SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Symantec™ProtectionEngine
for Cloud Services Getting
Started Guide
Symantec™ Protection Engine for Cloud Services
Getting Started Guide
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Documentation version: 7.0
Legal Notice
Copyright © 2012 Symantec Corporation. All rights reserved.
Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THEDOCUMENTATIONISPROVIDED"ASIS"ANDALLEXPRESSORIMPLIEDCONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BELEGALLYINVALID.SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Getting Started
This document includes the following topics:
■ About Symantec Protection Engine for Cloud Services
■ Why you need virus protection for Web proxy/caching
■ How Symantec Protection Engine protects against threats in a messaging
environment
■ What's new in Symantec Protection Engine
■ About supported protocols for Symantec Protection Engine
■ Components of Symantec Protection Engine
■ About implementing Symantec Protection Engine for Cloud Services
■ Before you install Symantec Protection Engine
■ System requirements
■ Where to get more information
About Symantec Protection Engine for Cloud Services
Symantec™ Protection Engine for Cloud Services replaces Symantec AntiVirus™
for Caching, Symantec AntiVirus™ for Messaging, and Symantec™ Scan Engine.
Note: In this document, Symantec™ Protection Engine for Cloud Services is referred
to as Symantec™ Protection Engine.
Symantec Protection Engine is a carrier-class content and URL scanning engine.
Symantec Protection Engine provides content scanning and URL filtering
capabilities to any application on an IP network, regardless of its platform. Any
application can pass files or URLs to Symantec Protection Engine for scanning.
Symantec Protection Engine accepts scan requests from the client applications
that use any of the following protocols:
■ Symantec Protection Engine Native protocol (deprecated)
■ The Internet Content Adaptation Protocol (ICAP), version 1.0, as presented in
RFC 3507 (April 2003)
■ A proprietary implementation of remote procedure call (RPC)
You can use the Symantec Protection Engine software development kit (SDK) or
build your own connector to integrate Symantec Protection Engine with your
application. The SDK supports version 1.0 of ICAP, as presented in RFC3507 (April
2003). Symantec also has developed connector code for some third-party
applications to seamlessly integrate with Symantec Protection Engine.
The Symantec Protection Engine Software Developers Guide provides information
about how to create customized integrations with ICAP.
See “Components of Symantec Protection Engine” on page 10.
About the connector code
The connector code handles the communication between the Symantec Protection
Engine and the messaging or caching solution. It sends the scanning requests to
the Protection Engine, and it interprets the scanning results.
The connector code is either developed by the software vendor of the messaging
or caching solution or by Symantec. Depending on your messaging or caching
solution, you might need to obtain the connector code from the software vendor.
In some cases, the software vendor integrates the connector code into its product
before distribution.
For more information about the connector for your messaging or caching solution,
see the appropriate documentation.
Why you need virus protection for Web proxy/caching
The HTTP gateway is an underprotected area of most networks. Corporate security
efforts have heavily focused on more traditional areas through which viruses can
enter. Enterprises typically have focused security around known viruses that
enter the network through more common means, such as CD-ROM or email, so
hackers now exploit the Web as a means to enter corporate networks. Many new
threats target port 80, which is usually open on corporate firewalls so that users
can browse the Web.
Getting Started
Why you need virus protection for Web proxy/caching
4
Dedicated virus scanning for Web traffic is recommended for the following reasons:
■ Scanning Web traffic lets you catch and block threats at the gateway, rather
than multiple times at each desktop. Users can potentially disable desktop
protection, which can leave your network vulnerable to attack.
■ Because many people now use Web-based email, email-born viruses that would
otherwise be caught by antivirus scanning at the SMTP gateway can slip
through to infect the network.
■ The industry trend has been to Web-enable many application environments
to include the use of technologies like ActiveX, JavaScript, and Java applets to
enhance the user experience. Many new threats are associated with these Web
technologies. Malicious mobile code viruses, such as Nimda and Code Red,
have entered networks as executables (for example, ActiveX, JavaScript, or
Visual Basic Scripts) that appear to be part of safe Web content.
■ Once a threat has been cached, malicious code can potentially be passed to
other users on the network, which can compromise additional computers and
data on the network.
■ Malicious code can result in lost, stolen, or corrupted files, which can result
in costly downtime to the enterprise.
How Symantec Protection Engine protects against
threats in a messaging environment
Symantec Protection Engine can detect the following types of risks:
■ Threats (such as viruses, worms, and Trojan horses)
■ Security risks (such as adware and malware)
■ Denial-of-service attacks
Symantec Protection Engine protects your mail system from messages and
attachments that overload the system and cause denial-of-service. This includes
container files that are overly large, that contain large numbers of embedded
compressed files, or that are designed to maliciously use resources and degrade
performance. You can specify the maximum amount of time that the Protection
Engine devotes to decompose a file and its contents, the maximum file size for
container files, and the maximum number of nested levels to be decomposed for
scanning.
Symantec Protection Engine for Messaging uses the following technologies to
protect your messaging environment from threats:
5
Getting Started
How Symantec Protection Engine protects against threats in a messaging environment
Symantec engineers track reported outbreaks of risks (such
as viruses, Trojan horses, worms, adware, and spyware) to
identify new risks. After a risk is identified, information
about the risk (a signature) is stored in a definition file. The
virus definitions file contains the necessary information to
detect and eliminate the virus.
Definitions
Symantec Protection Engine uses Symantec Bloodhound™
heuristics technology to scan for threats for which no known
definitions exist. Bloodhound heuristics technology scans
for unusual behaviors (such as self-replication) to target
potentially infected documents. Bloodhound technology is
capable of detecting as much as 80 percent of new and
unknown executable file threats. Bloodhound-Macro
technology detects and repairs over 90 percent of new and
unknown macro viruses. Bloodhound requires minimal
overhead since it examines only programs and the
documents that meet stringent prerequisites. In most cases,
Bloodhound can determine in microseconds whether a file
or document is likely to be infected. If it determines that a
file is not likely to be infected, it moves to the next file.
Heuristics
Symantec Protection Engine contains a decomposer that
extracts container files so that they can be scanned for risks.
The decomposer continues to extract container files until
it reaches the maximum that you specify.
Container file decomposer
Symantec LiveUpdate technology ensures that your network
is not at risk of infection from newly discovered viruses.
The updates are handled automatically without having the
restart services or redeploy software. This ensures no
interruption in scanning services during the updates.
You can also update risk definitions using Rapid Release or
Intelligent Updater.
Automatic product and virus
definitions updates
What's new in Symantec Protection Engine
Table 1-1 describes the new features in Symantec Protection Engine.
Getting Started
What's new in Symantec Protection Engine
6
Table 1-1 New features
Description
Feature
Previously, Symantec Scan Engine exposed a limited set of static
non-viral categories like Adware, Spyware, and Other Risks. Also,
viral threats did not have any categories associated with them.
