Partner Information. Integration Overview Authentication Methods Supported
|
|
- Francis Perkins
- 5 years ago
- Views:
Transcription
1 Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security Code Validation & ID Protection (VIP) Enterprise Gateway Intelligent Authentication (IA) This document describes how to integrate the FirePass VPN device with VIP Enterprise Gateway to allow the following security code authentication methods: Scheme 1: User Name - Security Code (page 1). In this scheme, the first factor is validated by VIP Enterprise Gateway, and the second factor is validated by your Active Directory (AD). Scheme 2: User Name - Password - Security Code (page 3). In this scheme, both the first and second factors are validated by VIP Enterprise Gateway. Remote Access Integration Architecture Scheme 1: User Name - Security Code The following diagram illustrates how the User Name - Security Code authentication scheme is configured for the FirePass VPN device and VIP Enterprise Gateway. In this scheme, the first factor is validated by VIP Enterprise Gateway, and the second factor is validated by your Active Directory. VIP Integration Guide for FirePass VPN Page 1 of 39
2 Figure 1 Authentication process for scheme 1 1. The user enters his or her user name, password, and a security code. 2. The FirePass VPN device sends the user name and security code to the Validation Service for authentication. This is the first part of the two-factor authentication process. 3. The Validation Service authenticates the user name and security code with the VIP Authentication Service. 4. The user name and password is verified against your Active Directory by the FirePass VPN as the second part of the two-factor authentication process. VIP Integration Guide for FirePass VPN Page 2 of 39
3 5. If the user name and password are authenticated, the Active Directory will return group permission details to the FirePass VPN device along with the authentication response. 6. Based on this response, the user is allowed access to VPN service(s). Scheme 2: User Name - Password - Security Code The following diagram illustrates how the User Name - Password - Security Code authentication scheme is configured for the FirePass VPN device and VIP Enterprise Gateway. In this scheme, both the first and second factors are validated by VIP Enterprise Gateway. Figure 2 Authentication process for scheme 2 VIP Integration Guide for FirePass VPN Page 3 of 39
4 1. The user enters his or her user name, password, and a security code. 2. The user name, password, and security code are sent to the Validation Service by the FirePass VPN device. 3. The user name and password are authenticated by the Validation Service against your user store (AD/LDAP). This is the first part of the two-factor authentication process. If the user name and password is authenticated, the authentication response will include group permission details. 4. The Validation Service authenticates the user name and security code against the VIP Authentication Service. This is the second part of the two-factor authentication process. 5. If the user name and security code are successfully authenticated, the Validation Service returns an Access-Accept Authentication response including group permission details to FirePass VPN device. 6. Based on this response, the user is allowed access to VPN service(s). Integration Summary The following procedures describe how to configure the FirePass VPN device for two-factor authentication through VIP Enterprise Gateway. Refer to the documents listed and the remainder of this document for more details. Step 1. Install and configure VIP Enterprise Gateway Step 2. Configure the FirePass VPN device Complete the following procedures to configure the device: 1. Customize the URI 2. Enable Additional Domain Password for URI (User Name - Security Code Mode only) 3. Create and Configure Resource Group for Network Access 4. Create and Configure Master Groups and Authentication 5. Configure Dynamic Group Mapping Refer to Configure the FirePass VPN Device for procedures. Step 3. Configure and Test an End-user Configure and Test an End-user using FirePass customized URI (Web-access). Refer to Configure and Test an End-user for procedures. Install and Configure VIP Enterprise Gateway You must do the following: Install and Configure VIP Enterprise Gateway. Add the Validation Server in one of the following modes: o User Name - Security Code o User Name - Password - Security Code VIP Integration Guide for FirePass VPN Page 4 of 39
5 Configure the RADIUS LDAP group mapping in the Validation Server. Optionally, you can configure the RADIUS-LDAP mapping only if you want to authorize the user according to the LDAP or User Store configuration. For more information on these tasks, refer to VIP Enterprise Gateway Installation and Configuration Guide. Configure the FirePass VPN Device Complete the procedures in this section to configure the FirePass VPN device. These procedures apply for both authentication schemes, unless otherwise specified. Refer to the FirePass product documentation for specific details. Note: The screen shots in these procedures are taken from a FirePass Virtual Edition VPN (Version 7.0.1). Refer to the product documentation provided for your version of the FirePass VPN device for specific screen shots and procedures. Scheme 1: User Name - Security Code Step 1. Customize the URI 1. Log in to the FirePass admin portal using You will see a welcome page similar to Figure 3. VIP Integration Guide for FirePass VPN Page 5 of 39
