0% found this document useful (0 votes)
84 views22 pages

Getting Started SEP11.0.6

Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System, LiveUpdate, Norton, Norton 360, Sygate, and TruScan are trademarks or registered trademarks of Symantec Corporation. No part of this document may be reproduced in any form by any means without prior written authorization. The Licensed Software and Documentation are deemed to be Commercial Computer Software as defined in FAR 12.212.

Uploaded by

johnsm1382
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views22 pages

Getting Started SEP11.0.6

Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System, LiveUpdate, Norton, Norton 360, Sygate, and TruScan are trademarks or registered trademarks of Symantec Corporation. No part of this document may be reproduced in any form by any means without prior written authorization. The Licensed Software and Documentation are deemed to be Commercial Computer Software as defined in FAR 12.212.

Uploaded by

johnsm1382
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Getting Started with

Symantec™ Endpoint
Protection

20983668
Getting Started with Symantec Endpoint Protection
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.

Documentation version: 11.00.06.00.00

PN: 20983668

Legal Notice
Copyright © 2010 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System,
LiveUpdate, Norton, Norton 360, Sygate, and TruScan are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.

The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation
350 Ellis Street
Mountain View, CA 94043

http://www.symantec.com

Printed in the United States of America.

10 9 8 7 6 5 4 3 2 1
Getting Started
This document includes the following topics:

■ About Symantec Endpoint Protection

■ Components of Symantec Endpoint Protection and Symantec Network Access


Control

■ What's new in Symantec Endpoint Protection 11

■ System requirements

■ About migrating to Symantec Endpoint Protection or Symantec Network Access


Control

■ Installing and configuring the Symantec Endpoint Protection Manager with


an embedded database

■ Configuring and deploying client software on Windows computers

■ Where to get more information

About Symantec Endpoint Protection


Symantec Endpoint Protection combines virus protection with advanced threat
protection to proactively secure your computers against known and unknown
threats.
Symantec Endpoint Protection protects against malware such as viruses, worms,
Trojan horses, spyware, and adware. It provides protection against even the most
sophisticated attacks that evade traditional security measures such as rootkits,
zero-day attacks, and spyware that mutates. Symantec Endpoint Protection also
lets you maintain fine-grained application and device control. Symantec Endpoint
Protection provides multiple layers of protection for your endpoint computing
devices.
4 Getting Started
Components of Symantec Endpoint Protection and Symantec Network Access Control

Your Symantec software may include Symantec Network Access Control. Symantec
Network Access Control also uses Symantec Endpoint Protection Manager to
install and manage Symantec Endpoint Protection clients and Symantec Network
Access Control clients. Symantec Network Access Control ensures that clients are
compliant with your organization’s security policies before they are allowed access
to your network. Symantec Endpoint Protection and Symantec Network Access
Control work together but are purchased separately.
See “Components of Symantec Endpoint Protection and Symantec Network Access
Control” on page 4.

Components of Symantec Endpoint Protection and


Symantec Network Access Control
Table 1-1 lists the product's components and describes their functions.

Table 1-1 Product components

Component Description

Symantec Endpoint Symantec Endpoint Protection Manager is a management


Protection Manager server that manages the client computers that connect to
your company's network.
Symantec Endpoint Protection Manager includes the
following software:

■ The console software coordinates and manages security


policies and client computers.
■ The server software provides secure communication to
and from the client computers and the console.

Database The database that stores security policies and events. The
database is installed on the computer that hosts Symantec
Endpoint Protection Manager.

Symantec Endpoint The Symantec Endpoint Protection client protects the


Protection client computers with antivirus and antispyware scans, a firewall,
an intrusion prevention system, and other protection
technologies. It runs on the servers, desktops, and portable
computers that you want to protect.

For more information, see the Client Guide for Symantec


Endpoint Protection and Symantec Network Access Control.