Fromversion7.0onwards,SymantecProtectionEnginecategorizes
viral and non-viral threats more accurately. Hence, previously
unknown or new non-viral threats that were reported under the
generic 'Other Risks' category, would now be categorized more
accurately.
Enhanced
categorization of
threats
You can now access the Symantec Protection Engine console using
the following two types of authentication modes:
■ Symantec Protection Engine-based authentication mode
This legacy authentication method requires users to enter the
Symantec Protection Engine administrator password to access
the console.
■ Windows Active Directory-based authentication mode
Only users from the authorized Windows Active Directory
security group can access the Symantec Protection Engine
console using their Active Directory credentials.
Note: For non-Windows platforms, users only have the Symantec
Protection Engine-based authentication mode for accessing
console.
Windows Active
Directory-based
Authentication mode
The Administrator can now create multiple user accounts for
managing Symantec Protection Engine. This feature is available
only in Symantec Protection Engine-based authentication mode.
Manage user accounts
Customers who use Symantec LiveUpdate™ Administrator (LUA)
to download definitions to their local LiveUpdate server for
distribution, must update their product catalog in the LUA. To
download new definitions, you must add "Symantec Protection
Engine 7.0" to the product catalog in the LUA.
New Product Catalog
for Symantec
Protection Engine
Symantec Protection Engine now provides granular policies to
handle unscannable files (malformed and encrypted containers),
along with statistical reports.
Better handling of
Unscannable files
You can now exclude files from scanning that exceed the
configured file size threshold value.
Scan exclusion policy
based on file size
7
Getting Started
What's new in Symantec Protection Engine
Table 1-1 New features (continued)
Description
Feature
You can now choose to scan files in-place that are less than the
configured file size threshold value. This feature is only available
over RPC protocol.
In-place scan policy
based on file size
From version 7.0, Symantec Protection Engine is capable of
retaining cumulative scan data since installation in addition to
retaining data since last restart.
View cumulative scan
data on home page
From version 7.0 onwards, the data from the Resources page can
now be saved in log files for futher analysis.
Resourceconsumption
logging
Symantec Protection Engine 7.0 is equipped with strong cipher
support.
Stronger ciphers for
password
While previously Symantec Scan Engine used to block access to
infected MS Office files, Symantec Protection Engine 7.0 can now
repair and delete threats. Thus, you will be able to retrieve your
clean Office files.
Enhanced scanning for
MS Office documents
You can configure Symantec Protection Engine to display a custom
security notice that contains common security-related information
to all users before they log in to the Symantec Protection Engine
console.
Security notice
You can integrate Symantec Protection Engine events with System
Center Operations Manager (SCOM).System Center Operations
Manager is a central repository that can receive critical events,
errors, warnings, and other information from your Symantec
Protection Engine servers.
Support for System
Center Operations
Manager 2007(SCOM)
Pack
Symantec Protection Engine 7.0 supports the following new
platforms:
■ Windows Server 2008 Japanese (32-bit and 64-bit)
■ Windows Server 2008 R2 Japanese (64-bit)
■ Windows Server 2012 (64-bit)
New platform support
Symantec Protection Engine 7.0 now supports JRE 7.0
Java™ 2SE Runtime
Environment (JRE) 7.0
Getting Started
What's new in Symantec Protection Engine
8
About supported protocols for Symantec Protection
Engine
Table 1-2 lists the supported protocols that client applications can use to send
scan requests to Symantec Protection Engine.
Table 1-2 Supported protocols
Description
Protocol
Symantec Protection Engine implements a TCP/IP protocol to
provide scanning functionality to client applications. This
protocol is text-based, like HTTP or SMTP. It uses ASCII
commands and responses to communicate between the client
and the server.
To scan a file, a client connects to the default IP port. It sends
the file to be scanned and then reads the results of the scan.
After the client receives the scan results, the client and server
disconnect and must initiate a new connection to scan each
subsequent file.
Native protocol
(Deprecated)
ICAP is a lightweight protocol for executing a remote procedure
call on HTTP messages. ICAP is part of an architecture that lets
corporations, carriers, and ISPs dynamically scan, change, and
augment Web content as it flows through ICAP servers. The
protocol lets ICAP clients pass HTTP messages to ICAP servers
for adaptation. Adaptation might include some sort of
transformation or other processing, such as scanning or content
filtering. The server executes its transformation service on the
messages and responds to the client, usually with modified
messages. The adapted messages might be either HTTP requests
or HTTP responses.
Internet Content
Adaptation Protocol
(ICAP)
Remote procedure call (RPC) is a client/server infrastructure
that increases the interoperability and portability of an
application. RPC lets the application be distributed over multiple
platforms. The use of RPC frees the developer from having to
be familiar with various operating systems and network
interfaces.
Symantec Protection Engine uses a proprietary scanning
protocol with the MS-RPC protocol to interface with client
applications. This protocol is supported only on Windows 2003
Server/Windows 2008 Server/Windows 2012 Server. Any
appropriate client can use RPC to communicate with Symantec
Protection Engine to request the scanning and repairing of files.
A proprietary remote
procedure call (RPC)
protocol
9
Getting Started
About supported protocols for Symantec Protection Engine
For more details on the supported protocols, see Symantec Protection Engine
Implementation Guide.
Components of Symantec Protection Engine
Table 1-3 lists the components that are included on the product CD.
Table 1-3 Product components
Folder name
Description
Component
Symantec_Protection_Engine
The software that you
install to protect your
networkfromthreats(such
as viruses), security risks
(such as adware and
spyware), and unwanted
content.
Symantec Protection
Engine
Symantec_Protection_Engine
Silent_Install
The files that you can use
to perform a silent
installation or upgrade.
Also includes response
files for Red Hat and
Solaris.
Silent installation
Command_Line_Scanner
The software that acts as
a client to Symantec
Protection Engine through
the Symantec Protection
Engine application
programming interface
(API). The command-line
scanner lets you send files
to Symantec Protection
Engine to be scanned.
Command-line scanner
Symantec_Protection_Engine_SDK
The tools and
documentation that you
can use to create the
customized integrations
that use ICAP.
Symantec Protection
Engine software
developer's kit
Getting Started
Components of Symantec Protection Engine
10
Table 1-3 Product components (continued)
Folder name
Description
Component
ToolsCentral_Quarantine
The tool that you use to
quarantine infected files
that cannot be repaired
when you use the ICAP
protocol or RPC protocol.
Symantec Central
Quarantine server lets you
isolate unrepairable files
so that threats cannot
spread.
Symantec Central
Quarantine server
ToolsLiveUpdate_Admin
The utility that you use to
configure one or more
intranet FTP, HTTP, or
LAN servers to act as
internal LiveUpdate
servers. LiveUpdate lets
Symantec products
download program and
definition file updates
either directly from
Symantec or from a
LiveUpdate server.
For more information, see
the LiveUpdate
Administrator's Guide on
the product CD.
