Getting Started SEP11.0.6
Getting Started SEP11.0.6
Symantec™ Endpoint
Protection
20983668
Getting Started with Symantec Endpoint Protection
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
PN: 20983668
Legal Notice
Copyright © 2010 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System,
LiveUpdate, Norton, Norton 360, Sygate, and TruScan are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
10 9 8 7 6 5 4 3 2 1
Getting Started
This document includes the following topics:
■ System requirements
Your Symantec software may include Symantec Network Access Control. Symantec
Network Access Control also uses Symantec Endpoint Protection Manager to
install and manage Symantec Endpoint Protection clients and Symantec Network
Access Control clients. Symantec Network Access Control ensures that clients are
compliant with your organization’s security policies before they are allowed access
to your network. Symantec Endpoint Protection and Symantec Network Access
Control work together but are purchased separately.
See “Components of Symantec Endpoint Protection and Symantec Network Access
Control” on page 4.
Component Description
Database The database that stores security policies and events. The
database is installed on the computer that hosts Symantec
Endpoint Protection Manager.
Component Description
Symantec Protection Center Symantec Protection Center is installed when you install
Symantec Endpoint Protection Manager. Protection Center
lets you integrate management consoles from multiple
supported Symantec security products into a single
management environment.
Central Quarantine (optional) The Central Quarantine receives suspicious files and
unrepaired infected items from the Symantec Endpoint
Protection clients. Central Quarantine forwards a sample
to Symantec Security Response, which analyzes the sample.
If a threat is new, Symantec Security Response produces
security updates.
Computers
running the
Symantec
Endpoint
Protection client
or the Symantec
Internet
Network Access
Control client,
connecting
through a VPN
tunnel
Firewall
Local Ethernet
Network
Feature Benefit
A Web-based console for Symantec You can now manage Symantec Endpoint Protection
Endpoint Protection Manager Manager remotely in a Web-based console. The
provides easier remote management Java-based remote console is also still available.
access
Symantec Endpoint Protection You can use Symantec Endpoint Protection Manager
includes client software to run on a to manage Mac clients that run Symantec software
Mac computer to provide virus and spyware protection on Mac OS
X computers.
Scheduled scans can start at random You can specify a time interval during which
times scheduled scans start, and enable the scans to start
at different times within that time interval. By
running scans at random times, you can increase
scan performance, especially in virtualized
environments.
8 Getting Started
System requirements
Feature Benefit
Enhanced default Antivirus and For new product installations, changes in the default
Antispyware security policies security policies make Symantec Endpoint
Protection more efficient at detecting malware.
The Symantec Endpoint Recovery The Symantec Endpoint Recovery Tool provides
Tool scans and removes malware an image that you can burn on a disc, and then use
from severely infected computers to scan and remove malware from client computers.
You use this tool for the computers that are too
infected for Symantec Endpoint Protection to clean
effectively.
System requirements
Symantec software requires specific protocols, operating systems and service
packs, software, and hardware. All the computers to which you install Symantec
software should meet or exceed the recommended system requirements for the
operating system that is used.
This guide contains summary information about system requirements. This
information may be sufficient to install to a small network or test network. You
should refer to the full system requirements before you install the product on a
more complex network.
See the Installation Guide for Symantec Endpoint Protection and Symantec Network
Access Control for full system requirements.
See “Installing and configuring the Symantec Endpoint Protection Manager with
an embedded database” on page 14.
Table 1-3 summarizes the minimum requirements for the computer on which you
install the Symantec Endpoint Protection Manager.
Getting Started 9
System requirements
Component Requirement
■ 32-bit systems: You can also use Microsoft SQL Server 2000 with Service Pack 4 or
later, Microsoft SQL Server 2005 with Service Pack 2, or Microsoft SQL Server 2008.
■ 64-bit systems: You can also use Microsoft SQL Server 2000 with Service Pack 3 or
later, Microsoft SQL Server 2005 with Service Pack 2, or Microsoft SQL Server 2008.
Other software ■ 32-bit systems: Internet Information Services server 5.0 or later with Web services
enabled.
64-bit systems: Internet Information Services server 5.1 or later with Web services
enabled.
■ Internet Explorer 6.0 or later
■ Static IP address recommended
10 Getting Started
System requirements
Component Requirement
Table 1-4 summarizes the minimum requirements for the remote computer on
which you run the Symantec Endpoint Protection Manager console.
Getting Started 11
System requirements
Component Requirement
Table 1-5 summarizes the minimum requirements for the remote computers on
which you run the Symantec Endpoint Protection Manager Web Console.
Component Requirement
Table 1-6 summarizes the minimum requirements for the computers on which
you install the client software for either Symantec Endpoint Protection or
Symantec Network Access Control on Windows.