The Symantec Endpoint Protection Mac client protects the


computers with antivirus and antispyware scans.
Getting Started 5
Components of Symantec Endpoint Protection and Symantec Network Access Control

Table 1-1 Product components (continued)

Component Description

Symantec Protection Center Symantec Protection Center is installed when you install
Symantec Endpoint Protection Manager. Protection Center
lets you integrate management consoles from multiple
supported Symantec security products into a single
management environment.

LiveUpdate Server (optional) The LiveUpdate Server downloads definitions, signatures,


and product updates from a Symantec LiveUpdate server
and distributes the updates to client computers.

For more information, see the Symantec LiveUpdate


Administrator User's Guide.

Central Quarantine (optional) The Central Quarantine receives suspicious files and
unrepaired infected items from the Symantec Endpoint
Protection clients. Central Quarantine forwards a sample
to Symantec Security Response, which analyzes the sample.
If a threat is new, Symantec Security Response produces
security updates.

For more information, see the Symantec Central Quarantine


Implementation Guide.
6 Getting Started
What's new in Symantec Endpoint Protection 11

Figure 1-1 The product components in a network

Computers
running the
Symantec
Endpoint
Protection client
or the Symantec
Internet
Network Access
Control client,
connecting
through a VPN
tunnel
Firewall

Local Ethernet
Network

Symantec Endpoint Computers running the


Protection Manager, with Symantec Endpoint
the Symantec Endpoint Protection client or the
Protection client or the Symantec Network
Symantec Network Access Access Control client
Control client installed

See “About Symantec Endpoint Protection” on page 3.

What's new in Symantec Endpoint Protection 11


The current release includes the following improvements that make Symantec
Endpoint Protection and Symantec Network Access Control easier and more
efficient to use.
For more information, see the Administration Guide for Symantec Endpoint
Protection and Symantec Network Access Control.
Getting Started 7
What's new in Symantec Endpoint Protection 11

Table 1-2 New features in this version

Feature Benefit

A Web-based console provides a Symantec Protection Center is a Web-based console


single sign-on capability for that enables you to access and manage multiple,
registered Symantec products supported Symantec products. The console also
provides visibility and analytics across products as
well as provides useful security feedback and attack
statistics.

The console provides a single sign-on screen for the


following registered Symantec products:

■ Symantec Endpoint Protection


■ Symantec Critical System Protection
■ Symantec Web Gateway
■ Symantec Brightmail Gateway
■ Symantec IT Analytics
■ Symantec Data Loss Prevention

A Web-based console for Symantec You can now manage Symantec Endpoint Protection
Endpoint Protection Manager Manager remotely in a Web-based console. The
provides easier remote management Java-based remote console is also still available.
access

Symantec Endpoint Protection You can use Symantec Endpoint Protection Manager
includes client software to run on a to manage Mac clients that run Symantec software
Mac computer to provide virus and spyware protection on Mac OS
X computers.

Scheduled scans can start at random You can specify a time interval during which
times scheduled scans start, and enable the scans to start
at different times within that time interval. By
running scans at random times, you can increase
scan performance, especially in virtualized
environments.
8 Getting Started
System requirements

Table 1-2 New features in this version (continued)

Feature Benefit

Enhanced default Antivirus and For new product installations, changes in the default
Antispyware security policies security policies make Symantec Endpoint
Protection more efficient at detecting malware.

Customers who upgrade to Symantec Endpoint


Protection version 11 RU6 do not receive new
default policies. To see the new recommended
Antivirus and Antispyware security policies settings
so that you can make the settings changes in your
policies manually, see Security Response
recommendations for Symantec Endpoint
Protection settings.

The Symantec Endpoint Recovery The Symantec Endpoint Recovery Tool provides
Tool scans and removes malware an image that you can burn on a disc, and then use
from severely infected computers to scan and remove malware from client computers.
You use this tool for the computers that are too
infected for Symantec Endpoint Protection to clean
effectively.

