Symantec Drive Encryption Evaluation Guide

Size: px
Start display at page:

Download "Symantec Drive Encryption Evaluation Guide"

Transcription

1 Symantec Drive Encryption Evaluation Guide

2 Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a Proof-of-Concept) so this document details system requirements and deployment considerations for the Symantec Encryption Management Server, as well as for clients that will have the Symantec Encryption Desktop software installed on them. Make sure that you complete the Steps To Do Before Starting Evaluation checklist on the next page in advance of the evaluation. If the customer will be purchasing hardware make sure to give them the Technical Requirements early enough that they can order and receive the hardware. Also, keep in mind that the Technical Requirements listed in this document are scaled down for an evaluation. A link to actual product hardware specifications for production systems is included in the Technical Requirements section. Contents Drive Encryption Checklist... 3 Notes... 4 Drive Encryption Evaluation Architecture... 5 Technical Requirements... 6 Installation and Configuration Steps Symantec Encryption Management Server... 8 Installation and Configuration Steps Drive Encryption Client Reference material Test Plan... 16

3 Drive Encryption Checklist Use the following checklists as an overview of the steps that need to be accomplished for the evaluation. Steps To Do Before Starting Evaluation Give the customer this document, which has both the technical requirements for Symantec Encryption Management Server and a suggested test plan. Ask the customer to prepare a compatible environment before your arrival. This will include: o Install (or verify the availability of a) directory server o Create directory user accounts o At least one client machine o Create a virtual machine for Symantec Encryption Management Server (or physical hardware). Specific system and network requirements are located in the Technical Requirements section of this document. Configure DNS for the directory server and for the Symantec Encryption Management Server Install the Operating System for (or verify the availability of) at least one client machine Download the Symantec Encryption Management Server from here Ensure network connectivity between client and directory server If you want the customer to install the server on their own provide them with the Symantec Encryption Management Server Installation Guide and this document. The most current install guide can always be found here. If the customer will complete the entire Evaluation or potions of the Evaluation on their own, provide the customer the Drive Encryption installation and configuration instructions in this document. Evaluation Steps Install Symantec Encryption Management Server (SEMS) Complete post-installation setup of SEMS. Configure: o Organization keys / ADK (if necessary) o Directory Synchronization o Consumer Groups (if necessary) o Consumer Policy Download and install Symantec Encryption Desktop Client Reboot client and verify completion of enrollment process Install other clients as desired Reboot client and verify BootGuard Perform desired tests from Test Plan section of this document 3

4 Notes This document has been written to work for customers, Symantec Sales Engineers and partner Technical Pre-Sales Engineers. This document refers to concepts and interfaces specific to the product. For best help, contact an Encryption specialized Partner, available here. E-learning is free and available here and a weeklong, hands-on product training called Symantec Encryption Management Server Install, Configure, and Deploy. This document assumes the reader has access to Symantec Encryption technical publications and Symantec File Connect This document is for a typical Symantec Drive Encryption Evaluation. It does not cover the use of Smart Cards, using multiple LDAP groups, or scripted installation or deployment This Evaluation assumes the use of a lab environment which is recommended for testing. If production equipment will be used please make sure that a current backup of all related systems is taken and that the current release notes are checked for potential incompatibilities. It is also recommended that any production client systems be decrypted before the test Symantec Encryption Management Server system is taken offline or deleted 4

5 Drive Encryption Evaluation Architecture Symantec Encryption Management Server 1 Existing directory group and user information can be accessed by the Symantec Encryption Management Server and utilized to assign encryption settings to various users. 2 The Symantec Encryption Management Server houses all settings and user information, as well as all reporting and recovery data. 3 The Symantec Desktop client for Drive Encryption is installed on endpoint systems and periodically updates policy with the Symantec Encryption Management Server using a secure connection over port 443. The Symantec Drive Encryption Management System, known as Symantec Encryption Management Server, is designed to be a simple addition to an existing infrastructure. By using a combination of standards-based utilities and customized components encapsulated in a soft appliance, the Symantec Encryption Management Server offers fast deployments, web-based management, and minimal need for training, rollout, and support costs. By bringing all encryption features into a single client package and by managing it with a single console, Symantec Drive Encryption offers our customers the most comprehensive data protection suite in the industry and the ability to easily enable what is needed and disable what isn t. The Symantec Encryption Management Server also synchronizes and gathers information from LDAP servers, such as an Active Directory server. This allows an organization to simply assign Drive Encryption different features and functionality to various groups of users if necessary and allows users to easily be excluded as part of a phased rollout. 5