6 Figure 3 FirePass Welcome page 2. Select Device Management Customization from left pane. 3. Click the URI Based Customization tab. VIP Integration Guide for FirePass VPN Page 6 of 39
7 Figure 4 FirePass URI-based Customization (Landing URIs) page 4. Either edit the existing URI or create a new URI: a. Enter a name in the Create Landing URI field (FirePass_UO in this example). b. Select Form-based Authentication. c. Click Apply. 5. The Configuring URI: FirePass_UO page appears, providing the option to customize the FirePass_UO URI (user login) page. a. Select Enable host-based customization. b. Change Password prompt to Security Code. c. Click Update. VIP Integration Guide for FirePass VPN Page 7 of 39
8 Figure 5 FirePass URI Customization (Configuring URI) page 6. Change colors, images, logo, text, message, and so on, to match your requirements. VIP Integration Guide for FirePass VPN Page 8 of 39
9 Step 2. Enable Additional Domain Password for URI 1. Select Users Global Settings from the left pane. Figure 6 FirePass User Global Settings page 2. Under Password, enable Display password input field last on logon page and click Update. 3. Under Additional Domain Password: a. Select FirePass_UO in the For Landing URI or Virtual Host: drop-down box. b. Enable Use extra domain password for single sign on. c. Change Extra domain password prompt: to Password. d. Click Update. VIP Integration Guide for FirePass VPN Page 9 of 39
10 Step 3. Create and Configure Resource Group for Network Access 1. Select Users Groups Resource Groups from left pane. Figure 7 FirePass Resource Group Create page 2. Either edit an existing resource group or click Create New Group. a. Enter a name in the New group name: field (FirePass_UO_Resources in this example). b. Configure the other setting on this page required. c. Click Create. The Resource Groups page appears. VIP Integration Guide for FirePass VPN Page 10 of 39
11 Figure 8 FirePass Resource Group page 3. Click Edit in the Network access column for FirePass_UO_Resources. VIP Integration Guide for FirePass VPN Page 11 of 39
12 Figure 9 FirePass Network Access configuration page 1 4. Under Client Settings Enter a connection name (FirePass_UO_VPN in this example), and click Update. VIP Integration Guide for FirePass VPN Page 12 of 39
13 Figure 10 FirePass Network Access configuration page 2 5. Under Configure IP Address Assignment verify that an IP assignment method is selected. Update other networking parameters as required, and click Update. 6. Configure other resources as required. Step 4. Create and Configure Master Groups and Authentication 1. Select Users Groups Master Groups in the left pane. The Master Groups page appears. VIP Integration Guide for FirePass VPN Page 13 of 39
14 Figure 11 FirePass Master Groups page 2. Either edit an existing master group or create a new group for RADIUS validation against the VIP Enterprise Gateway. a. Click Create new group. b. On the Create new group page, configure the new RADIUS server to point to your VIP Enterprise Gateway Validation server and click Create. Use the default settings except for the following: Provide the new group name (FirePass_UO_Master in this example). Select External for Users in group. Select RADIUS as the Authentication method. VIP Integration Guide for FirePass VPN Page 14 of 39
15 Figure 12 FirePass Create new group page 3. Select the Authentication tab. The RADIUS Authentication page appears. VIP Integration Guide for FirePass VPN Page 15 of 39
16 Figure 13 Radius authentication settings page a. Enter your VIP Enterprise Gateway Validation server details under Primary RADIUS server and click Save. b. You will be prompted to test your RADIUS server settings. Enter a test user in the Username field. Enter the user s password and security code in the Password field. Click Test RADIUS Settings. The page will display passed or denied, based upon the RADIUS authentication result. VIP Integration Guide for FirePass VPN Page 16 of 39
17 Figure 14 Test radius authentication response page 4. Select the Authentication tab. VIP Integration Guide for FirePass VPN Page 17 of 39
18 Figure 15 Active Directory authentication settings page a. Enable Verify domain password against Active Directory server. b. Provide your Active Directory details. c. Click Save. d. You will be prompted to test your Active Directory settings. Enter a test user in the Username field. Enter the user s domain password in the Password field. Click Test Active Directory Authentication. The page will display passed or denied, based upon the Active Directory authentication result. VIP Integration Guide for FirePass VPN Page 18 of 39
19 Figure 16 Test Active Directory settings response page Step 5. Configure Dynamic Group Mapping 1. Go to Users Groups Dynamic Group Mapping from the left pane. 2. Select the Group mapping sequence tab. VIP Integration Guide for FirePass VPN Page 19 of 39
20 Figure 17 Group mapping sequence page a. Enable the Fallback master group option if not already enabled. b. Add the FirePass_UO_Master group to the Fallback master groups table if not already added. c. Enable the global resource group mapping table option under Resource Group Mapping Sequence if not already enabled. VIP Integration Guide for FirePass VPN Page 20 of 39