Component Requirement
Component Requirement
■ 256 MB RAM, (1 GB recommended) for Windows XP, Windows XP Embedded, and Windows
Fundamentals for Legacy PCs
1 GB RAM minimum (2-4 GB recommended) for Windows Vista, Windows 7, Windows Server
2003 (all editions), and Windows Server 2008 (all editions)
■ 600 MB hard disk
■ VGA (640x480) or higher resolution video adapter and monitor
64-bit systems:
Table 1-7 summarizes the minimum requirements for the computers on which
you install the Mac client software.
Component Requirement
For information about operating systems for Symantec AntiVirus for Linux, see
the Installation Guide for Symantec Endpoint Protection and Symantec Network
Access Control.
14 Getting Started
About migrating to Symantec Endpoint Protection or Symantec Network Access Control
For information about using the Symantec AntiVirus client on Linux, see the
Symantec AntiVirus for Linux Client Guide. The guide is located in the docs folder
of the product disc that contains the Symantec AntiVirus client software for Linux.
■ The third part creates and deploys client software to the client computers.
You can deploy the client software during the management server installation
or later. You must deploy the client software on the computer that runs the
management server.
Each part consists of a wizard. When the wizard for each part completes, a prompt
that asks you whether or not you want to continue with the next wizard displays.
To install Symantec Endpoint Protection Manager
1 Insert the product disc into the drive, and start the installation. For
downloaded products, open the CD1 folder and double-click Setup.exe.
2 On the Welcome page, do one of the following actions:
■ To install Symantec Endpoint Protection, click Install Symantec Endpoint
Protection Manager.
■ To install Symantec Network Access Control, click Install Symantec
Network Access Control, and then click Install Symantec Endpoint
Protection Manager.
■ To let the Symantec Endpoint Protection Manager IIS Web server run
with other Web sites on this computer, check Use the default Web site.
7 Click Next.
16 Getting Started
Installing and configuring the Symantec Endpoint Protection Manager with an embedded database
5 The configuration summary page displays the values that are used to install
Symantec Endpoint Protection Manager. You can print a copy of the settings
to maintain for your records, or click Next.
Wait while the installation creates the database, which can take several
minutes.
6 On the Management Server Configuration Wizard Completed page, do one
of the following:
Getting Started 17
Installing and configuring the Symantec Endpoint Protection Manager with an embedded database
Note: This procedure has you select a directory in which to place installation files.
You may want to create this directory before you start this procedure. Also, you
need to authenticate with administrative credentials to the Windows Domain or
Workgroup that contain the computers.
Computers that run firewalls, Windows XP, Windows Vista, or Windows Server
2008 have special requirements. Firewalls must permit remote deployment over
TCP ports 139 and 445. Also, disable simple file sharing on the computers that
are in workgroups and that run Windows XP. On Windows Vista and Windows
Server 2008, you must enable network discovery.
For a comprehensive list of system requirements, including port and protocol
requirements, see the Installation Guide for Symantec Endpoint Protection and
Symantec Network Access Control.
You can also use the Find Unmanaged Computers utility that lets you locate the
client computers that do not run client software and then install the client software
on those computers.
Note: You can use the Migration and Deployment Wizard to create a client software
package for Mac computers. You cannot use the Push Deployment Wizard to
deploy the package.
For more information on installing and deploying client software, see the
Installation Guide for Symantec Endpoint Protection and Symantec Network Access
Control.
To configure and deploy client software on Windows computers
1 Start the Migration and Deployment Wizard by doing one of the following:
Getting Started 19
Configuring and deploying client software on Windows computers
■ On the Windows Start menu, click Start > Programs > Symantec Endpoint
Protection Manager > Migration and Deployment Wizard.
The path may be different depending on the version of Windows that you
use.
■ On the last panel of the Management Server Configuration Wizard, click
Yes, and then click Finish.
See “Installing and configuring the Symantec Endpoint Protection Manager
with an embedded database” on page 14.
2 In the Welcome to the Migration and Deployment Wizard panel, click Next.
3 In the What would you like to do panel, check Deploy the Windows client,
and then click Next.
4 In the next panel, check Specify the name of a new group that you wish to
deploy clients to, type a group name in the box, and then click Next.
After you have deployed client software and logged on to the console, you
can locate this group in the console.
5 In the next panel, uncheck any types of protection that you do not want to
install (Symantec Endpoint Protection only), and then click Next.
6 In the next panel, check the installation options that you want for packages,
files, and user interaction.
7 Click Browse, locate and select a directory in which to place the installation
file(s), and then click Open.
8 Click Next.
9 In the next panel, check Yes, and then click Finish.
It can take several minutes to create and export the installation package for
your group before the Push Deployment Wizard appears.
To deploy the client software with the Push Deployment Wizard
1 In the Push Deployment Wizard, under Available computers, expand the
trees and select the computers on which to install the client software, and
then click Add >.
2 In the Remote Client Authentication dialog box, type the user name and
password, and then click OK.
The user name and password must be able to authenticate to the Windows
Domain or Workgroup that contains the computers.
3 When you have selected all of the computers and they appear in the right
pane, click Finish.
20 Getting Started
Where to get more information
Contact options