS 11.1 and CCS 11.5

Security Content Update Release Notes. Versions: CCS 11.1 and CCS 11.5 Security Content Update 2016-1 Release Notes Versions: CCS 11.1 and CCS 11.5 SCU 2016-1 Release Notes for CCS 11.1 and CCS 11.5 Legal Notice Copyright 2016 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows VCS Library Management Pack Veritas Cluster Server Library Management Pack Guide for Microsoft

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Storage

More information

Symantec ApplicationHA Release Notes

Symantec ApplicationHA Release Notes Symantec ApplicationHA Release Notes Linux on KVM 6.0 December 2011 Symantec ApplicationHA Release Notes The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Deployment Scanner 10.0 Symantec Enterprise Vault: Deployment Scanner The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Configuring Symantec AntiVirus for BlueArc Storage System

Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be

More information

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines HP-UX 11i v3 5.0.1 Veritas Storage Foundation and High Availability Solutions Application

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in

More information

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.7 Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Documentation version: 7.7 Legal Notice Copyright

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.1 Symantec NetBackup for Enterprise Vault Agent Administrator's Guide The software described in this book is furnished

More information

Symantec Security Information Manager FIPS Operational Mode Guide

Symantec Security Information Manager FIPS Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5. Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.x For Windows 2000, Windows Server 2003, and Windows XP SQL

More information

Building on Symantec Corporation s proven technology, PGP Desktop 10.2 for Mac OS X includes numerous improvements and the following new features.

Building on Symantec Corporation s proven technology, PGP Desktop 10.2 for Mac OS X includes numerous improvements and the following new features. 1 of 9 Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP Desktop for Mac OS X. Symantec Corporation strongly recommends

More information

Wise Mobile Device Package Editor Reference

Wise Mobile Device Package Editor Reference Wise Mobile Device Package Editor Reference Mobile Device Package Editor The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of

More information

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

Veritas System Recovery 18 Linux Edition: Quick Installation Guide Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Veritas SaaS Backup for Salesforce

Veritas SaaS Backup for Salesforce Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Migrating Enterprise Vault to 64-bit hardware 9.0 Symantec Enterprise Vault: Migrating Enterprise Vault to 64-bit hardware The software described in this book is

More information

Veritas SaaS Backup for Office 365

Veritas SaaS Backup for Office 365 Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide The software described in this book is furnished under

More information

Veritas Dynamic Multi-Pathing readme

Veritas Dynamic Multi-Pathing readme Veritas Dynamic Multi-Pathing readme Linux DMP 5.1 Rolling Patch 1 Patch 0 Veritas Dynamic Multi-Pathing Readme The software described in this book is furnished under a license agreement and may be used

More information

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights

More information

Symantec ServiceDesk 7.1 SP2 Portal User Guide

Symantec ServiceDesk 7.1 SP2 Portal User Guide Symantec ServiceDesk 7.1 SP2 Portal User Guide Symantec ServiceDesk 7.1 SP2 Portal User Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Altiris IT Analytics Solution 7.1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Data Loss Prevention System Maintenance Guide. Version 14.0

Symantec Data Loss Prevention System Maintenance Guide. Version 14.0 Symantec Data Loss Prevention System Maintenance Guide Version 14.0 Symantec Data Loss Prevention System Maintenance Guide Documentation version: 14.0b Legal Notice Copyright 2015 Symantec Corporation.

More information

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Veritas NetBackup for SQLite Administrator's Guide

Veritas NetBackup for SQLite Administrator's Guide Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the

More information

Veritas Storage Foundation Add-on for Storage Provisioning User's Guide. 4.0 Release Update 1

Veritas Storage Foundation Add-on for Storage Provisioning User's Guide. 4.0 Release Update 1 Veritas Storage Foundation Add-on for Storage Provisioning User's Guide 4.0 Release Update 1 Veritas Storage Foundation Add-on for Storage Provisioning The software described in this book is furnished

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide - Linux

Veritas Storage Foundation and High Availability Solutions Getting Started Guide - Linux Veritas Storage Foundation and High Availability Solutions 6.0.4 Getting Started Guide - Linux September 2013 Veritas Storage Foundation and High Availability Solutions Getting Started Guide The software

More information

Veritas Backup Exec Migration Assistant

Veritas Backup Exec Migration Assistant Veritas Backup Exec Migration Assistant Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2 Veritas NetBackup Copilot for Oracle Configuration Guide Release 2.7.2 Veritas NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.2 Legal Notice Copyright 2016 Veritas Technologies

More information

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping The software

More information

Symantec System Recovery 2013 R2 User's Guide. Windows Edition

Symantec System Recovery 2013 R2 User's Guide. Windows Edition Symantec System Recovery 2013 R2 User's Guide Windows Edition Symantec System Recovery 2013 R2 User's Guide Documentation version: 2015 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Windows Server 2003 (x64), Windows Server 2008 and 2008 R2 (x64) 5.1 Service Pack 2 06/13/2011 Symantec ApplicationHA

More information

Symantec Mobile Management 7.1 Implementation Guide

Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault PST Migration 11.0 Symantec Enterprise Vault: PST Migration The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007 Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007 Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 October 2011 Veritas

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 5.1 Service Pack 2 September 2011 Symantec ApplicationHA

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 1 Veritas Storage Foundation

More information

Symantec Enterprise Security Manager Modules for IBM DB2 Databases (Windows) User s Guide 3.0. Release for Symantec ESM 6.5.x and 9.