You can download the tool from the following URL:


https://fileconnect.symantec.com/

System requirements
Symantec software requires specific protocols, operating systems and service
packs, software, and hardware. All the computers to which you install Symantec
software should meet or exceed the recommended system requirements for the
operating system that is used.
This guide contains summary information about system requirements. This
information may be sufficient to install to a small network or test network. You
should refer to the full system requirements before you install the product on a
more complex network.
See the Installation Guide for Symantec Endpoint Protection and Symantec Network
Access Control for full system requirements.
See “Installing and configuring the Symantec Endpoint Protection Manager with
an embedded database” on page 14.
Table 1-3 summarizes the minimum requirements for the computer on which you
install the Symantec Endpoint Protection Manager.
Getting Started 9
System requirements

Table 1-3 Symantec Endpoint Protection Manager system requirements

Component Requirement

Operating system 32-bit systems:

■ Windows 2000 Server/Advanced Server/Datacenter Server with Service Pack 3 or


later
■ Windows XP Professional with Service Pack 1 or later (x86 or x64)
■ Windows Small Business Server 2000/Windows Small Business Server 2003
■ Windows Server 2003 Standard Edition/Enterprise Edition/Datacenter Edition/Storage
Edition/Web Edition
■ Windows Server 2008 Standard/Windows Server 2008 Enterprise/Windows Server
2008 Datacenter/Windows Web Server 2008 (all Service Packs supported)
64-bit systems:

■ Windows XP Professional with Service Pack 1 or later


■ Windows Server 2003 Standard Edition/Enterprise Edition/Datacenter Edition/Storage
Edition/Small Business Server
■ Windows Server 2008 Standard/Windows Server 2008 Enterprise/Windows Server
2008 Datacenter/Windows Web Server 2008 (R2 and all Service Packs supported)
■ Windows Essential Business Server 2008 Standard Edition/Windows Essential Business
Server 2008 Premium Edition (R2 and all Service Packs supported)
■ Windows Small Business Server 2008 Standard Edition/Windows Small Business
Server 2008 Premium Edition (R2 and all Service Packs supported)

Database The Symantec Endpoint Protection Manager includes an embedded database.

■ 32-bit systems: You can also use Microsoft SQL Server 2000 with Service Pack 4 or
later, Microsoft SQL Server 2005 with Service Pack 2, or Microsoft SQL Server 2008.
■ 64-bit systems: You can also use Microsoft SQL Server 2000 with Service Pack 3 or
later, Microsoft SQL Server 2005 with Service Pack 2, or Microsoft SQL Server 2008.

Microsoft SQL Server is optional.

Other software ■ 32-bit systems: Internet Information Services server 5.0 or later with Web services
enabled.
64-bit systems: Internet Information Services server 5.1 or later with Web services
enabled.
■ Internet Explorer 6.0 or later
■ Static IP address recommended
10 Getting Started
System requirements

Table 1-3 Symantec Endpoint Protection Manager system requirements


(continued)

Component Requirement

Hardware 32-bit systems:

■ 1 GB RAM (2-4 GB recommended)


■ 4 GB on the hard disk for the server, plus 4 GB for the database
■ VGA (640x480) or higher resolution video adapter and monitor
64-bit systems:

■ 1 GB RAM (2-4 GB recommended); 4 GB RAM minimum for all editions of Windows


Small Business Server 2008 and Windows Essential Business Server 2008
■ 4 GB on the hard disk for the server, plus 4 GB for the database; Small Business Server
2008: 60 GB for the server; Essential Business Server 2008: 45 GB for the server
■ VGA (640x480) or higher resolution video adapter and monitor

Table 1-4 summarizes the minimum requirements for the remote computer on
which you run the Symantec Endpoint Protection Manager console.
Getting Started 11
System requirements

Table 1-4 Symantec Endpoint Protection Manager remote console system


requirements

Component Requirement

Operating system 32-bit systems:

■ Windows 2000 Professional/Server/Advanced Server/Datacenter Server with Service Pack