LiveUpdate™
Administration Utility
11
Getting Started
Components of Symantec Protection Engine
Table 1-3 Product components (continued)
Folder name
Description
Component
ToolsSCOMManagement_Pack
You can integrate
Symantec Protection
Engine events with System
Center Operations
Manager (SCOM).System
Center Operations
Manager is a central
repository that can receive
critical events, errors,
warnings, and other
information from your
Symantec Protection
Engine servers.
Preconfigured rules are
automatically created
when you import the
management pack. System
Center Operation Manager
Agent monitors Windows
Event log for Symantec
Protection Engine events
based on criteria
mentioned in rules of
Management pack. When
a rule is triggered, the
Operations Manager 2007
Agent collects data about
the event and forwards it
to the System Center
Operations Manager.
For more information, see
the Symantec™ Protection
Engine Management Pack
Integration Guide on the
Symantec Protection
Engine product CD.
SystemCenterOperations
Manager 2007(SCOM)
Pack
Adobe Acrobat Reader is required to view the reports that are generated in .pdf
format. You can download Adobe Acrobat Reader from http://www.adobe.com/.
Getting Started
Components of Symantec Protection Engine
12
About implementing Symantec Protection Engine for
Cloud Services
Implementation of Symantec Protection Engine for Cloud Services involves the
following process:
■ Ensure that your messaging or caching solution is properly installed and
configured.
For more information about the hardware and system requirements for your
messaging or caching solution, see your product documentation.
■ If applicable, install the connector code or plug-in for your messaging or
caching solution. You must install the connector on the computer on which
the messaging or caching solution is installed.
For more information about installing and configuring the connector, see the
documentation for your connector.
■ Install Symantec Protection Engine on a separate computer.
Symantec Protection Engine is included on the Symantec Protection Engine
for Cloud Services 7.0 CD.
For more information about installing and configuring the Protection Engine,
see the Symantec Protection Engine Implementation Guide on the CD.
■ Configure Symantec Protection Engine.
You must configure the Protection Engine before you configure the messaging
or caching solution to send files to the Protection Engine.
For more information about integrating your messaging or caching solution
with the Protection Engine, see the appropriate configuration guide.
■ Configure the messaging or caching solution to send files to the Protection
Engine.
For more information about integrating your messaging or caching solution
with the Protection Engine, see the appropriate configuration guide.
Before you install Symantec Protection Engine
Install Symantec Protection Engine on a computer that meets the system
requirements. Before you install Symantec Protection Engine, install and configure
the operating system software and applicable updates for your server. Also ensure
that your operating system software and server work correctly. For more
information, see the documentation for your server.
See “System requirements” on page 15.
Before you install Symantec Protection Engine, take the following steps:
13
Getting Started
About implementing Symantec Protection Engine for Cloud Services
■ On Windows operating system, if you want to use Windows Active
Directory-based authentication method to access the Symantec Protection
Engine console, you must ensure the following:
■ Create or identify an existing security group in the Active Directory that
would be authorized to access the Symantec Protection Engine console.
■ The server (on which you plan to install Symantec Protection Engine)
belongs to the same domain or has trust relationship with the Active
Directory, that contains the security group authorized to access the
Symantec Protection Engine console.
■ Install Java 2SE Runtime Environment (JRE) 5.0 (update 13 or later), JRE 6.0
(update 21 or later), or JRE 7.0 (update 03 or later) on the server. It is
recommended to use JRE 7.0 (update 03 or later).
Note: Symantec Protection Engine supports only 32-bit versions of Java
Runtime Environment. Symantec Protection Engine cannot be installed with
64-bit JRE versions.
■ Disable any third-party antivirus products that are running on the server on
which you plan to install Symantec Protection Engine. You can turn on antivirus
protection after installation is complete.
Symantec Protection Engine scans the files that client applications pass to
Symantec Protection Engine. Symantec Protection Engine does not protect
the computer on which it runs. Since Symantec Protection Engine processes
the files that might contain threats, the server on which it runs is vulnerable
if it has no real-time protection.
Use an antivirus program to protect the server on which Symantec Protection
Engine runs, such as Symantec Endpoint Protection. To prevent scanning
conflicts, configure the antivirus program not to scan the temporary directory
that Symantec Protection Engine uses for scanning.
■ Review the deployment considerations and recommendations. These
recommendations can enhance your overall performance.
After you complete the installation, perform the post-installation tasks.
For post-installation tasks, see the Symantec Protection Engine Implementation
Guide.
Migrating to version 7.0
While installing Symantec Protection Engine, you can choose to upgrade from
the previous version to version 7.0
Getting Started
Before you install Symantec Protection Engine
14
Table 1-4 describes the upgrades that Symantec Protection Engine supports.
Table 1-4 Supported upgrades
Description
Previous version number
You can install the upgrade over the existing installation.
When you upgrade from version 5.2, Symantec Protection
Engine retains all of the settings and values that you have
configured.
5.2
You can install the upgrade over the existing installation.
When you upgrade from version 5.1, Symantec Protection
Engine retains all of the settings and values that you have
configured.
5.1
Upgrades from version 4.3x or earlier of the product are not
supported. If you want to upgrade a version 4.3x or earlier
installation, you must first upgrade your installation to
version 5.2x (which does support a direct upgrade from
version 4.3x), and then upgrade the version 5.2x installation
to version 7.0.
4.3x and earlier
Note: Symantec Protection Engine does not support upgrades from version 5.0.
You must stop the Symantec Protection Engine service before you upgrade the
software. If you cancel the upgrade on Solaris after selecting the upgrade type,
you must reinstall the previous version.
If you want to upgrade from version 5.2/5.1 and use security certificates, take the
following actions:
■ If you use the default security files that Symantec Protection Engine generated,
delete the keystore.public and keystore.private before you perform the upgrade
installation.
■ If you use custom security files, you can retain the custom security files.
Symantec Protection Engine automatically uses the existing files when you
upgrade.
System requirements
Before you install Symantec Protection Engine, verify that your server meets the
minimum system requirements.
15
Getting Started
System requirements
See “System requirements to install Symantec Protection Engine on Windows”
on page 16.
See “System requirements to install Symantec Protection Engine on Solaris”
on page 17.
See “System requirements to install Symantec Protection Engine on Linux”
on page 18.
System requirements to install Symantec Protection Engine on
Windows
The following are the minimum system requirements for installing Symantec
Protection Engine on Windows:
■ Windows Server 2003 (32-bit and 64-bit)
■ Windows Server 2003 R2 (32-bit and 64-bit)
■ Windows Server 2003 R2 Japanese (32-bit and 64-bit)
■ Windows Server 2008 SP2 (32-bit and 64-bit)
■ Windows Server 2008 R2 (64-bit)
■ Windows Server 2008 Japanese (32-bit and 64-bit)
■ Windows Server 2008 R2 Japanese (64-bit)
■ Windows Server 2012 (64-bit)
Ensure that your operating system has the latest service patches
available.