21 3. Click the Group mapping methods tab. a. Set the New group mapping method as Active Directory. b. Click Configure for Active Directory group mapping method. c. Provide your Active Directory details and group mapping attribute. d. Click Update. Figure 18 Mapping method configuration page 4. Click the Resource group mapping table tab. VIP Integration Guide for FirePass VPN Page 21 of 39
22 Figure 19 Resource group mapping table page a. Set the mapping method as Active Directory and click Add. b. Provide the Active Directory group name and map it to the FirePass group. c. Complete any other mapping as required, and click Add. d. You will be prompted to test your Mapping settings. Enter a test user in the Username field. Enter the user s domain password in the Password field. Click Test. The page will display the mapping result, based upon the group mapping parameters provided. VIP Integration Guide for FirePass VPN Page 22 of 39
23 Figure 20 Test resource group mapping table response page 5. Select Users Groups Master Groups from the left pane again and click FirePass_UO_Master from the group list. The Master group page appears. VIP Integration Guide for FirePass VPN Page 23 of 39
24 Figure 21 Edit master group general settings a. Select the General tab. b. Enable the global dynamic resource mapping option. c. Select FirePass_UO_URI as landing the URI. d. Click Update. VIP Integration Guide for FirePass VPN Page 24 of 39
25 Scheme 2: User Name - Password - Security Code Step 1. Customize the URI Customize the URI using the procedures in Step 1. Customize the URI under Scheme 1: User Name - Security Code with the following exceptions: Use a URI that is unique to this implementation (for example, FirePass_ULO) in the Create Landing URI field of the FirePass URI-based Customization (Landing URIs) page. Change Password prompt to Password + Security Code in the FirePass URI Customization (Configuring URI page. Note: If you are configuring Intelligent Authentication (IA), keep the Password prompt to Password. Step 2. Create and Configure Resource Group for Network Access Create and configure the resource group using the procedures in Step 3. Create and Configure Resource Group for Network Access under Scheme 1: User Name - Security Code, except use a resource group name unique to this implementation (for example, FirePass_ULO_Resources) in the New group name field on the FirePass Resource Group Create page. Step 3. Create and Configure Master Groups and Authentication 1. Select Users Groups Master Groups from the left pane. The Master Groups page appears. 2. Either edit an existing master group or create a new group for RADIUS validation against the VIP Enterprise Gateway. a. Click Create new group. b. On the Create new group page, configure the new RADIUS server to point to your VIP Enterprise Gateway Validation server and click Create. Use the default settings except for the following: Provide the new group name (FirePass_ULO_Master, in this example). Select External for Users in group. Select RADIUS as the Authentication method. 3. Select the Authentication tab. The RADIUS Authentication page appears. a. Enter your VIP Enterprise Gateway Validation server details under Primary RADIUS server and click Save. b. You will be prompted to test your RADIUS server settings. Enter a test user in the Username field. Enter the user s password and security code in the Password field. Click Test RADIUS Settings. The page will display passed or denied based upon RADIUS authentication result. Step 4. Configure Dynamic Group Mapping 1. Follow steps 1 and 2 in Step 5. Configure Dynamic Group Mapping under Scheme 1: User Name - Security Code. VIP Integration Guide for FirePass VPN Page 25 of 39
26 2. Click the Group mapping methods tab. a. Set the New group mapping method as RADIUS b. Click Configure for RADIUS group mapping method. c. Provide your RADIUS details and group mapping attribute. d. Click Update Figure 22 Mapping method configuration page 3. Select the Resource group mapping table tab. VIP Integration Guide for FirePass VPN Page 26 of 39
27 a. Set the mapping method as RADIUS and click Add. b. Provide the RADIUS group name and map it to the FirePass group. c. Complete any other mapping as required, and click Add. d. You will be prompted to test your Mapping settings. Enter a test user in the Username field. Enter the password and security code in the Password field. Click Test. The page will display the mapping result, based upon the group mapping parameters provided. Figure 23 Resource group mapping table page 4. Complete the remaining steps as described in Step 5. Configure Dynamic Group Mapping under Scheme 1: User Name - Security Code. Configure and Test an End-user Note: The screen shots in these procedures are taken from a system running Windows 2003 and Firefox 4.0. Refer to the product documentation provided for your operating system and browser for specific screen shots and procedures. VIP Integration Guide for FirePass VPN Page 27 of 39
