Symantec Protection Center Getting Started Guide. Version 2.0

Similar documents
VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

Partner Information. Integration Overview. Remote Access Integration Architecture

Symantec Control Compliance Suite Express Security Content Update for Microsoft Windows Server 2008 R2 (CIS Benchmark 2.1.

Symantec Cloud Workload Protection on AWS Marketplace. Buyer's Guide for Getting Started

Symantec Control Compliance Suite Express Security Content Update for JBoss Enterprise Application Platform 6.3. Release Notes

Partner Information. Integration Overview Authentication Methods Supported

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version May 2017

Enterprise Vault Versions of FSA Agent and Enterprise Vault Reporting or later

Veritas Data Insight Software Compatibility List 6.1.1

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Validation and ID Protection. VIP Credential Development Kit Release Notes. Version January 2017

Veritas Desktop and Laptop Option 9.1 Qualification Details with Cloud Service Providers (Microsoft Azure and Amazon Web Services)

Veritas Data Insight 6.1 Software Compatibility List 6.1

Veritas CommandCentral Enterprise Reporter Release Notes

Veritas Backup Exec Quick Installation Guide

Cluster Server Generic Application Agent Configuration Guide - AIX, Linux, Solaris

Veritas System Recovery 18 Management Solution Administrator's Guide

Creating New MACHINEGUID and Disk UUID Using the PGPWdeUpdateMachineUUID.exe Utility

Symantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App

Symantec Workflow 7.1 MP1 Release Notes

Veritas Access Enterprise Vault Solutions Guide

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Veritas NetBackup Appliance Fibre Channel Guide

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas SaaS Backup for Office 365

Enterprise Vault Requesting and Applying an SSL Certificate and later

Veritas Desktop and Laptop Option Mobile Application Getting Started Guide

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Symantec Enterprise Vault

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios

Veritas SaaS Backup for Salesforce

Veritas Desktop and Laptop Option Mac Getting Started Guide

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide

Symantec Enterprise Vault Technical Note

OneSign Virtual Appliance Guide

Veritas High Availability 7.3 Solution Guide for VMware - Linux

Symantec Enterprise Vault

Altiris Client Management Suite 7.1 from Symantec User Guide

Veritas Desktop and Laptop Option 9.2

Symantec Enterprise Vault

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

Veritas Backup Exec Migration Assistant

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Symantec Mail Security for Microsoft Exchange 7.9 Getting Started Guide

Symantec NetBackup Appliance Fibre Channel Guide

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Veritas NetBackup OpenStorage Solutions Guide for Disk

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO

Altiris IT Analytics Solution 7.1 from Symantec User Guide

Symantec ediscovery Platform

Symantec ApplicationHA Release Notes

Veritas Desktop Agent for Mac Getting Started Guide

Veritas NetBackup Virtual Appliance Getting Started Guide. Release 3.1 Document Revision 2

Getting Started with ESXi Embedded

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

User Guide. We protect more people from more online threats than anyone in the world.

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Veritas NetBackup Plug-in for VMware vsphere Web Client Guide. Release 8.1.1

Veritas NetBackup for SQLite Administrator's Guide

PGP NetShare FlexResponse Plug-In for Data Loss Prevention

Patch Assessment Content Update Getting Started Guide for CCS 12.0

Veritas ediscovery Platform

NetBackup Self Service Release Notes

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint 2013

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Dell PowerVault DL Backup to Disk Appliance and. Storage Provisioning Option

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10

Symantec Enterprise Vault Technical Note

Veritas NetBackup Appliance Fibre Channel Guide

Blue Coat ProxySG First Steps Transparent Proxy Deployments SGOS 6.7

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Altiris Software Management Solution 7.1 from Symantec User Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Symantec Brightmail Gateway 9.0 Getting Started

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

VMware vsphere Storage Appliance Installation and Configuration

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.

Enterprise Vault Using SQL Database Roles in Enterprise Vault, Compliance Accelerator, and Discovery Accelerator

Veritas NetBackup OpsCenter Performance and Tuning Guide

Enterprise Vault Migrating Data Using the Microsoft Azure Blob Storage Migrator or later

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Configuring Symantec. device

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

IM: Symantec Security Information Manager Patch 4 Resolved Issues

Transcription:

Symantec Protection Center Getting Started Guide Version 2.0

Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: 2.0 Legal Notice Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com

Getting Started This document includes the following topics: Getting started with Protection Center Protection Center appliance types Protection Center requirements Creating and deploying a Protection Center appliance Getting started with Protection Center Before you use Protection Center, you must create and deploy the Protection Center appliance. You can deploy Protection Center as a virtual or a physical appliance. Step 1 Choose an appliance type. See Protection Center appliance types on page 3. Step 2 Make sure that your hardware and software meet the requirements for the type of appliance you want to create. See Protection Center requirements on page 4. Step 3 Create and deploy the Protection Center appliance. See Creating and deploying a Protection Center appliance on page 6. Protection Center appliance types Protection Center can be deployed as a virtual or a physical appliance. The appliance type that you choose depends on the number of nodes in your network and your preferences.