3 or later
■ Windows XP Professional with Service Pack 1 or later
■ Windows Small Business Server 2000/Windows Small Business Server 2003
■ Windows Server 2003 Standard Edition/Enterprise Edition/Datacenter Edition/Storage
Edition/Web Edition/
■ Windows Vista (all x86 versions)
■ Windows 7 (all x86 versions)
■ Windows Server 2008 Standard/Windows Server 2008 Enterprise/Windows Server 2008
Datacenter/Windows Web Server 2008 (all Service Packs are supported)
64-bit systems:

■ Windows XP Professional with Service Pack 1 or later


■ Windows Server 2003 Standard Edition/Enterprise Edition/Datacenter Edition/Storage
Edition/Web Edition/Small Business Server
■ Windows Vista (all x64 versions)
■ Windows 7 (all x64 versions)
■ Windows Server 2008 Standard/Windows Server 2008 Enterprise/Windows Server 2008
Datacenter/Windows Web Server 2008. Windows Server 2008 (R2 and all Service Packs are
supported)
■ Windows Essential Business Server 2008 Standard Edition/Windows Essential Business
Server 2008 Premium Edition (R2 and all Service Packs are supported)
■ Windows Small Business Server 2008 Standard Edition/Windows Small Business Server
2008 Premium Edition (R2 and all Service Packs are supported)

Hardware ■ 32-bit systems: 512 MB RAM minimum, 1-2 GB recommended


64-bit systems: 512 MB RAM minimum, 1-2 GB recommended
■ 15 MB hard drive
■ VGA (640x480) or higher resolution video adapter and monitor

Table 1-5 summarizes the minimum requirements for the remote computers on
which you run the Symantec Endpoint Protection Manager Web Console.

Table 1-5 Symantec Endpoint Protection Manager Web Console system


requirements

Component Requirement

Browser Internet Explorer 7 or later, with Enhanced Security Configuration disabled


12 Getting Started
System requirements

Table 1-6 summarizes the minimum requirements for the computers on which
you install the client software for either Symantec Endpoint Protection or
Symantec Network Access Control on Windows.

Table 1-6 Windows client software system requirements

Component Requirement

Operating system 32-bit systems:

■ Windows 2000 Professional/Server/Advanced Server/Datacenter Server with Service Pack


3 or later
■ Windows XP Professional/XP Embedded with Service Pack 1 or later
■ Windows Small Business Server 2000/Windows Small Business Server 2003
■ Windows Server 2003 R2, Standard Edition/Enterprise Edition/Datacenter Edition/Storage
Edition/Web Edition
■ Windows Server 2003 with Service Pack 1, Standard Edition/Enterprise Edition/Datacenter
Edition/Storage Edition/Web Edition
■ Windows Server 2003 with SP2, Standard Edition/Enterprise Edition/Datacenter
Edition/Storage Edition/Web Edition
■ Windows Vista (all x86 versions and Service Packs)
■ Windows 7 (all x86 versions)
■ Windows Fundamentals for Legacy PCs
■ Windows Server 2008 Standard/Windows Server 2008 Enterprise/Windows Server 2008
Datacenter/Windows Web Server 2008 (all Service Packs supported). Core installations are
supported.
64-bit systems:

■ Windows XP Professional with Service Pack 1 or later


■ Windows Server 2003 Standard Edition/Enterprise Edition/Datacenter Edition/Storage
Edition/Small Business Server
■ Windows Vista (all x64 versions and Service Packs)
■ Windows 7 (all x64 versions)
■ Windows Server 2008 Standard/Windows Server 2008 Enterprise/Windows Server 2008
Datacenter/Windows Web Server 2008 (R2 and all Service Packs supported). Core installations
are supported.
■ Windows Essential Business Server 2008 Standard Edition/Windows Essential Business
Server 2008 Premium Edition (R2 and all Service Packs supported)
■ Windows Small Business Server 2008 Standard Edition/Windows Small Business Server
2008 Premium Edition (R2 and all Service Packs supported)
Getting Started 13
System requirements

Table 1-6 Windows client software system requirements (continued)