28 Scheme 1: User Name - Security Code 1. On the client workstation, open in the browser. The logon page appears. If you do not see the logon page, clear your history, reset cookies, close all sessions, and open a new browser. Figure 24 Client Web Access page for scheme 1 2. Provide the user name and the password+security code, and then click Logon. On a successful logon you will see a home page similar to Figure 25. VIP Integration Guide for FirePass VPN Page 28 of 39
29 Figure 25 FirePass user home page 3. Click on the connection name (FirePass_UO_VPN in this example). 4. A dialog box will appear, prompting you to install an ActiveX browser component. a. Click on the link to install the browser component. VIP Integration Guide for FirePass VPN Page 29 of 39
30 Figure 26 Installation instruction page 1 b. If automatic installation fails, go to manual installation, download the zip file and extract it in the <Firefox Home Dir>\Plugins folder. Figure 27 Installation instruction page 2 VIP Integration Guide for FirePass VPN Page 30 of 39
31 5. Click on the connection name again (FirePass_UO_VPN). A dialog box will appear warning you that the SSL certificate is not trusted. Click Yes to proceed. Figure 28 Security alert page 6. A dialog box will appear warning you that the SSL certificate could not be verified. Click Yes to proceed. Figure 29 SSL security warning page VIP Integration Guide for FirePass VPN Page 31 of 39
32 7. The workstation will connect to FirePass_UO_VPN Figure 30 FirePass VPN connection message 8. If you click the connection message, a dialog box will appear showing the server/client IPs. Figure 31 FirePass Server/Client IPs 9. The Connection window will show that the connection was established successfully. VIP Integration Guide for FirePass VPN Page 32 of 39
33 Figure 32 Connection window showing connection established successfully Scheme 2: User Name - Password - Security Code 1. On the client workstation, open in the browser. The logon page appears. If you do not see the logon page, clear your history, reset cookies, close all sessions, and open a new browser. VIP Integration Guide for FirePass VPN Page 33 of 39
34 Figure 33 Client Web Access page for scheme 2 2. Provide the user name and the password+security code, and then click Logon. On a successful logon you will see a home page similar to Figure 34. VIP Integration Guide for FirePass VPN Page 34 of 39
35 Figure 34 FirePass user home page 3. Complete the remaining steps described in Scheme 1: User Name - Security Code under Configure and Test an End-user. VIP Integration Guide for FirePass VPN Page 35 of 39
36 Troubleshooting FirePass VPN Device Logs Most FirePass logs are available under Reports on the left pane. Refer to these logs to troubleshoot issues with the FirePass VPN device. For Logon logs, click Reports Logon For Session logs, click Reports Sessions VIP Enterprise Gateway Validation Server Logs Validation server logs are configured and available on the VIP Enterprise Gateway. Refer to these logs to troubleshoot issues with the Validation server. Refer to VIP Enterprise Gateway online help for procedures on configuring and accessing these logs. General Troubleshooting If Dynamic Group Mapping is configured for Master Groups in the FirePass VPN device, and a user who belongs to static master group tries to login, the user will be denied access. Do not configure dynamic resource group mapping inside an individual master group. Always use global dynamic resource group mapping option. FirePass URIs are cookies-based. If you are unable to view a required page, reset cookies and open a new browser. VIP Integration Guide for FirePass VPN Page 36 of 39
37 VIP Intelligent Authentication Integration for FirePass VPN This chapter includes the following topics: Configure Intelligent Authentication with VIP Components Generate Intelligent Authentication Code from VIP Manager Update the Sign-In Page of FirePass VPN Configure Intelligent Authentication with VIP Components You must configure VIP IA with VIP Manager and VIP Enterprise Gateway (EG) before you update the sign-in page of the integration module. For details, refer to Symantec VIP Intelligent Authentication Enterprise Integration Guide (IA_Enterprise_Integration.pdf), which you can download from the Intelligent Authentication folder in VIP Manager. Generate Intelligent Authentication Code from VIP Manager If FirePass VPN is configured with the User Name - Security Code authentication mode, select the Manual method. Then, you must select the User Name + Security Code authentication mode to generate the VIP integration code. FirePass VPN default sign-in page has the following values: User Name Field Name: username Password Field Name: dpassword Security Code Field Name: password Form Name: e1 If FirePass VPN is configured with the User Name - Password - Security Code authentication mode, select the Manual method. Then, you must select the User Name + LDAP Password + Security Code authentication mode to generate the VIP integration code. FirePass VPN default sign-in page has the following values: User Name Field Name: username Password Field Name: password Form Name: e1 Note: These values are retrieved from FirePass Virtual Edition If you are using a different version of FirePass VPN, you must refer to the sign-in page of your FirePass VPN module for the correct values. If you have created your own sign-in page, make sure that the field names you use to generate the VIP integration code are the same you have in the customized sign-in page. Update the Sign-In Page of FirePass VPN Note: Use WebDAV (sandbox) method to customize the sign-in page. For more information on customizing the sign-in page using WebDAV (sandbox) method, refer to the FirePass VPN documentation. VIP Integration Guide for FirePass VPN Page 37 of 39