Operating system
Intel or AMD Server Grade Single Processor Quad Core systems or
higher
Processor
4 GB of RAM or higher
Memory
5 GB of hard disk space
10 GB of hard disk space for using URL Filtering feature
Disk space
■ Network interface card (NIC) running TCP/IP with a static IP
address
■ Internet connection to update definitions
■ 100 Mbps Ethernet link (1 Gbps recommended)
Hardware
Getting Started
System requirements
16
■ J2SE Runtime Environment (JRE) 5.0 (update 13 or later), JRE 6.0
(update 21 or later), or JRE 7.0 (update 03 or later)
It is recommended to use JRE 7.0 (update 03 or later).
Note: Symantec Protection Engine supports only 32-bit versions
of Java Runtime Environment. Symantec Protection Engine cannot
be installed with 64-bit JRE versions.
■ Microsoft Visual C++ 2005 (SP1 or later) redistributable package
(x86)
■ One of the following Web browsers to access the Symantec
Protection Engine console:
■ Microsoft Internet Explorer 8 or later
Use Microsoft Internet Explorer to access the Symantec
Protection Engine console from a Windows client computer.
■ Mozilla Firefox 10 or later
Use Mozilla Firefox to access the Symantec Protection Engine
console from a Solaris or Linux client computer.
The Web browser is only required for Web-based administration.
You must install the Web browser on a computer from which you
want to access the Symantec Protection Engine console. The
computer must have access to the server on which Symantec
Protection Engine runs.
Software
System requirements to install Symantec Protection Engine on Solaris
The following are the minimum system requirements for installing Symantec
Protection Engine on Solaris:
Solaris 10 and 11
Ensure that your operating system has the latest service patches
available.
Operating system
UltraSPARC
Processor
4 GB of RAM or higher
Memory
5 GB of hard disk space
10 GB of hard disk space for using URL Filtering feature
Disk space
■ Network interface card (NIC) running TCP/IP with a static IP
address
■ Internet connection to update definitions
■ 100 Mbps Ethernet link (1 Gbps recommended)
Hardware
17
Getting Started
System requirements
■ J2SE Runtime Environment (JRE) 5.0 (update 13 or later), JRE 6.0
(update 21 or later), or JRE 7.0 (update 03 or later)
It is recommended to use JRE 7.0 (update 03 or later).
If you install the self-extracting JRE, ensure that you note the
installation location. You must provide the location of the JRE if
the installer is unable to detect it.
Note: Symantec Protection Engine supports only 32-bit versions
of Java Runtime Environment. Symantec Protection Engine cannot
be installed with 64-bit JRE versions.
■ One of the following Web browsers to access the Symantec
Protection Engine console:
■ Mozilla Firefox 10 or later
Use Mozilla Firefox to access the Symantec Protection Engine
console from a Solaris or Linux client computer.
■ Microsoft Internet Explorer 8 or later
Use Microsoft Internet Explorer to access the Symantec
Protection Engine console from a Windows client computer.
The Web browser is only required for Web-based administration.
You must install the Web browser on a computer from which you
want to access the Symantec Protection Engine console. The
computer must have access to the server on which Symantec
Protection Engine runs.
Software
System requirements to install Symantec Protection Engine on Linux
The following are the minimum system requirements for installing Symantec
Protection Engine on Linux:
■ Red Hat Enterprise Linux Server 5.5 (32-bit and 64-bit) and later
■ Red Hat Advanced Linux Server 5.5 (32-bit and 64-bit) and later
■ Red Hat Enterprise Linux Server 6 (32-bit and 64-bit) and later
■ Red Hat Advanced Linux Server 6 (32-bit and 64-bit) and later
■ SUSE Linux Enterprise Server 11 (32-bit and 64-bit)
Ensure that your operating system has the latest service patches
available.
Operating system
Intel or AMD Server Grade Single Processor Quad Core systems or
higher
Processor
4 GB of RAM or higher
Memory
5 GB of hard disk space
10 GB of hard disk space for using URL Filtering feature
Disk space
Getting Started
System requirements
18
■ Network interface card (NIC) running TCP/IP with a static IP
address
■ Internet connection to update definitions
■ 100 Mbps Ethernet link (1 Gbps recommended)
Hardware
■ Ensure that the following packages are installed:
■ GNU sharutils-4.6.1-2 or later
Use this package to expand the Rapid Release packages.
■ 32-bit GNU libuuid-2.17.2-6 or later
■ ncompress-4.2.4-44 or later
Use this package to expand the Rapid Release packages.
■ GNU C Library (glibc)
■ Initscripts
This package is required for Red Hat Linux only.
■ aaa_base package
This package is required for SUSE only.
■ 32 bit libstdc++ library package
■ J2SE Runtime Environment (JRE) 5.0 (update 13 or later), JRE 6.0
(update 21 or later), or JRE 7.0 (update 03 or later)
It is recommended to use JRE 7.0 (update 03 or later).
Install the JRE using Red Hat Package Manager (RPM). Ensure that
you note the installation location. You must provide the location
of the JRE if the installer is unable to detect it.
Note: Symantec Protection Engine supports only 32-bit versions
of Java Runtime Environment. Symantec Protection Engine cannot
be installed with 64-bit JRE versions.
■ One of the following Web browsers to access the Symantec
Protection Engine console:
■ Mozilla Firefox 10 or later
Use Mozilla Firefox to access the Symantec Protection Engine
console from a Solaris or Linux client computer.
■ Microsoft Internet Explorer 8 or later
Use Microsoft Internet Explorer to access the Symantec
Protection Engine console from a Windows client computer.
The Web browser is only required for Web-based administration.
You must install the Web browser on a computer from which you
want to access the Symantec Protection Engine console. The
computer must have access to the server on which Symantec
Protection Engine runs.
Note: If any of the above package binary is already present on the
computer and if the installer is still unable to find it, you can add the
path to the binary in LD_LIBRARY_PATH environment variable.
Software
19
Getting Started
System requirements
Where to get more information
For more information about using this product, the following resources are
available on the Symantec Protection Engine for Cloud Services 7.0 CD at the
following locations:
Symantec_Protection_EngineDocs
Symantec Protection Engine for Cloud
Services Implementation Guide
You can visit the Symantec Web site for more information about your product.