6 Symantec Drive Encryption operates on most Windows Operating Systems, current Mac OS X systems, and several versions of Linux. Technical Requirements All systems that are part of the evaluation should meet or exceed the minimum system requirements defined below. Symantec Encryption Management Server - Management Server Requirements Component Processor Memory Hard Disk Operating System Other requirements Specifications 1.4 GHz Intel Pentium 4 or higher processor (or equivalent) 1 GB 15 GB Symantec Encryption Management Server is a self-contained soft appliance built on a CentOS core. Virtual environments are commonly used for testing Symantec Encryption Management Server VMware Workstation can be used for this test plan, though it is not supported in production environments. VMware vsphere 5 with VMware tools is supported Supports VMware vsphere with VMotion A separate LDAP server is recommended for the test environment but not required. For the most up to date hardware requirements go here. Symantec Drive Encryption Client Requirements Component Processor Memory Hard Disk Operating System Other requirements Specifications 223 MHz or faster 512 MB or more recommended 360 MB For specific system requirements for our encryption client go here. We support most versions of Windows starting with Windows XP through Windows 8.1. We also support most Windows Server versions starting with 2003 SP 1 up to Server 2008 R2. Mac OS X 10.7.x and 10.8.x (Intel Macs only). Ubuntu LTS (32-bit and 64-bit versions) and Red Hat Enterprise Linux (32-bit and 6t4-bit versions) Client machines should have DNS configured. Ping the Encryption Management Server FQDN and/or LDAP server to ensure connectivity. Also make sure that port 443 is open between the clients and the Encryption Management Server. If this port is blocked (which would be unusual) the clients will not be able to communicate with the Symantec Encryption Management Server. 6

7 A directory / DNS server: Also recommended for this evaluation is a computer running Windows Server 2003/2008, which is either the Domain Controller of a test domain or a member of an existing test domain. The server should have the following software installed: o Microsoft Active Directory o Microsoft Domain Name Services Other types of LDAP servers are also supported. If you use a different type of server also make sure that DNS is configured for the environment Directory server port 389 (or 636 if using LDAPs) must be open between the Symantec Encryption Management Server and the directory server Both a host and pointer record should be created for Symantec Encryption Management Server. It is customary though not required to use the hostname keys for a Symantec Encryption Management Server or to at least have an alias record pointing to keys.domainname User accounts: You must have at least two user accounts in your test domain Preferably you will create at least three so you can do multi-user testing The accounts do not need any special domain privileges. Although the actual names of these accounts are optional suggested default usernames and the purpose of these accounts are: o pgpservice This account will be used as directory credentials on the Symantec Encryption Management Server (the Bind DN) so that the SEMS can read the directory server. Set password to never expire. Read only access to the directory is all this account needs o User1 - Used as the initial user on the client machines o User2 - Used as an additional user on the client machines Other environmental requirements include: Access over port 9000 (e.g. to the Symantec Encryption Management Server system for post installation configuration. This administration is done through a web browser from another machine. Consult the following list for other necessary ports: Port Protocol/Service Comment 53 Domain Name System (DNS) Access is needed from Symantec Encryption Management Server and the clients to a DNS server. 389 Lightweight Directory Access Protocol 443 Client-to-Server communication 636 Lightweight Directory Access Protocol, Secure (LDAPS) 9000 HyperText Transfer Protocol, Secure (HTTPS) Unsecure port for directory lookups from Encryption Management Server to directory. Use this or 636 if using LDAPS. Used for client policy updates and sending logging and recovery information. Secure port for directory lookups from Encryption Management Server to directory. Use this or 389 if using unsecured LDAP. Allows access to the Symantec Encryption Management Server administrative interface. 7