4 Getting Started Protection Center requirements Appliance type Virtual Physical Table 1-1 Description Protection Center is deployed as a virtual appliance in VMware ESX. Protection Center is deployed on a server of your choice. Protection Center appliance types Considerations A virtual appliance is a good option if all of the following are true: You already use VMware ESX. You can make sufficient hardware resources available for the appliance in your VMware ESX environment. A physical appliance is a good option if any of the following is true: You want a standalone appliance. You cannot make sufficient hardware resources available for the appliance in your VMware ESX environment. Protection Center requirements Following are the hardware and the software requirements for Protection Center. To support more than 150,000 endpoints, you must install and integrate IT Analytics with Protection Center. IT Analytics leverages Microsoft SQL Server clustering to provide scalability and high availability. For information on sizing and design considerations with IT Analytics, see the IT Analytics documentation. For details on the Protection Center architecture and sizing for large environments, see Symantec Protection Center Sizing and Scalability Guide. Table 1-2 Protection Center hardware requirements Item Processor cores Memory Hard disk 1-5000 endpoints (virtual or physical) 2 physical cores 8 GB 100 GB SAS 10K RPM 5000-50000 endpoints (virtual) 5000-150000 endpoints (physical) 4 physical cores 16 GB 500 GB NAS (virtual only), SAN (virtual only), or SAS 15K RPM in high-performance disk array Storage device Hardware RAID levels 1, 5, 6, 10, and 50 are supported. Software raids are not supported. In non-nas and non-raid environments, only a single hard disk is supported. External storage devices that are not on the same subnet as Protection Center must be able to resolve appropriate drive mappings.

Getting Started Protection Center requirements 5 Table 1-2 Protection Center hardware requirements (continued) Item Processor speed 1-5000 endpoints (virtual or physical) Minimum: 1.8 GHz Recommended: 2.53 GHz 5000-50000 endpoints (virtual) 5000-150000 endpoints (physical) Network Required: Static IPv4 IP address, subnet mask, default gateway, and DNS Optional: Static IPv6 IP address, prefix length, default gateway, and DNS Network card General hardware A single 1 Gigabit Ethernet network card that supports Microsoft Windows Server Core 2008 R2 Web edition Note: Disable any secondary network card before creating the Protection Center appliance. If you create the appliance before disabling the secondary card, you must either disable the card and re-create the appliance, or contact Symantec Support. Required: Dedicated resources that are not used by any other application Required (virtual appliance): 64-bit hardware that supports VMware ESX 4.0 or 4.1 and Microsoft Windows Server Core 2008 R2 Web edition (English version only) Required (physical appliance): 64-bit hardware that supports Microsoft Windows Server Core 2008 R2 Web edition (English version only) Table 1-3 Protection Center software requirements Requirement Details Protection Center Appliance Creator ISO This ISO image steps you through the appliance creation process. The ISO image file is available from the Protection Center page on the Symantec Web site. The page is located at the following URL: http://go.symantec.com/protection-center Microsoft Windows Server Core 2008 R2 Web edition English DVD or ISO file Protection Center uses this 64-bit version of Microsoft Windows as the underlying operating system. For a virtual appliance, transfer the ISO file to a datastore that can be mounted by the virtual machine. For a physical appliance, have the DVD available during the appliance creation process. Note: The Protection Center appliance creation process does not support the SP1 version of Microsoft Windows Server Core 2008 R2 Web edition. However, you will be able to install this update and other updates through Protection Center as Symantec makes them available.