38 1. Create a customized sign-in page for FirePass VPN or copy the source code of the default sign-in page. Save it as index.htm. 2. Paste the VIP integration code, which you have generated within VIP Manager, between the <head> and the </head> tags of this file. 3. Save the index.htm page at /sandbox. Note: If you are configuring FirePass VPN with the User Name - Security Code authentication mode, you must hide the Security Code field. VIP Integration Guide for FirePass VPN Page 38 of 39
39 Copyright Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign, VeriSign Trust, and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , et seq. Commercial Computer Software and Commercial Computer Software Documentation, as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. This document may describe features and/or functionality not present in your software or your service agreement. Contact your account representative to learn more about what is available with this Symantec product. Symantec Corporation 350 Ellis Streets Mountain View, CA VIP Integration Guide for FirePass VPN Page 39 of 39
Partner Information. Integration Overview. Remote Access Integration Architecture
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise
More informationVeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide
VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished
More informationSymantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App
Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished
More informationSymantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.
Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.0) Release Notes Express Security Content Update for Microsoft Windows Server 2008
More informationSymantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017
VIP Credential Development Kit Release Notes Version 2.0.8 May 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important information about the Symantec
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationSymantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017
VIP Credential Development Kit Release Notes Version 2.0.7 January 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important and late-breaking information
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement
More informationSymantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes
Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3 Release Notes Express Security Content Update for JBoss Enterprise Application Platform 6.3
More informationSymantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started
Symantec Cloud Workload Protection on AWS Marketplace Buyer's Guide for Getting Started The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationSymantec Ghost Solution Suite Web Console - Getting Started Guide
Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.
More informationSymantec Protection Center Getting Started Guide. Version 2.0
Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationEnterprise Vault Requesting and Applying an SSL Certificate and later
Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only
More informationVeritas SaaS Backup for Office 365
Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationSymantec ediscovery Platform
Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished
More informationVeritas SaaS Backup for Salesforce
Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement
More informationSymantec VIP. Integration Guide for Citrix NetScaler
Symantec VIP Integration Guide for Citrix NetScaler Legal Notice Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered
More informationVeritas Desktop and Laptop Option Mobile Application Getting Started Guide
Veritas Desktop and Laptop Option Mobile Application Getting Started Disclaimer Contents The software described in this document is furnished under a license agreement and may be used only in accordance
More informationCreating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility
Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationVeritas ediscovery Platform
Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software
More informationEnterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later
Versions of FSA Agent and 2007 or later : Versions of FSA Agent and Last updated: 2018-04-05. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo,, Compliance
More informationVeritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)
Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service
More informationSymantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software
More informationVeritas Backup Exec Migration Assistant
Veritas Backup Exec Migration Assistant Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies
More informationEnterprise Vault.cloud Journaling Guide
Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas
More informationVeritas Enterprise Vault Guide for Mac OS X Users 12.2
Veritas Enterprise Vault Guide for Mac OS X Users 12.2 Veritas Enterprise Vault: Guide for Mac OS X Users Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.