Symantec Enterprise Security Manager Modules for IBM DB2 Databases (Windows) User s Guide 3.0. Release for Symantec ESM 6.5.x and 9. Symantec Enterprise Security Manager Modules for IBM DB2 Databases (Windows) User s Guide 3.0 Release for Symantec ESM 6.5.x and 9.0 for Windows Symantec Enterprise Security Manager Modules for IBM DB2

More information

Symantec LiveUpdate Administrator 2.3 User's Guide

Symantec LiveUpdate Administrator 2.3 User's Guide Symantec LiveUpdate Administrator 2.3 User's Guide Symantec LiveUpdate Administrator 2.3 User's Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Troubleshooting OWA Extensions 8.0 Symantec Information Foundation Symantec Enterprise Vault: Troubleshooting OWA Extensions The software described in this book

More information

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines HP-UX 11i v3 5.0.1 Veritas Storage Foundation and High Availability Solutions Application

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Database Agent for Microsoft SQL Configuration

More information

Symantec NetBackup for Microsoft Exchange Server Administrator s Guide

Symantec NetBackup for Microsoft Exchange Server Administrator s Guide Symantec NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft Exchange Server Administrator's Guide The software described in this book

More information

PGP NetShare Quick Start Guide version 9.6

PGP NetShare Quick Start Guide version 9.6 PGP NetShare Quick Start Guide version 9. What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. You can use PGP NetShare to: Let

More information

Symantec NetBackup PureDisk Storage Pool Installation Guide

Symantec NetBackup PureDisk Storage Pool Installation Guide Symantec NetBackup PureDisk Storage Pool Installation Guide Windows, Linux, and UNIX Release 665 Revision 1 The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Enterprise Security Manager Agent, Manager, Console Update for Windows Server 2008

Symantec Enterprise Security Manager Agent, Manager, Console Update for Windows Server 2008 Symantec Enterprise Security Manager 6.5.3 Agent, Manager, Console Update for Windows Server 2008 2 Symantec Enterprise Security Manager 6.5.3 Agent, Manager, Console Update for Windows Server 2008 Symantec

More information

Symantec NetBackup Plug-in for VMware vsphere Web Client Guide. Release 7.6.1

Symantec NetBackup Plug-in for VMware vsphere Web Client Guide. Release 7.6.1 Symantec NetBackup Plug-in for VMware vsphere Web Client Guide Release 7.6.1 NetBackup Plug-in for VMware vsphere Web Client Guide Documentation version: 7.6.1 Legal Notice Copyright 2015 Symantec Corporation.

More information

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO Veritas Desktop and Laptop Option 9.2 High Availability (HA) with DLO 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used

More information

Symantec Corporation NetBackup for Microsoft Exchange Server Administrator s Guide

Symantec Corporation NetBackup for Microsoft Exchange Server Administrator s Guide Symantec Corporation NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 7.1 Symantec Corporation NetBackup for Microsoft Exchange Server Administrator s Guide The software

More information

Veritas Disaster Recovery Advisor Release Notes

Veritas Disaster Recovery Advisor Release Notes Veritas Disaster Recovery Advisor Release Notes AIX, ESX, HP-UX, Linux, Solaris, Windows Server 6.0 2 Veritas Disaster Recovery Advisor Release Notes Legal Notice Copyright 2012 Symantec Corporation. All

More information

Veritas Dynamic Multi-Pathing for Windows Release Notes

Veritas Dynamic Multi-Pathing for Windows Release Notes Veritas Dynamic Multi-Pathing for Windows Release Notes Windows Server 2003, Windows Server 2008 5.1 Veritas Dynamic Multi-Pathing for Windows Release Notes The software described in this book is furnished

More information

Security Content Update Release Notes. Versions: CCS 11.1.x and CCS 11.5.x

Security Content Update Release Notes. Versions: CCS 11.1.x and CCS 11.5.x Security Content Update 2017-1 Release Notes Versions: CCS 11.1.x and CCS 11.5.x SCU 2017-1 Release Notes for CCS 11.1.x and CCS 11.5.x Legal Notice Copyright 2017 Symantec Corporation. All rights reserved.

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control. For Microsoft Windows

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control. For Microsoft Windows Client Guide for Symantec Endpoint Protection and Symantec Network Access Control For Microsoft Windows Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described

More information

Symantec Endpoint Encryption Full Disk for Mac OS X

Symantec Endpoint Encryption Full Disk for Mac OS X Symantec Endpoint Encryption Full Disk for Mac OS X User's Guide 8.2.1 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec Encryption Management Server

Symantec Encryption Management Server Symantec Encryption Management Server Upgrade Guide 3.3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version

More information

How to install the software of ZNS8022

How to install the software of ZNS8022 How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run

More information