8 Local admin rights on each client system that will be used For more environmental considerations please consult the Symantec Encryption Management Server Installation Guide. The most current install guide can always be found here Installation and Configuration Steps - Encryption Management Server In this section we will briefly discuss the tasks that must be performed to prepare a Symantec Encryption Management Server for the test environment. Other documentation covers this in more detail, including the Symantec Encryption Management Server Installation Guide and the Symantec Encryption Management Server Administrator s Guide. This document will give only the steps necessary to prepare for this evaluation. Please download the most current Symantec Encryption Management Server Administrator's Guide and the most current Symantec Encryption Management Server Installation Guide to help you complete the tasks referenced here. You will also want to have Internet access to reference the KB article links. Other Symantec Encryption documentation can be found here. Important information for our environment Symantec Encryption Management Server hostname IP Address Administrator credentials Organization Key file location / passphrase (you will have this after installation of the server) LDAP Server hostname IP Address Administrator credentials Read-only LDAP username / password for encryption service account (Bind DN) Client machine name / user credentials Client machine name / user credentials Client machine name / user credentials VMware configuration 1) Consult page of the System Requirements section of the Symantec Encryption Management Server Installation Guide for directions on how to configure a Symantec Encryption Management Server Virtual Machine. 2) If you are testing on VMware Workstation the information above will also work for you. 8

9 Server installation 1) Use the Default Installation Procedure section of the Symantec Encryption Management Server Installation Guide on pages to complete a Default installation. The installation process typically takes minutes. 2) Wait for installation to complete. When it is finished the server will reboot to a Linux-like login prompt. Local login is disabled. The Setup Assistant (Chapter 6 of the Symantec Encryption Management Server Installation Guide) 1) Move to another computer that has a browser and network connectivity to the Symantec Encryption Management Server. 2) In a Web browser, connect to the Symantec Encryption Management Server by typing: in your browser address bar using the hostname or IP address you assigned. 3) Start the Setup Assistant. 4) Read and agree to the End User License Agreement. 5) Choose New Installation. 6) Review the network settings and make sure they are correct. 7) After you click Done the server will restart and apply the settings you have entered. 8) License the server using: User Name: Authorized User Company Name: Authorized Company Licensee <leave blank> License Number: DU4UT-XVF47-Q54TA-MYH22-2FQ3Y-YEC 9) Do not select Enable Mail Proxies. 10) Type an administrator name and passphrase. Confirm the passphrase. 11) Type in an administrator address to receive daily status s (optional). 12) Type in a primary domain to be managed by Symantec Encryption Management Server. (e.g. acmebank.com). 13) Unless it is part of a customized test plan do not configure an Ignition Key (click Skip). 14) Backup the Organization Key (this key protects backups and is needed to restore). Add a passphrase if you desire. Note the file location and passphrase in the Important information for our environment section on the previous page of this document. 15) Click Done and the server will once again apply the new settings and reboot. 16) Once it is finished it will come to a login prompt. Configure Directory Synchronization (Chapter 28 of the Symantec Encryption Management Server Administrator Guide) 1) Use the section Enabling Directory Synchronization on page 242 and the sections on pages to help you configure anything that is not clear in the instructions below. 2) Enable Directory Synchronization by logging into Symantec Encryption Management Server and going to Consumers > Directory Synchronization and clicking Enable. 3) Click Add LDAP Directory. 4) Type a name 5) Choose Active Directory (or OpenLDAP if you are not using Microsoft AD). 6) Skip the Bind DN field for now and click on the LDAP Servers tab. 9

