EasyManua.ls Logo

Symantec Critical System - User Manual

Symantec Critical System
122 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Symantec™ Critical System
Protection Installation Guide

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Symantec Critical System and is the answer not in the manual?

Summary

Introducing Symantec Critical System Protection

About Symantec Critical System Protection

Provides an overview of Symantec Critical System Protection's behavior control and detection capabilities.

Components of Symantec Critical System Protection

Details the core components of the Symantec Critical System Protection system, including console, server, and agents.

How Symantec Critical System Protection works

Explains the operational mechanism of Symantec Critical System Protection, focusing on policy enforcement and monitoring.

About the policy library

Describes the policy library containing pre-configured and customizable prevention and detection policies.

Where to get more information

Lists resources for obtaining additional product manuals and support information.

Planning the Installation

About planning the installation

Covers the initial steps and considerations for planning the installation of Symantec Critical System Protection components.

About network architecture and policy distribution

Discusses considerations for network setup and how policies are distributed across the environment.

System requirements

Outlines the necessary operating system and hardware requirements for installing Symantec Critical System Protection.

Disabling Windows XP firewalls

Provides instructions on how to disable Windows XP firewalls to ensure proper network communication.

About using firewalls with Symantec Critical System Protection

Explains how to configure firewalls to allow communication for Symantec Critical System Protection components.

About name resolution

Details the importance of verifying name resolution for the management server and potential troubleshooting steps.

About IP routing

Explains how IP routing and NAT work, especially in DMZ environments, for agent communication.

About intrusion prevention

Discusses enabling and configuring the intrusion prevention feature for agents during installation.

About simple failover

Introduces the simple failover feature for agents to switch between management servers.

About the Windows NT agent installation

Highlights the differences and specific requirements for installing the Symantec Critical System Protection agent on Windows NT.

About log files

Describes the agent and management server log files and their default locations for troubleshooting.

Installing Symantec Critical System Protection on Windows

About installing Symantec Critical System Protection on Windows

Guides first-time installations, emphasizing a test environment and component order.

About port number mapping

Explains the importance of matching port numbers for component communication during installation.

Bypassing prerequisite checks

Details how to bypass installation prerequisite checks if they are incorrectly failing.

About installing a database to a SQL Server instance

Covers the process of installing Symantec Critical System Protection databases on SQL Server instances.

Configuring the temp environment variable

Explains how to configure the TEMP environment variable for installation file unpacking and disk space.

Installing the management server

Provides steps and options for installing the Symantec Critical System Protection management server.

Installing and configuring the management console

Guides the installation and initial configuration of the Symantec Critical System Protection management console.

Installing a Windows agent

Details the process of installing the Symantec Critical System Protection agent on Windows operating systems.

Unattended agent installation

Explains how to perform silent, automated installations of Windows agents using command-line options.

Installing the Windows NT policy

Describes the separate installation process for the Windows NT prevention policy.

Uninstalling Symantec Critical System Protection

Outlines the procedure for uninstalling Symantec Critical System Protection components individually.

Temporarily disabling Windows agents

Provides methods to temporarily disable Windows agents, especially in safe mode.

Reinstalling Windows agents

Explains how to perform an unattended reinstall of Windows agents, useful for corrupted installations.

Installing UNIX agents

About installing UNIX agents

Covers general requirements and considerations for installing Symantec Critical System Protection agents on UNIX systems.

Installing an agent in verbose mode

Guides the installation of UNIX agents with detailed output for troubleshooting.

Installing an agent in silent mode

Explains how to perform automated, unattended installations of UNIX agents using command-line switches.

Uninstalling agents using package commands

Details how to uninstall UNIX agents using native operating system package management commands.

Uninstalling agents manually

Provides step-by-step instructions for manually uninstalling Symantec Critical System Protection agents on various UNIX platforms.

Disabling and enabling UNIX agents

Explains how to disable and re-enable UNIX agents, covering both temporary and permanent methods.

Monitoring and restarting UNIX agents

Describes how to monitor and automatically restart UNIX agents using crontab entries.

Troubleshooting agent issues

Addresses common issues encountered during agent installation, such as hanging due to unresponsive NFS servers.

Migrating to the latest version

Migrating legacy installations of Symantec Critical System Protection

Covers the process of upgrading older versions of Symantec Critical System Protection to the latest release.

Migrating other legacy agent installations

Details the migration of legacy agent software, like Intruder Alert and Host IDS, to Symantec Critical System Protection.

Checklist for migrating from Symantec Intruder Alert

Provides a checklist and considerations for migrating policies and agents from Symantec Intruder Alert.

Checklist for migrating from Symantec Host IDS

Offers a checklist and guidance for migrating policies and agents from Symantec Host IDS.

Migrating legacy agent software

Explains the process of installing the latest Symantec Critical System Protection agent to migrate legacy agent software.

Preparing for detection policy migration

Outlines the necessary steps to prepare for migrating legacy detection policy files.

Migrating legacy detection policy files

Describes the process of converting and migrating legacy detection policy files using a conversion utility.

Symantec Critical System Specifications

General IconGeneral
BrandSymantec
ModelCritical System
CategoryNetwork Card
LanguageEnglish