The following online resources for Symantec Protection Engine and its supported
caching and messaging devices are available:
http://www.symantec.com/docs/HOWTO77303
Latest supported caching and messaging
devices documentation
http://www.symantec.com/
enterprise/support/index.jsp
Technical support Knowledge Base, news
groups, contact information, downloads, and
mailing list subscriptions
http://enterprisesecurity.symantec.com/
Product news and updates
http://www.symantec.com/
security_response/index.jsp
Virus Encyclopedia, which contains
information about all known threats;
information about hoaxes; and access to
white papers about threats
Getting Started
Where to get more information
20

Mais conteúdo relacionado

Mais procurados

Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryBright Technology
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...Symantec
 
Web Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsWeb Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsPort80 Software
 
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation SolutionRadware
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions ErnestStaats
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewallsEnclaveSecurity
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentationtswong
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solutionxKinAnx
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureAlert Logic
 

Mais procurados (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Web Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future MusingsWeb Server Technologies Part III: Security & Future Musings
Web Server Technologies Part III: Security & Future Musings
 
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Forti web
Forti webForti web
Forti web
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas Azure
 

Semelhante a Spe cs getting_started_guide

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 
Symantec Antivirus Management.pptx
Symantec Antivirus Management.pptxSymantec Antivirus Management.pptx
Symantec Antivirus Management.pptxbemnitekalegn
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products MatrixCharles McNeil
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?NovellaJohns
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesBrian Huff
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAmazon Web Services
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09technext1
 

Semelhante a Spe cs getting_started_guide (20)

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Symantec Antivirus Management.pptx
Symantec Antivirus Management.pptxSymantec Antivirus Management.pptx
Symantec Antivirus Management.pptx
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Ericom Shield datasheet
Ericom Shield datasheetEricom Shield datasheet
Ericom Shield datasheet
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best Practices
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09
 

Último

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Último (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Spe cs getting_started_guide

  • 2. Symantec™ Protection Engine for Cloud Services Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: 7.0 Legal Notice Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THEDOCUMENTATIONISPROVIDED"ASIS"ANDALLEXPRESSORIMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLYINVALID.SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com
  • 3. Getting Started This document includes the following topics: ■ About Symantec Protection Engine for Cloud Services ■ Why you need virus protection for Web proxy/caching ■ How Symantec Protection Engine protects against threats in a messaging environment ■ What's new in Symantec Protection Engine ■ About supported protocols for Symantec Protection Engine ■ Components of Symantec Protection Engine ■ About implementing Symantec Protection Engine for Cloud Services ■ Before you install Symantec Protection Engine ■ System requirements ■ Where to get more information About Symantec Protection Engine for Cloud Services Symantec™ Protection Engine for Cloud Services replaces Symantec AntiVirus™ for Caching, Symantec AntiVirus™ for Messaging, and Symantec™ Scan Engine. Note: In this document, Symantec™ Protection Engine for Cloud Services is referred to as Symantec™ Protection Engine. Symantec Protection Engine is a carrier-class content and URL scanning engine. Symantec Protection Engine provides content scanning and URL filtering
  • 4. capabilities to any application on an IP network, regardless of its platform. Any application can pass files or URLs to Symantec Protection Engine for scanning. Symantec Protection Engine accepts scan requests from the client applications that use any of the following protocols: ■ Symantec Protection Engine Native protocol (deprecated) ■ The Internet Content Adaptation Protocol (ICAP), version 1.0, as presented in RFC 3507 (April 2003) ■ A proprietary implementation of remote procedure call (RPC) You can use the Symantec Protection Engine software development kit (SDK) or build your own connector to integrate Symantec Protection Engine with your application. The SDK supports version 1.0 of ICAP, as presented in RFC3507 (April 2003). Symantec also has developed connector code for some third-party applications to seamlessly integrate with Symantec Protection Engine. The Symantec Protection Engine Software Developers Guide provides information about how to create customized integrations with ICAP. See “Components of Symantec Protection Engine” on page 10. About the connector code The connector code handles the communication between the Symantec Protection Engine and the messaging or caching solution. It sends the scanning requests to the Protection Engine, and it interprets the scanning results. The connector code is either developed by the software vendor of the messaging or caching solution or by Symantec. Depending on your messaging or caching solution, you might need to obtain the connector code from the software vendor. In some cases, the software vendor integrates the connector code into its product before distribution. For more information about the connector for your messaging or caching solution, see the appropriate documentation. Why you need virus protection for Web proxy/caching The HTTP gateway is an underprotected area of most networks. Corporate security efforts have heavily focused on more traditional areas through which viruses can enter. Enterprises typically have focused security around known viruses that enter the network through more common means, such as CD-ROM or email, so hackers now exploit the Web as a means to enter corporate networks. Many new threats target port 80, which is usually open on corporate firewalls so that users can browse the Web. Getting Started Why you need virus protection for Web proxy/caching 4
  • 5. Dedicated virus scanning for Web traffic is recommended for the following reasons: ■ Scanning Web traffic lets you catch and block threats at the gateway, rather than multiple times at each desktop. Users can potentially disable desktop protection, which can leave your network vulnerable to attack. ■ Because many people now use Web-based email, email-born viruses that would otherwise be caught by antivirus scanning at the SMTP gateway can slip through to infect the network. ■ The industry trend has been to Web-enable many application environments to include the use of technologies like ActiveX, JavaScript, and Java applets to enhance the user experience. Many new threats are associated with these Web technologies. Malicious mobile code viruses, such as Nimda and Code Red, have entered networks as executables (for example, ActiveX, JavaScript, or Visual Basic Scripts) that appear to be part of safe Web content. ■ Once a threat has been cached, malicious code can potentially be passed to other users on the network, which can compromise additional computers and data on the network. ■ Malicious code can result in lost, stolen, or corrupted files, which can result in costly downtime to the enterprise. How Symantec Protection Engine protects against threats in a messaging environment Symantec Protection Engine can detect the following types of risks: ■ Threats (such as viruses, worms, and Trojan horses) ■ Security risks (such as adware and malware) ■ Denial-of-service attacks Symantec Protection Engine protects your mail system from messages and attachments that overload the system and cause denial-of-service. This includes container files that are overly large, that contain large numbers of embedded compressed files, or that are designed to maliciously use resources and degrade performance. You can specify the maximum amount of time that the Protection Engine devotes to decompose a file and its contents, the maximum file size for container files, and the maximum number of nested levels to be decomposed for scanning. Symantec Protection Engine for Messaging uses the following technologies to protect your messaging environment from threats: 5 Getting Started How Symantec Protection Engine protects against threats in a messaging environment