10 7) Enter the hostname of your directory server. 8) Enter 389 for the port. 9) Select LDAP as the protocol. 10) Click Test Connection. If successful, continue the configuration. If not, verify the hostname and network settings. 11) Go back up to the Bind DN field and type in the User Principal Name or the Distinguished Name of the service account (pgpservice) that we asked you to create in the Technical Requirements section of this document. a) Try the UPN, or User Principal Name, first. Type the name in this syntax: b) Put in the user s password in the Passphrase field. c) Click Test Connection under the LDAP Servers tab again. If successful, continue the configuration by going to step 12. d) If it is not successful, you will have to determine and the user s Distinguished Name. A Distinguished Name gives the user s full directory path and username, separated by commas (e.g. CN=pgpservice, CN=users,DC=acmebank,DC=com). A program like ADSIEdit can help you determine your user s Distinguished Name. 12) Save the configuration. 13) Once saved, from the Directory Synchronization tab, click Settings. 14) Check the box that says Enroll Clients using directory authentication and save the changes. Configure Drive Encryption Settings 1) If your test plan requires you to test file and folder encryption, secure data deletion, or other encryption features, you will need assistance with customizing the following instructions because all other features besides Drive Encryption will be disabled once you are done with the next few steps. These instructions assume you are testing a Windows client. For Mac or Linux testing please contact your Symantec Technical Contact. 2) While logged into Symantec Encryption Management Server go to the Consumers > Consumer Policy tab. 3) Click on Default. 4) Click on Desktop in the Symantec Encryption Desktop section. 5) On the General tab change the following settings: a) Uncheck Allow users to change options. b) Uncheck Allow conventional encryption and self-decrypting archives. c) Check Enable Silent Enrollment. 6) On the Messaging & Keys tab change the following settings: a) Uncheck Messaging. b) Uncheck Key Management. 7) Click on the Zip & Shredder tab: a) Uncheck PGP Zip. b) Uncheck PGP Shredder. 8) Click on the File Share tab. a) Uncheck Symantec File Share Encryption for Windows. 9) Click on the Drive Encryption tab. a) Uncheck PGP Virtual Disk. b) Uncheck PGP Portable. 10

11 10) Now we will configure the actual Symantec Drive Encryption section, which is located on the Drive Encryption tab. 11) Some settings may need to be changed depending on your testing requirements and goals. 12) If you follow the settings below you will end up with settings that are designed to make the user experience very simple and provide multiple recovery options. 13) Match the settings on your server with the screenshots below: 11

12 14) Click Save. 12

13 Installation and Configuration Steps Symantec Encryption Desktop Client In this section we will download and install the Symantec Encryption Desktop client, which will enable Drive Encryption. Other documentation covers this in more detail, including the Symantec Encryption Management Server Installation Guide and the Symantec Encryption Management Server Administrator s Guide. This document will give only the steps necessary to prepare for this evaluation. Download Symantec Drive Encryption Desktop Client (Symantec Encryption Desktop) a) Go to Consumers > Groups. b) Click on Download Client c) Select Windows 32-bit or Windows 64-bit, depending on which client you are testing. d) If you are testing a Mac or Linux client consult with your Symantec Technical Contact as some of the settings configured above might need to be altered. e) Select desired language. f) Click Customize. g) Click Download and save the file. Install the Drive Encryption Client 1) Run the Symantec Encryption Desktop installer package that you just downloaded. 2) Follow the prompts and reboot when the installer asks you to do so. 3) If you want to time the initial encryption process note the current time: 4) After rebooting, log into Windows. 5) Enter Windows username and password into Symantec Encryption Enrollment screen when prompted. 6) Because you are utilizing a silent form of user setup you will not see many other indicators that your deployment has been successful. A couple of indicators that the initial encryption process is happening are: a) The PGP Notifier appears when the encryption process starts and stops: b) The Symantec Encryption Desktop lock icon in the System Tray will appear and a spinning black and yellow disk will be present while encrypting. 13

14 Congratulations! You have just deployed Symantec Drive Encryption! Continue to the next section to begin answering questions in the test plan. 14

15 Helpful links and reference material 1) For the Support KB landing page for Drive Encryption, go here. 2) Download the Symantec Encryption Desktop 10.3 (or the version that matches your installed version) User s Guide from here. You will probably find the Chapter Protecting Disks with Symantec Drive Encryption that starts on page 119 helpful, though we have already done most of the tasks described. If you want more information about each of the tasks that we accomplished or about options available consult this chapter. 3) In the Symantec Encryption Management Server Administrator s Guide you will also find the Administering Consumer Policy chapter useful. The various settings for Drive Encryption start on page 209, although once again, we have already configured most of the typical settings. This is more for informational purposes than to accomplish any specific task. If you need to modify any settings that we have configured this chapter will help you do that. 15

16 Test Plan A thorough and effective test plan is defined below. Before starting it, you might consider what will make a successful test in your environment. There are most likely compliance and other concerns that are driving your desire to test this software. You might consider defining the following before starting: 1) What are the most important features of this software to our company? a) Business concerns? b) Security concerns? c) Compliance requirements? 2) During testing, what are the results that I must have in order for this to be a success? 3) What is my one to two paragraph written test plan (mission statement for the Evaluation)? This is probably a summary of the answers to questions 1 and 2. 4) What additional Symantec features would I like to see, either as part of this test or as a separate undertaking? 5) What additional Symantec encryption features besides Drive Encryption will my company use? Do I need to test these features now? 16