Component Requirement

Other software Internet Explorer 6.0 or later


Terminal Server clients connecting to a computer with antivirus protection have the following
additional requirements:

■ Microsoft Terminal Server RDP (Remote Desktop Protocol) client


■ Citrix Metaframe (ICA) client 1.8 or later if you use Citrix Metaframe server on Terminal
Server

Hardware 32-bit systems:

■ 256 MB RAM, (1 GB recommended) for Windows XP, Windows XP Embedded, and Windows
Fundamentals for Legacy PCs
1 GB RAM minimum (2-4 GB recommended) for Windows Vista, Windows 7, Windows Server
2003 (all editions), and Windows Server 2008 (all editions)
■ 600 MB hard disk
■ VGA (640x480) or higher resolution video adapter and monitor
64-bit systems:

■ 1 GB RAM minimum (2-4 GB recommended) for most systems


4 GB RAM minimum for all editions of Windows Small Business Server 2008 and Windows
Essential Business Server 2008
■ 700 MB hard disk
■ XGA (1,024x768) or higher-resolution video adapter and monitor

Table 1-7 summarizes the minimum requirements for the computers on which
you install the Mac client software.

Table 1-7 Mac client software system requirements

Component Requirement

Operating system Mac OS X 10.4-10.6

Hardware ■ 256 MB of RAM (512 MB recommended) for Mac OS X 10.4


■ 512 MB for Mac OS X 10.5
■ 1 GB for Mac OS X 10.6
■ 300 MB of available hard disk space for installation

For information about operating systems for Symantec AntiVirus for Linux, see
the Installation Guide for Symantec Endpoint Protection and Symantec Network
Access Control.
14 Getting Started
About migrating to Symantec Endpoint Protection or Symantec Network Access Control

For information about using the Symantec AntiVirus client on Linux, see the
Symantec AntiVirus for Linux Client Guide. The guide is located in the docs folder
of the product disc that contains the Symantec AntiVirus client software for Linux.

About migrating to Symantec Endpoint Protection or


Symantec Network Access Control
Migrating from a Symantec legacy product to Symantec Endpoint Protection is a
complex process. You must read and understand all the migration information
before you migrate legacy Symantec software. Also, you must test all migration
procedures in a test environment before you migrate.
You must perform a migration if you have installed on your network a
migration-supported version of the following products:
■ Symantec AntiVirus Corporate Edition
■ Symantec AntiVirus for Mac
■ Symantec Client Security
■ Symantec Sygate Enterprise Protection
■ Sygate Secure Enterprise
To migrate successfully from other Symantec products, read the following
migration information first:
■ Migration Web site
■ The Migrating and upgrading section of the Installation Guide for Symantec
Endpoint Protection and Symantec Network Access Control

Installing and configuring the Symantec Endpoint


Protection Manager with an embedded database
Installing with the embedded database is the easiest way to install Symantec
Endpoint Protection Manager. The embedded database supports up to 5,000 clients.
If you choose to configure the management server in Simple mode, the embedded
database is selected automatically.
The installation of Symantec Endpoint Protection Manager is divided into three
parts:
■ The first part installs the management server and console.
■ The second part configures the management server and creates the database.
Getting Started 15
Installing and configuring the Symantec Endpoint Protection Manager with an embedded database

■ The third part creates and deploys client software to the client computers.
You can deploy the client software during the management server installation
or later. You must deploy the client software on the computer that runs the
management server.
Each part consists of a wizard. When the wizard for each part completes, a prompt
that asks you whether or not you want to continue with the next wizard displays.
To install Symantec Endpoint Protection Manager
1 Insert the product disc into the drive, and start the installation. For
downloaded products, open the CD1 folder and double-click Setup.exe.
2 On the Welcome page, do one of the following actions:
■ To install Symantec Endpoint Protection, click Install Symantec Endpoint
Protection Manager.
■ To install Symantec Network Access Control, click Install Symantec
Network Access Control, and then click Install Symantec Endpoint
Protection Manager.