  • 6. Symantec engineers track reported outbreaks of risks (such as viruses, Trojan horses, worms, adware, and spyware) to identify new risks. After a risk is identified, information about the risk (a signature) is stored in a definition file. The virus definitions file contains the necessary information to detect and eliminate the virus. Definitions Symantec Protection Engine uses Symantec Bloodhound™ heuristics technology to scan for threats for which no known definitions exist. Bloodhound heuristics technology scans for unusual behaviors (such as self-replication) to target potentially infected documents. Bloodhound technology is capable of detecting as much as 80 percent of new and unknown executable file threats. Bloodhound-Macro technology detects and repairs over 90 percent of new and unknown macro viruses. Bloodhound requires minimal overhead since it examines only programs and the documents that meet stringent prerequisites. In most cases, Bloodhound can determine in microseconds whether a file or document is likely to be infected. If it determines that a file is not likely to be infected, it moves to the next file. Heuristics Symantec Protection Engine contains a decomposer that extracts container files so that they can be scanned for risks. The decomposer continues to extract container files until it reaches the maximum that you specify. Container file decomposer Symantec LiveUpdate technology ensures that your network is not at risk of infection from newly discovered viruses. The updates are handled automatically without having the restart services or redeploy software. This ensures no interruption in scanning services during the updates. You can also update risk definitions using Rapid Release or Intelligent Updater. Automatic product and virus definitions updates What's new in Symantec Protection Engine Table 1-1 describes the new features in Symantec Protection Engine. Getting Started What's new in Symantec Protection Engine 6
  • 7. Table 1-1 New features Description Feature Previously, Symantec Scan Engine exposed a limited set of static non-viral categories like Adware, Spyware, and Other Risks. Also, viral threats did not have any categories associated with them. Fromversion7.0onwards,SymantecProtectionEnginecategorizes viral and non-viral threats more accurately. Hence, previously unknown or new non-viral threats that were reported under the generic 'Other Risks' category, would now be categorized more accurately. Enhanced categorization of threats You can now access the Symantec Protection Engine console using the following two types of authentication modes: ■ Symantec Protection Engine-based authentication mode This legacy authentication method requires users to enter the Symantec Protection Engine administrator password to access the console. ■ Windows Active Directory-based authentication mode Only users from the authorized Windows Active Directory security group can access the Symantec Protection Engine console using their Active Directory credentials. Note: For non-Windows platforms, users only have the Symantec Protection Engine-based authentication mode for accessing console. Windows Active Directory-based Authentication mode The Administrator can now create multiple user accounts for managing Symantec Protection Engine. This feature is available only in Symantec Protection Engine-based authentication mode. Manage user accounts Customers who use Symantec LiveUpdate™ Administrator (LUA) to download definitions to their local LiveUpdate server for distribution, must update their product catalog in the LUA. To download new definitions, you must add "Symantec Protection Engine 7.0" to the product catalog in the LUA. New Product Catalog for Symantec Protection Engine Symantec Protection Engine now provides granular policies to handle unscannable files (malformed and encrypted containers), along with statistical reports. Better handling of Unscannable files You can now exclude files from scanning that exceed the configured file size threshold value. Scan exclusion policy based on file size 7 Getting Started What's new in Symantec Protection Engine
  • 8. Table 1-1 New features (continued) Description Feature You can now choose to scan files in-place that are less than the configured file size threshold value. This feature is only available over RPC protocol. In-place scan policy based on file size From version 7.0, Symantec Protection Engine is capable of retaining cumulative scan data since installation in addition to retaining data since last restart. View cumulative scan data on home page From version 7.0 onwards, the data from the Resources page can now be saved in log files for futher analysis. Resourceconsumption logging Symantec Protection Engine 7.0 is equipped with strong cipher support. Stronger ciphers for password While previously Symantec Scan Engine used to block access to infected MS Office files, Symantec Protection Engine 7.0 can now repair and delete threats. Thus, you will be able to retrieve your clean Office files. Enhanced scanning for MS Office documents You can configure Symantec Protection Engine to display a custom security notice that contains common security-related information to all users before they log in to the Symantec Protection Engine console. Security notice You can integrate Symantec Protection Engine events with System Center Operations Manager (SCOM).System Center Operations Manager is a central repository that can receive critical events, errors, warnings, and other information from your Symantec Protection Engine servers. Support for System Center Operations Manager 2007(SCOM) Pack Symantec Protection Engine 7.0 supports the following new platforms: ■ Windows Server 2008 Japanese (32-bit and 64-bit) ■ Windows Server 2008 R2 Japanese (64-bit) ■ Windows Server 2012 (64-bit) New platform support Symantec Protection Engine 7.0 now supports JRE 7.0 Java™ 2SE Runtime Environment (JRE) 7.0 Getting Started What's new in Symantec Protection Engine 8
  • 9. About supported protocols for Symantec Protection Engine Table 1-2 lists the supported protocols that client applications can use to send scan requests to Symantec Protection Engine. Table 1-2 Supported protocols Description Protocol Symantec Protection Engine implements a TCP/IP protocol to provide scanning functionality to client applications. This protocol is text-based, like HTTP or SMTP. It uses ASCII commands and responses to communicate between the client and the server. To scan a file, a client connects to the default IP port. It sends the file to be scanned and then reads the results of the scan. After the client receives the scan results, the client and server disconnect and must initiate a new connection to scan each subsequent file. Native protocol (Deprecated) ICAP is a lightweight protocol for executing a remote procedure call on HTTP messages. ICAP is part of an architecture that lets corporations, carriers, and ISPs dynamically scan, change, and augment Web content as it flows through ICAP servers. The protocol lets ICAP clients pass HTTP messages to ICAP servers for adaptation. Adaptation might include some sort of transformation or other processing, such as scanning or content filtering. The server executes its transformation service on the messages and responds to the client, usually with modified messages. The adapted messages might be either HTTP requests or HTTP responses. Internet Content Adaptation Protocol (ICAP) Remote procedure call (RPC) is a client/server infrastructure that increases the interoperability and portability of an application. RPC lets the application be distributed over multiple platforms. The use of RPC frees the developer from having to be familiar with various operating systems and network interfaces. Symantec Protection Engine uses a proprietary scanning protocol with the MS-RPC protocol to interface with client applications. This protocol is supported only on Windows 2003 Server/Windows 2008 Server/Windows 2012 Server. Any appropriate client can use RPC to communicate with Symantec Protection Engine to request the scanning and repairing of files. A proprietary remote procedure call (RPC) protocol 9 Getting Started About supported protocols for Symantec Protection Engine