17 Symantec Drive Encryption Windows Test Plan The following test criteria are not intended to represent any and all customer requirements for their disk encryption solution, rather to provide some guidance as to commonly tested features. To address specific requirements in your environment please consult with your Symantec Technical Sales Representative to assist in documenting these additional requirements The most typical concerns from our customers are: 1) User experience 2) Administrator experience 3) Recoverability So we have created some simple sample tests that will help you determine to your satisfaction whether or not each of these areas is a pass or fail. Some of these tests require some subjective grading as far as pass or fail, meaning that a 1-2 second delay in opening an application is nothing to most people but might be annoying in some environments where speeds are already slow. Most evaluations will not test everything listed below or perform as many iterations (test case 1-5) as listed. Client setup and initial encryption Test Case Pass/Fail Comments Automated encryption possible with our corporate software deployment mechanism? Operating System 1: Client installation works with our corporate image (or software) Operating System Operating System 2: Client installation works with our corporate image (or software) Operating System Operating System 3: Client installation works with our corporate image (or software) Operating System Client setup process is simple (or silent) Initial encryption time for a computer not being used Test 1 Machine name: Machine Specs: Test 2 Machine name: Machine Specs: Test 3 Machine name: Machine Specs: Test 4 Machine name: Machine Specs: 17

18 Test 5 Machine name: Machine Specs: Initial encryption time for a computer in use Test 1 Machine name: Machine Specs: Test 2 Machine name: Machine Specs: Test 3 Machine name: Machine Specs: Test 4 Machine name: Machine Specs: Test 5 Machine name: Machine Specs: Test 1 Approximate boot time before encryption for client: time: Approximate boot time after initial encryption is completed for client: time: Test 2 Approximate boot time before encryption for client: time: Approximate boot time after initial encryption is completed for client: time: Test 3 Approximate boot time before encryption for client: time: Approximate boot time after initial encryption is completed for client: time: Test 4 Approximate boot time before encryption for client: time: Approximate boot time after initial encryption is completed for client: time: Test 5 Approximate boot time before encryption for client: time: Approximate boot time after initial encryption is completed for client: time: Adding multiple users to the same system after encryption 18

19 Application and system load Test Case Pass/Fail Comments Once the initial encryption process is completed there is very little impact on application performance, however, it is a good idea to check file access and a few of your common applications both before and after encryption. Often this also helps the administrator in future discussions with client deployment specialists and end users to explain that application tests after encryption were conducted as occasionally new software projects can be the source of performance complaints, even if the project is unrelated to the cause of the performance issues. Data access time is similar after initial encryption as it was before encryption? Are there access time differences before and after encryption with the Microsoft Office Suite? Are there access time differences before and after encryption with application:? Are there access time differences before and after encryption with application:? After opening multiple applications, is there a difference in system speed after encryption compared with system speed before encryption? User Experience Test Case Pass/Fail Comments What impact will the rollout of the client have on user experience? Based on testing, what features will result in a need for end-user training? _ 19

20 How does the user boot up and login experience change when a system is encrypted? How does the user work experience change when a system is encrypted? Is user data access changed after encryption? Administrator Experience Test Case Pass/Fail Comments Does installation and deployment require any manual steps (such as manually adding users to the server or creating keys for each user)? If so, what are these steps? What occasional maintenance tasks will be required for administrators? (Consider recovery, new users, users changing job responsibilities) What daily maintenance is required for an administrator? 20

21 Recovery Test Case Pass/Fail Comments Solution offers self-help and administrative recovery? Solution offers both passphrase and disk recovery options? Solution offers multiple options for passphrase recovery? Drive Encryption Recovery Token Test Location (choose one): on-premise remote Who is involved in the recovery process? End-user Helpdesk/Server Admin How many steps does this form of recovery require? Scenario notes: Disk Administrator Passphrase Test Location (choose one): on-premise remote Who is involved in the recovery process? End-user Helpdesk/Server Admin How many steps does this form of recovery require? Scenario notes: Local- Recovery Test (This was not enabled in our default settings. See SEMS Administrator s Guide for directions on enabling) Location (choose one): 21