More informationPatch Assessment Content Update Getting Started Guide for CCS 12.0
Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license agreement and may
More informationVeritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2
Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017
More informationSymantec Workflow Solution 7.1 MP1 Installation and Configuration Guide
Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement
More informationVeritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios
Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only
More informationVeritas Desktop and Laptop Option Mac Getting Started Guide
Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationPGP Viewer for ios. Administrator s Guide 1.0
PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.
More informationSymantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10
Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this
More informationSymantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide
Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationVeritas Backup Exec Quick Installation Guide
Veritas Backup Exec Quick Installation Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies
More informationPatch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x
Patch Assessment Content Update Getting Started Guide for CCS 11.1.x and CCS 11.5.x Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license
More informationVeritas Deployment Manager User's Guide
Veritas Deployment Manager User's Guide Last updated: 2017-10-03 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks
More informationVeritas Desktop Agent for Mac Getting Started Guide
Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation
More informationSymantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide
Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:
More informationAltiris Software Management Solution 7.1 from Symantec User Guide
Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationEnterprise Vault Guide for Outlook Users
Enterprise Vault Guide for Outlook Users (Full Functionality) 12.3 Enterprise Vault : Guide for Outlook Users Last updated: 2018-03-29. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights
More informationVeritas System Recovery 18 Management Solution Administrator's Guide
Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationEnterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later
Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator 12.2 or later Enterprise Vault : Migrating Data Using the Microsoft Azure Blob Storage Migrator Last updated: 2018-04-12.
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationUser Guide. We protect more people from more online threats than anyone in the world.
User Guide We protect more people from more online threats than anyone in the world. Care for our Environment, It's the right thing to do. Symantec has removed the cover from this manual to reduce the
More informationPGP NetShare FlexResponse Plug-In for Data Loss Prevention
PGP NetShare FlexResponse Plug-In for Data Loss Prevention Implementation Guide 10.2 The software described in this book is furnished under a license agreement and may be used only in accordance with
More informationVeritas Data Insight Software Compatibility List 6.1.1
Veritas Data Insight Software Compatibility List 6.1.1 Documentation version: 6.1.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks
More informationPGP Viewer for ios. User s Guide 1.0
PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:
More informationSymantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note Troubleshooting OWA Extensions 8.0 Symantec Information Foundation Symantec Enterprise Vault: Troubleshooting OWA Extensions The software described in this book
More informationEnterprise Vault Troubleshooting FSA Reporting. 12 and later
Enterprise Vault Troubleshooting FSA Reporting 12 and later Enterprise Vault : Troubleshooting FSA Reporting Last updated: 2018-04-17. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved.
More informationSymantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
More informationEnterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later
Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal
More informationPartner Management Console Administrator's Guide
Partner Management Console Administrator's Guide Partner Management Console Administrator's Guide Documentation version: November 17, 2017 Legal Notice Copyright 2017 Symantec Corporation. All rights reserved.
More informationVeritas Data Insight 6.1 Software Compatibility List 6.1
Veritas Data Insight 6.1 Software Compatibility List 6.1 November 2017 Documentation version: 6.1.0 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationNetBackup Copilot for Oracle Configuration Guide. Release 2.7.1
NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights
More informationEnterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator
Enterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator 12 Enterprise Vault : Using SQL Database Roles in Enterprise Vault, Compliance Accelerator,
More informationVeritas Enterprise Vault Setting up SharePoint Server Archiving 12.2
Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2 Veritas Enterprise Vault: Setting up SharePoint Server Archiving Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies
More informationSymantec ServiceDesk 7.1 SP2 Portal User Guide
Symantec ServiceDesk 7.1 SP2 Portal User Guide Symantec ServiceDesk 7.1 SP2 Portal User Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec PGP Viewer for ios
Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.
More informationConfiguring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms
Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified
More informationSymantec Enterprise Vault Technical Note
Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in
More informationSymantec ServiceDesk 7.1 SP1 Implementation Guide
Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.
Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.x For Windows 2000, Windows Server 2003, and Windows XP SQL
More informationVeritas NetBackup OpenStorage Solutions Guide for Disk
Veritas NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 8.0 Veritas NetBackup OpenStorage Solutions Guide for Disk Legal Notice Copyright 2016 Veritas Technologies LLC. All
More informationVeritas Access Enterprise Vault Solutions Guide
Veritas Access Enterprise Vault Solutions Guide Linux 7.4.1 Veritas Access Enterprise Vault Solutions Guide Last updated: 2018-07-31 Document version: 7.4.1 Rev 0 Legal Notice Copyright 2018 Veritas Technologies
More informationConfiguring Symantec. device
Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be
More informationVeritas NetBackup for Lotus Notes Administrator's Guide
Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016
More informationSecurity Content Update Release Notes for CCS 12.x
Security Content Update 2018-1 Release Notes for CCS 12.x SCU 2018-1 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,
More informationVeritas System Recovery 16 Management Solution Administrator's Guide
Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationVeritas Storage Foundation and High Availability Solutions Getting Started Guide
Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 21213723 (October 2011) Veritas Storage Foundation and High
More informationNetBackup Self Service Release Notes
NetBackup Self Service Release Notes 7.7.3 Document version: 1 Veritas NetBackup Self Service Release Notes Document version: 7.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC. All rights reserved.
More informationSymantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide
Symantec Mail Security for Microsoft Exchange 7.9 Guide Symantec Mail Security for Microsoft Exchange Guide The software described in this book is furnished under a license agreement and may be used only
More informationVeritas NetBackup for SQLite Administrator's Guide
Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Deployment Scanner 10.0 Symantec Enterprise Vault: Deployment Scanner The software described in this book is furnished under a license agreement and may be used only in accordance
More informationStorage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013
Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013 Windows 7.1 April 2016 Storage Foundation and High Availability Solutions HA and
More informationVeritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server
Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Application Note: High Availability
More informationVeritas CommandCentral Enterprise Reporter Release Notes
Veritas CommandCentral Enterprise Reporter Release Notes for Microsoft Windows and Solaris 5.2 RU3 February 2012 CommandCentral Enterprise Reporter Release Notes The software described in this book is
More informationSymantec NetBackup for Lotus Notes Administrator's Guide. Release 7.6
Symantec NetBackup for Lotus Notes Administrator's Guide Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationSymantec Enterprise Security Manager JRE Vulnerability Fix Update Guide
Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under
More informationSymantec Mobile Management 7.1 Implementation Guide
Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in
More informationVeritas Storage Foundation and High Availability Solutions Getting Started Guide
Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 21271162 (October 2012) Veritas Storage Foundation and High
More informationVeritas System Recovery 18 Linux Edition: Quick Installation Guide
Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are
More informationEnterprise Vault.cloud Archive Migrator Guide. Archive Migrator versions 1.2 and 1.3
Enterprise Vault.cloud Archive Migrator Guide Archive Migrator versions 1.2 and 1.3 Enterprise Vault.cloud: Archive Migrator Guide Last updated: 2018-01-09. Legal Notice Copyright 2018 Veritas Technologies
More informationIM: Symantec Security Information Manager Patch 4 Resolved Issues
IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement
More informationVeritas ediscovery Platform
Veritas ediscovery Platform Release Notes 9.0.1 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 9.0.1 The software described in this book is furnished under a license agreement and may
More informationEnterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later
Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-12-03. Legal
More informationVeritas Enterprise Vault Managing Retention 12.1
Veritas Enterprise Vault Managing Retention 12.1 Veritas Enterprise Vault: Managing Retention Last updated: 2017-10-24. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas,
More informationConfiguring Symantec AntiVirus for BlueArc Storage System
Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be
More informationSymantec NetBackup Vault Operator's Guide
Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may
More informationSymantec Security Information Manager FIPS Operational Mode Guide
Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide The software described in this book is furnished
More informationSymantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.
Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small
More informationVeritas NetBackup Appliance Security Guide
Veritas NetBackup Appliance Security Guide Release 2.7.3 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Document version: 2.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC.
More informationVeritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server
Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Storage
More informationVeritas Enterprise Vault Setting up the Enterprise Vault Office Mail App and later
Veritas Enterprise Vault Setting up the Enterprise Vault Office Mail App 10.0.3 and later Veritas Enterprise Vault: Setting up the Enterprise Vault Office Mail App Last updated: 2017-10-24. Legal Notice
More informationVeritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO
Veritas Desktop and Laptop Option 9.2 High Availability (HA) with DLO 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used
More information