  • 10. For more details on the supported protocols, see Symantec Protection Engine Implementation Guide. Components of Symantec Protection Engine Table 1-3 lists the components that are included on the product CD. Table 1-3 Product components Folder name Description Component Symantec_Protection_Engine The software that you install to protect your networkfromthreats(such as viruses), security risks (such as adware and spyware), and unwanted content. Symantec Protection Engine Symantec_Protection_Engine Silent_Install The files that you can use to perform a silent installation or upgrade. Also includes response files for Red Hat and Solaris. Silent installation Command_Line_Scanner The software that acts as a client to Symantec Protection Engine through the Symantec Protection Engine application programming interface (API). The command-line scanner lets you send files to Symantec Protection Engine to be scanned. Command-line scanner Symantec_Protection_Engine_SDK The tools and documentation that you can use to create the customized integrations that use ICAP. Symantec Protection Engine software developer's kit Getting Started Components of Symantec Protection Engine 10
  • 11. Table 1-3 Product components (continued) Folder name Description Component ToolsCentral_Quarantine The tool that you use to quarantine infected files that cannot be repaired when you use the ICAP protocol or RPC protocol. Symantec Central Quarantine server lets you isolate unrepairable files so that threats cannot spread. Symantec Central Quarantine server ToolsLiveUpdate_Admin The utility that you use to configure one or more intranet FTP, HTTP, or LAN servers to act as internal LiveUpdate servers. LiveUpdate lets Symantec products download program and definition file updates either directly from Symantec or from a LiveUpdate server. For more information, see the LiveUpdate Administrator's Guide on the product CD. LiveUpdate™ Administration Utility 11 Getting Started Components of Symantec Protection Engine
  • 12. Table 1-3 Product components (continued) Folder name Description Component ToolsSCOMManagement_Pack You can integrate Symantec Protection Engine events with System Center Operations Manager (SCOM).System Center Operations Manager is a central repository that can receive critical events, errors, warnings, and other information from your Symantec Protection Engine servers. Preconfigured rules are automatically created when you import the management pack. System Center Operation Manager Agent monitors Windows Event log for Symantec Protection Engine events based on criteria mentioned in rules of Management pack. When a rule is triggered, the Operations Manager 2007 Agent collects data about the event and forwards it to the System Center Operations Manager. For more information, see the Symantec™ Protection Engine Management Pack Integration Guide on the Symantec Protection Engine product CD. SystemCenterOperations Manager 2007(SCOM) Pack Adobe Acrobat Reader is required to view the reports that are generated in .pdf format. You can download Adobe Acrobat Reader from http://www.adobe.com/. Getting Started Components of Symantec Protection Engine 12
  • 13. About implementing Symantec Protection Engine for Cloud Services Implementation of Symantec Protection Engine for Cloud Services involves the following process: ■ Ensure that your messaging or caching solution is properly installed and configured. For more information about the hardware and system requirements for your messaging or caching solution, see your product documentation. ■ If applicable, install the connector code or plug-in for your messaging or caching solution. You must install the connector on the computer on which the messaging or caching solution is installed. For more information about installing and configuring the connector, see the documentation for your connector. ■ Install Symantec Protection Engine on a separate computer. Symantec Protection Engine is included on the Symantec Protection Engine for Cloud Services 7.0 CD. For more information about installing and configuring the Protection Engine, see the Symantec Protection Engine Implementation Guide on the CD. ■ Configure Symantec Protection Engine. You must configure the Protection Engine before you configure the messaging or caching solution to send files to the Protection Engine. For more information about integrating your messaging or caching solution with the Protection Engine, see the appropriate configuration guide. ■ Configure the messaging or caching solution to send files to the Protection Engine. For more information about integrating your messaging or caching solution with the Protection Engine, see the appropriate configuration guide. Before you install Symantec Protection Engine Install Symantec Protection Engine on a computer that meets the system requirements. Before you install Symantec Protection Engine, install and configure the operating system software and applicable updates for your server. Also ensure that your operating system software and server work correctly. For more information, see the documentation for your server. See “System requirements” on page 15. Before you install Symantec Protection Engine, take the following steps: 13 Getting Started About implementing Symantec Protection Engine for Cloud Services
  • 14. ■ On Windows operating system, if you want to use Windows Active Directory-based authentication method to access the Symantec Protection Engine console, you must ensure the following: ■ Create or identify an existing security group in the Active Directory that would be authorized to access the Symantec Protection Engine console. ■ The server (on which you plan to install Symantec Protection Engine) belongs to the same domain or has trust relationship with the Active Directory, that contains the security group authorized to access the Symantec Protection Engine console. ■ Install Java 2SE Runtime Environment (JRE) 5.0 (update 13 or later), JRE 6.0 (update 21 or later), or JRE 7.0 (update 03 or later) on the server. It is recommended to use JRE 7.0 (update 03 or later). Note: Symantec Protection Engine supports only 32-bit versions of Java Runtime Environment. Symantec Protection Engine cannot be installed with 64-bit JRE versions. ■ Disable any third-party antivirus products that are running on the server on which you plan to install Symantec Protection Engine. You can turn on antivirus protection after installation is complete. Symantec Protection Engine scans the files that client applications pass to Symantec Protection Engine. Symantec Protection Engine does not protect the computer on which it runs. Since Symantec Protection Engine processes the files that might contain threats, the server on which it runs is vulnerable if it has no real-time protection. Use an antivirus program to protect the server on which Symantec Protection Engine runs, such as Symantec Endpoint Protection. To prevent scanning conflicts, configure the antivirus program not to scan the temporary directory that Symantec Protection Engine uses for scanning. ■ Review the deployment considerations and recommendations. These recommendations can enhance your overall performance. After you complete the installation, perform the post-installation tasks. For post-installation tasks, see the Symantec Protection Engine Implementation Guide. Migrating to version 7.0 While installing Symantec Protection Engine, you can choose to upgrade from the previous version to version 7.0 Getting Started Before you install Symantec Protection Engine 14
  • 15. Table 1-4 describes the upgrades that Symantec Protection Engine supports. Table 1-4 Supported upgrades Description Previous version number You can install the upgrade over the existing installation. When you upgrade from version 5.2, Symantec Protection Engine retains all of the settings and values that you have configured. 5.2 You can install the upgrade over the existing installation. When you upgrade from version 5.1, Symantec Protection Engine retains all of the settings and values that you have configured. 5.1 Upgrades from version 4.3x or earlier of the product are not supported. If you want to upgrade a version 4.3x or earlier installation, you must first upgrade your installation to version 5.2x (which does support a direct upgrade from version 4.3x), and then upgrade the version 5.2x installation to version 7.0. 4.3x and earlier Note: Symantec Protection Engine does not support upgrades from version 5.0. You must stop the Symantec Protection Engine service before you upgrade the software. If you cancel the upgrade on Solaris after selecting the upgrade type, you must reinstall the previous version. If you want to upgrade from version 5.2/5.1 and use security certificates, take the following actions: ■ If you use the default security files that Symantec Protection Engine generated, delete the keystore.public and keystore.private before you perform the upgrade installation. ■ If you use custom security files, you can retain the custom security files. Symantec Protection Engine automatically uses the existing files when you upgrade. System requirements Before you install Symantec Protection Engine, verify that your server meets the minimum system requirements. 15 Getting Started System requirements