22 on-premise remote Who is involved in the recovery process? End-user Helpdesk/Server Admin How many steps does this form of recovery require? Scenario notes: Recovery ISO Test Location (choose one): on-premise remote Who is involved in the recovery process? End-user Helpdesk/Server Admin How many steps does this form of recovery require? Scenario notes: Other Recovery Type Test Recovery type: Location (choose one): on-premise remote Who is involved in the recovery process? End-user Helpdesk/Server Admin How many steps does this form of recovery require? Scenario notes: 22

23 Other tests Test Case Pass/Fail Comments 23

24 Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Symantec Network Access Control, Symantec Sygate Enterprise Protection are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 350 Ellis Street Mountain View, CA

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

Symantec Protection Center Getting Started Guide. Version 2.0

Symantec Protection Center Getting Started Guide. Version 2.0 Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

Symantec pcanywhere 12.5 SP4 Release Notes

Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes Symantec pcanywhere 12.5 SP4 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

Veritas Desktop Agent for Mac Getting Started Guide

Veritas Desktop Agent for Mac Getting Started Guide Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation

More information

Veritas Desktop and Laptop Option Mac Getting Started Guide

Veritas Desktop and Laptop Option Mac Getting Started Guide Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Symantec Workflow 7.1 MP1 Release Notes

Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1. Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small

More information

Veritas Desktop and Laptop Option 9.2

Veritas Desktop and Laptop Option 9.2 1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished

More information

PGP NetShare FlexResponse Plug-In for Data Loss Prevention

PGP NetShare FlexResponse Plug-In for Data Loss Prevention PGP NetShare FlexResponse Plug-In for Data Loss Prevention Implementation Guide 10.2 The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Veritas Backup Exec Quick Installation Guide

Veritas Backup Exec Quick Installation Guide Veritas Backup Exec Quick Installation Guide Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017

More information

Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes

Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3 Release Notes Express Security Content Update for JBoss Enterprise Application Platform 6.3

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement

More information

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1. Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.0) Release Notes Express Security Content Update for Microsoft Windows Server 2008

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris Cluster Server 7.3.1 Generic Application Agent Configuration Guide - AIX, Linux, Solaris Last updated: 2017-11-04 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and

More information

Nimsoft Monitor Server

Nimsoft Monitor Server Nimsoft Monitor Server Configuration Guide v6.00 Document Revision History Version Date Changes 1.0 10/20/2011 Initial version of Nimsoft Server Configuration Guide, containing configuration and usage

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

Veritas NetBackup for Microsoft SQL Server Administrator's Guide

Veritas NetBackup for Microsoft SQL Server Administrator's Guide Veritas NetBackup for Microsoft SQL Server Administrator's Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft SQL Server Administrator's Guide Last updated: 2018-04-10 Document version:netbackup

More information

Veritas ediscovery Platform

Veritas ediscovery Platform Veritas ediscovery Platform Release Notes 8.2 Cumulative Hotfix 3 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 8.2 CHF3 The software described in this book is furnished under a license

More information

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is

More information

PGP Viewer for ios. Administrator s Guide 1.0

PGP Viewer for ios. Administrator s Guide 1.0 PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Veritas Enterprise Vault Guide for Mac OS X Users 12.2

Veritas Enterprise Vault Guide for Mac OS X Users 12.2 Veritas Enterprise Vault Guide for Mac OS X Users 12.2 Veritas Enterprise Vault: Guide for Mac OS X Users Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide The software described in this book is furnished under

More information

Using Kerberos Authentication in a Reverse Proxy Environment

Using Kerberos Authentication in a Reverse Proxy Environment Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:

More information

Symantec Encryption Management Server

Symantec Encryption Management Server Symantec Encryption Management Server Upgrade Guide 3.4 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version

More information

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

Veritas System Recovery 18 Linux Edition: Quick Installation Guide Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Enterprise Vault Troubleshooting FSA Reporting. 12 and later

Enterprise Vault Troubleshooting FSA Reporting. 12 and later Enterprise Vault Troubleshooting FSA Reporting 12 and later Enterprise Vault : Troubleshooting FSA Reporting Last updated: 2018-04-17. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved.