6 Getting Started Creating and deploying a Protection Center appliance Table 1-3 Protection Center software requirements (continued) Requirement Windows activation key or Windows licensing server VMware ESX 4.0 and 4.1 and environment credentials Details Protection Center requires either an activation key for your copy of Windows, or the location of the Windows licensing server. If you do not want to provide the activation information during the appliance creation process, you can provide it later through the Protection Center control panel on the appliance. (Virtual appliance only) VMware ESX must be installed and running before you start the appliance creation process. You will also need a user account that has rights to create a virtual machine in your VMware ESX environment. If you use VMware vmotion, configure vmotion so that the subnet is preserved when the Protection Center appliance is moved to a new host. When the appliance moves, the new host is on the same subnet as the old host. If the Protection Center appliance is moved to a host on a different subnet, the appliance network settings no longer work. VMware vsphere client 4.0 (or later) (Virtual appliance only) vsphere is used on the client to access vcenter and must be installed and running before you start the appliance creation process. Creating and deploying a Protection Center appliance Protection Center can be deployed as a virtual or a physical appliance. To create a Protection Center virtual appliance, you create a virtual machine and have it mount the Protection Center Appliance Creator ISO. To create a Protection Center physical appliance, you boot your server with the Protection Center Appliance Creator DVD. When you create and deploy a virtual or a physical appliance, the appliance creation process installs Windows and other required software. Warning: If you are re-purposing a server or virtual machine for Protection Center, be aware that all of the data on the associated hard drive is deleted during the appliance creation process. Therefore, be sure to back up any data that you do not want to lose. To create and deploy a Protection Center virtual appliance 1 Create a Microsoft Windows Server Core 2008 R2 Web edition English ISO image from your Windows DVD if you have not already done so. 2 Copy the Protection Center Appliance Creator ISO and the Windows ISO image files to a datastore location that is accessible by the VMware ESX server. You can copy the files using Datastore Browser in vsphere. 3 From an endpoint that has the vsphere client installed, log in to your vcenter.

Getting Started Creating and deploying a Protection Center appliance 7 4 Right-click the host on which you want to create the Protection Center appliance, and select New Virtual Machine. 5 In the Create New Virtual Machine wizard, do the following to create your virtual machine: Select a Typical configuration. Name and specify a location for the virtual machine. Select a datastore for storing your virtual machine files. Select Microsoft Windows as the guest operating system and Microsoft Windows Server 2008 R2 (64-bit) as the version. Specify the disk size based on information in the appliance requirements. Do not select the Allocate and commit space on demand (Thin Provisioning) option. Review the settings you have chosen and click Continue. 6 In the Virtual Machine Properties dialog box, specify the following information and then click Finish: CPUs based on the appliance requirements. Memory based on the appliance requirements. New CD/DVD information. In the Datastore ISO File field, specify the name and the location of the Protection Center Appliance Creator ISO file that you previously copied to the datastore. Click Connect at Power On. 7 In the vsphere client program, right-click the new virtual machine and then click Open Console. 8 Turn on the virtual machine. The Protection Center Appliance Creator ISO boots the virtual machine and starts the Protection Center Appliance Creator program. 9 Follow the instructions in Protection Center Appliance Creator. During the appliance creation process, you are prompted to insert the Microsoft Windows Server Core 2008 R2 Web edition English DVD. The virtual machine restarts automatically when Protection Center Appliance Creator finishes.

8 Getting Started Creating and deploying a Protection Center appliance 10 If you want to access Protection Center using the host name, add a record for the Protection Center appliance to your DNS. 11 On an endpoint, go to the following location: https://protection_center_appliance_name/symantec Log in using the predefined Protection Center account (SPC_Admin) and the password you created during the appliance creation process. Protection Center uses a self-signed security certificate. Therefore, until you add the certificate to a trusted certificate store, a certificate error message is displayed when you access Protection Center. You are now ready to perform the initial setup. For information on the initial setup tasks, see Symantec Protection Center User Guide or Symantec Protection Center Help. To create and deploy a Protection Center physical appliance 1 Burn the Protection Center Appliance Creator ISO image to a DVD. 2 Insert the Protection Center Appliance Creator DVD into the optical drive of the server that you want to use for the appliance. 3 Boot the server from the DVD. The Protection Center Appliance Creator program on the DVD runs automatically. 4 Follow the instructions in Protection Center Appliance Creator. During the appliance creation process, you are prompted to insert the Microsoft Windows Server Core 2008 R2 Web edition English DVD. The server restarts automatically when Protection Center Appliance Creator finishes. 5 If you want to access Protection Center using the host name, add a record for the Protection Center appliance to your DNS. 6 On an endpoint with a supported Web browser, go to the following location: https://protection_center_appliance_name/symantec Log in using the predefined Protection Center account (SPC_Admin) and the password you created during the appliance creation process. Protection Center uses a self-signed security certificate. Therefore, until you add the certificate to a trusted certificate store, a certificate error message is displayed when you access Protection Center. You are now ready to perform the initial setup. For information on the initial setup tasks, see Symantec Protection Center User Guide or Symantec Protection Center Help.