  • 16. See “System requirements to install Symantec Protection Engine on Windows” on page 16. See “System requirements to install Symantec Protection Engine on Solaris” on page 17. See “System requirements to install Symantec Protection Engine on Linux” on page 18. System requirements to install Symantec Protection Engine on Windows The following are the minimum system requirements for installing Symantec Protection Engine on Windows: ■ Windows Server 2003 (32-bit and 64-bit) ■ Windows Server 2003 R2 (32-bit and 64-bit) ■ Windows Server 2003 R2 Japanese (32-bit and 64-bit) ■ Windows Server 2008 SP2 (32-bit and 64-bit) ■ Windows Server 2008 R2 (64-bit) ■ Windows Server 2008 Japanese (32-bit and 64-bit) ■ Windows Server 2008 R2 Japanese (64-bit) ■ Windows Server 2012 (64-bit) Ensure that your operating system has the latest service patches available. Operating system Intel or AMD Server Grade Single Processor Quad Core systems or higher Processor 4 GB of RAM or higher Memory 5 GB of hard disk space 10 GB of hard disk space for using URL Filtering feature Disk space ■ Network interface card (NIC) running TCP/IP with a static IP address ■ Internet connection to update definitions ■ 100 Mbps Ethernet link (1 Gbps recommended) Hardware Getting Started System requirements 16
  • 17. ■ J2SE Runtime Environment (JRE) 5.0 (update 13 or later), JRE 6.0 (update 21 or later), or JRE 7.0 (update 03 or later) It is recommended to use JRE 7.0 (update 03 or later). Note: Symantec Protection Engine supports only 32-bit versions of Java Runtime Environment. Symantec Protection Engine cannot be installed with 64-bit JRE versions. ■ Microsoft Visual C++ 2005 (SP1 or later) redistributable package (x86) ■ One of the following Web browsers to access the Symantec Protection Engine console: ■ Microsoft Internet Explorer 8 or later Use Microsoft Internet Explorer to access the Symantec Protection Engine console from a Windows client computer. ■ Mozilla Firefox 10 or later Use Mozilla Firefox to access the Symantec Protection Engine console from a Solaris or Linux client computer. The Web browser is only required for Web-based administration. You must install the Web browser on a computer from which you want to access the Symantec Protection Engine console. The computer must have access to the server on which Symantec Protection Engine runs. Software System requirements to install Symantec Protection Engine on Solaris The following are the minimum system requirements for installing Symantec Protection Engine on Solaris: Solaris 10 and 11 Ensure that your operating system has the latest service patches available. Operating system UltraSPARC Processor 4 GB of RAM or higher Memory 5 GB of hard disk space 10 GB of hard disk space for using URL Filtering feature Disk space ■ Network interface card (NIC) running TCP/IP with a static IP address ■ Internet connection to update definitions ■ 100 Mbps Ethernet link (1 Gbps recommended) Hardware 17 Getting Started System requirements
  • 18. ■ J2SE Runtime Environment (JRE) 5.0 (update 13 or later), JRE 6.0 (update 21 or later), or JRE 7.0 (update 03 or later) It is recommended to use JRE 7.0 (update 03 or later). If you install the self-extracting JRE, ensure that you note the installation location. You must provide the location of the JRE if the installer is unable to detect it. Note: Symantec Protection Engine supports only 32-bit versions of Java Runtime Environment. Symantec Protection Engine cannot be installed with 64-bit JRE versions. ■ One of the following Web browsers to access the Symantec Protection Engine console: ■ Mozilla Firefox 10 or later Use Mozilla Firefox to access the Symantec Protection Engine console from a Solaris or Linux client computer. ■ Microsoft Internet Explorer 8 or later Use Microsoft Internet Explorer to access the Symantec Protection Engine console from a Windows client computer. The Web browser is only required for Web-based administration. You must install the Web browser on a computer from which you want to access the Symantec Protection Engine console. The computer must have access to the server on which Symantec Protection Engine runs. Software System requirements to install Symantec Protection Engine on Linux The following are the minimum system requirements for installing Symantec Protection Engine on Linux: ■ Red Hat Enterprise Linux Server 5.5 (32-bit and 64-bit) and later ■ Red Hat Advanced Linux Server 5.5 (32-bit and 64-bit) and later ■ Red Hat Enterprise Linux Server 6 (32-bit and 64-bit) and later ■ Red Hat Advanced Linux Server 6 (32-bit and 64-bit) and later ■ SUSE Linux Enterprise Server 11 (32-bit and 64-bit) Ensure that your operating system has the latest service patches available. Operating system Intel or AMD Server Grade Single Processor Quad Core systems or higher Processor 4 GB of RAM or higher Memory 5 GB of hard disk space 10 GB of hard disk space for using URL Filtering feature Disk space Getting Started System requirements 18
  • 19. ■ Network interface card (NIC) running TCP/IP with a static IP address ■ Internet connection to update definitions ■ 100 Mbps Ethernet link (1 Gbps recommended) Hardware ■ Ensure that the following packages are installed: ■ GNU sharutils-4.6.1-2 or later Use this package to expand the Rapid Release packages. ■ 32-bit GNU libuuid-2.17.2-6 or later ■ ncompress-4.2.4-44 or later Use this package to expand the Rapid Release packages. ■ GNU C Library (glibc) ■ Initscripts This package is required for Red Hat Linux only. ■ aaa_base package This package is required for SUSE only. ■ 32 bit libstdc++ library package ■ J2SE Runtime Environment (JRE) 5.0 (update 13 or later), JRE 6.0 (update 21 or later), or JRE 7.0 (update 03 or later) It is recommended to use JRE 7.0 (update 03 or later). Install the JRE using Red Hat Package Manager (RPM). Ensure that you note the installation location. You must provide the location of the JRE if the installer is unable to detect it. Note: Symantec Protection Engine supports only 32-bit versions of Java Runtime Environment. Symantec Protection Engine cannot be installed with 64-bit JRE versions. ■ One of the following Web browsers to access the Symantec Protection Engine console: ■ Mozilla Firefox 10 or later Use Mozilla Firefox to access the Symantec Protection Engine console from a Solaris or Linux client computer. ■ Microsoft Internet Explorer 8 or later Use Microsoft Internet Explorer to access the Symantec Protection Engine console from a Windows client computer. The Web browser is only required for Web-based administration. You must install the Web browser on a computer from which you want to access the Symantec Protection Engine console. The computer must have access to the server on which Symantec Protection Engine runs. Note: If any of the above package binary is already present on the computer and if the installer is still unable to find it, you can add the path to the binary in LD_LIBRARY_PATH environment variable. Software 19 Getting Started System requirements
  • 20. Where to get more information For more information about using this product, the following resources are available on the Symantec Protection Engine for Cloud Services 7.0 CD at the following locations: Symantec_Protection_EngineDocs Symantec Protection Engine for Cloud Services Implementation Guide You can visit the Symantec Web site for more information about your product. The following online resources for Symantec Protection Engine and its supported caching and messaging devices are available: http://www.symantec.com/docs/HOWTO77303 Latest supported caching and messaging devices documentation http://www.symantec.com/ enterprise/support/index.jsp Technical support Knowledge Base, news groups, contact information, downloads, and mailing list subscriptions http://enterprisesecurity.symantec.com/ Product news and updates http://www.symantec.com/ security_response/index.jsp Virus Encyclopedia, which contains information about all known threats; information about hoaxes; and access to white papers about threats Getting Started Where to get more information 20