More information

Cloud Link Configuration Guide. March 2014

Cloud Link Configuration Guide. March 2014 Cloud Link Configuration Guide March 2014 Copyright 2014 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under and are subject to the terms of

More information

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

Quest Collaboration Services 3.6. Installation Guide

Quest Collaboration Services 3.6. Installation Guide Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

Clearwell ediscovery Platform

Clearwell ediscovery Platform Clearwell ediscovery Platform Utility Node Guide 7.1.2 Fix Pack 2 Clearwell ediscovery Platform : Utility Node Guide The software described in this book is furnished under a license agreement and may be

More information

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started Symantec Cloud Workload Protection on AWS Marketplace Buyer's Guide for Getting Started The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Veritas Desktop and Laptop Option 9.3.1

Veritas Desktop and Laptop Option 9.3.1 1. Veritas Desktop and Laptop Option 9.3.1 Quick Reference Guide for DLO Installation and Configuration 12-Nov-18 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

SGOS on KVM Deployment Guide

SGOS on KVM Deployment Guide SGOS on KVM Deployment Guide Guide Revision: 8/18/2017 2 SGOS on KVM Deployment Guide SGOS on KVM Deployment Guide 3 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec

More information

Cisco Meeting Management

Cisco Meeting Management Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview

More information

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide The Privileged Appliance and Modules (TPAM) 1.0 Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Enterprise Vault.cloud Journaling Guide

Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas

More information

Veritas Desktop and Laptop Option 9.3

Veritas Desktop and Laptop Option 9.3 1. Veritas Desktop and Laptop Option 9.3 Quick Reference Guide for DLO Installation and Configuration 22-Jun-18 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

Enterprise Vault Requesting and Applying an SSL Certificate and later

Enterprise Vault Requesting and Applying an SSL Certificate and later Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas

More information

Videoscape Distribution Suite Software Installation Guide

Videoscape Distribution Suite Software Installation Guide First Published: August 06, 2012 Last Modified: September 03, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Veritas CloudPoint 1.0 Administrator's Guide

Veritas CloudPoint 1.0 Administrator's Guide Veritas CloudPoint 1.0 Administrator's Guide Veritas CloudPoint Administrator's Guide Last updated: 2017-09-13 Document version: 1.0 Rev 6 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights

More information

Symantec Brightmail Gateway 9.0 Getting Started

Symantec Brightmail Gateway 9.0 Getting Started Symantec Brightmail Gateway 9.0 Getting Started 20961949 Symantec Brightmail Gateway 9.0 Getting Started The software described in this book is furnished under a license agreement and may be used only

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide Symantec Mail Security for Microsoft Exchange 7.9 Guide Symantec Mail Security for Microsoft Exchange Guide The software described in this book is furnished under a license agreement and may be used only

More information

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services) Veritas Desktop and Laptop Option: Qualification Details with Cloud Service

More information

Dell PowerVault DL Backup to Disk Appliance and. Storage Provisioning Option

Dell PowerVault DL Backup to Disk Appliance and. Storage Provisioning Option Dell PowerVault DL Backup to Disk Appliance and the Symantec Backup Exec Storage Provisioning Option The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Agilent CytoGenomics 2.5

Agilent CytoGenomics 2.5 Agilent CytoGenomics 2.5 Installation and Administration Guide Research Use Only. Not for Diagnostic Procedures. Agilent Technologies Notices Agilent Technologies, Inc. 2012 No part of this manual may

More information

Veritas SaaS Backup for Office 365

Veritas SaaS Backup for Office 365 Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Learning Secomea Remote Access (Using SiteManager Embedded for Windows)

Learning Secomea Remote Access (Using SiteManager Embedded for Windows) Secomea GateManager BASIC Guide Learning Secomea Remote Access (Using SiteManager Embedded for Windows) This guide is intended for first time users of the Secomea remote access solution, who need a practical

More information

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later Versions of FSA Agent and 2007 or later : Versions of FSA Agent and Last updated: 2018-04-05. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo,, Compliance

More information

Patch Assessment Content Update Getting Started Guide for CCS 12.0

Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide for CCS 12.0 Patch Assessment Content Update Getting Started Guide The software described in this book is furnished under a license agreement and may

More information

About Symantec Encryption Management Server

About Symantec Encryption Management Server Symantec Encryption Management Server Version 3.3.0 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

More information

Veritas NetBackup Appliance Security Guide

Veritas NetBackup Appliance Security Guide Veritas NetBackup Appliance Security Guide Release 2.7.3 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Document version: 2.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC.

More information

Veritas ediscovery Platform

Veritas ediscovery Platform Veritas ediscovery Platform Release Notes 9.0.1 Release Notes PAGE: 2 Veritas ediscovery Platform : Release Notes 9.0.1 The software described in this book is furnished under a license agreement and may

More information

PGP NetShare Quick Start Guide Version 10.2

PGP NetShare Quick Start Guide Version 10.2 PGP NetShare Quick Start Guide Version 10.2 What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. Use PGP NetShare to: Let authorized

More information

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc.

More information

Veritas SaaS Backup for Salesforce

Veritas SaaS Backup for Salesforce Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Veritas NetBackup for Lotus Notes Administrator's Guide

Veritas NetBackup for Lotus Notes Administrator's Guide Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016

More information

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Security Content Update Release Notes for CCS 12.x

Security Content Update Release Notes for CCS 12.x Security Content Update 2018-2 Release Notes for CCS 12.x SCU 2018-2 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER QUICK-START GUIDE Product Version: 3.3.247 March 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Utility Node Guide 8.0 Symantec ediscovery Platform : Utility Node Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate

More information

Veritas Enterprise Vault PST Migration 12.2

Veritas Enterprise Vault PST Migration 12.2 Veritas Enterprise Vault PST Migration 12.2 Veritas Enterprise Vault: PST Migration Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 21271162 (October 2012) Veritas Storage Foundation and High

More information

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only

More information

PGP Viewer for ios. User s Guide 1.0

PGP Viewer for ios. User s Guide 1.0 PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:

More information

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012 SafeGuard Easy Demo guide Product version: 6 Document date: February 2012 Contents 1 Introduction...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What to expect

More information

Veritas NetBackup Plug-in for VMware vsphere Web Client Guide. Release 8.1.1

Veritas NetBackup Plug-in for VMware vsphere Web Client Guide. Release 8.1.1 Veritas NetBackup Plug-in for VMware vsphere Web Client Guide Release 8.1.1 Veritas NetBackup Plug-in for VMware vsphere Web Client Guide Last updated: 2018-02-16 Document version:netbackup 8.1.1 Legal

More information

akkadian Global Directory 3.0 System Administration Guide

akkadian Global Directory 3.0 System Administration Guide akkadian Global Directory 3.0 System Administration Guide Updated July 19 th, 2016 Copyright and Trademarks: I. Copyright: This website and its content is copyright 2014 Akkadian Labs. All rights reserved.

More information

Installing the Cisco Virtual Network Management Center

Installing the Cisco Virtual Network Management Center CHAPTER 4 Installing the Cisco Virtual Network Management Center This chapter provides procedures for installing the Cisco Virtual Network Management Center (VNMC). This chapter includes the following

More information

Veritas Data Insight Software Compatibility List 6.1.1

Veritas Data Insight Software Compatibility List 6.1.1 Veritas Data Insight Software Compatibility List 6.1.1 Documentation version: 6.1.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks

More information

Veritas NetBackup Virtual Appliance Getting Started Guide. Release 3.1.2

Veritas NetBackup Virtual Appliance Getting Started Guide. Release 3.1.2 Veritas NetBackup Virtual Appliance Getting Started Guide Release 3.1.2 Veritas NetBackup Virtual Appliance Getting Started Guide Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved.

More information

Symantec PGP Viewer for ios

Symantec PGP Viewer for ios Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.

More information

Altiris Client Management Suite 7.1 from Symantec User Guide

Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017 VIP Credential Development Kit Release Notes Version 2.0.8 May 2017 VIP Credential Development Kit Release Notes Page 1 of 6 Introduction This document includes important information about the Symantec

More information

Symantec Endpoint Encryption Full Disk Release Notes

Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk Release Notes Symantec Endpoint Encryption Full Disk 7.0.8 Symantec Endpoint Encryption Framework 7.0.8 www.symantec.com About Symantec Endpoint Encryption Full Disk

More information