3 On the Welcome page of the Installation Wizard, click Next.


A check is performed to see if the computer meets the minimum system
requirements. If it does not, a message indicates which resource does not
meet the minimum requirements. You can click Yes to continue installing
Symantec Endpoint Protection Manager, but performance can be adversely
affected.
4 On the License Agreement page, check I accept the terms in the license
agreement, and then click Next.
5 On the Destination Folder page, accept or change the installation directory,
and then click Next.
6 On the Select Web site page, do one of the following:
■ To configure the Symantec Endpoint Protection Manager IIS Web as the
only Web server on this computer, check Create a custom Web site, and
then accept or change the TCP Port.

Note: This setting is recommended for most installations as it is less likely


to conflict with other programs.

■ To let the Symantec Endpoint Protection Manager IIS Web server run
with other Web sites on this computer, check Use the default Web site.

7 Click Next.
16 Getting Started
Installing and configuring the Symantec Endpoint Protection Manager with an embedded database

8 On the Ready to Install the Program page, click Install.


9 When the installation finishes, and the Install Wizard Completed page
appears, click Finish.
Wait for the Management Server Configuration Wizard page to appear,
which can take several seconds. If you are prompted to restart the computer,
restart the computer, log on, and the wizard appears automatically for you
to continue.
10 Follow the steps for the appropriate mode of configuration that you select:
Simple or Advanced.
To configure the Symantec Endpoint Protection Manager with an embedded
database in Simple mode
1 On the Management Server Configuration Wizard page, select Simple, and
then click Next.
2 Provide and confirm a password of 6 or more characters. Optionally, provide
an administrator email address.
The password is the admin account password that you use to log on to the
Symantec Endpoint Protection Manager console. The password is also used
as the encryption password necessary for disaster recovery and, if you are
installing Symantec Network Access Control, to add Enforcers. After
installation, the encryption password does not change, even if the password
for the admin account is changed.
Document this password for when you install Symantec Endpoint Protection
in your production environment.
3 Click Next.
4 On the Data Collection page, do one of the following:
■ To let Symantec Endpoint Protection send information about how you
use this product to Symantec, check the checkbox.
■ To decline to send information about how you use this product to
Symantec, uncheck the checkbox.

5 The configuration summary page displays the values that are used to install
Symantec Endpoint Protection Manager. You can print a copy of the settings
to maintain for your records, or click Next.
Wait while the installation creates the database, which can take several
minutes.
6 On the Management Server Configuration Wizard Completed page, do one
of the following:
Getting Started 17
Installing and configuring the Symantec Endpoint Protection Manager with an embedded database

■ To deploy client software with the Migration and Deployment Wizard,


click Yes, and then click Finish.
■ To log on to the Symantec Endpoint Protection Manager console first, and
then deploy client software, click No, and then click Finish.
To configure the Symantec Endpoint Protection Manager with an embedded
database in Advanced mode
1 On the Management Server Configuration Wizard page, select Advanced,
and then click Next.
2 Select the number of clients you want this server to manage, and then click
Next.
This selection appears only when you install the Symantec Endpoint
Protection Manager for the first time on this computer.
3 Check Install my first site, and then click Next.
4 On the server information page, accept or change the default values, and then
click Next.
5 On the site name page, in the Site name box, accept or change the default
name, and then click Next.
6 On the encryption password page, provide and confirm a password, and then
click Next.
Document this password and store it in a safe, secure location. You cannot
change or recover the password after you create the database. You must also
enter this password for disaster recovery purposes if you do not have a backed
up database to restore.
7 On the database type page, check Embedded database, and then click Next.
8 On the system administrator account page, provide and confirm a password
of 6 or more characters. Optionally, provide an administrator email address.
Click Next.
Use the user name and password that you set here to log on to the console
for the first time.
Wait while the installation creates the database, which can take several
minutes.
9 On the Management Server Configuration Wizard Completed page, do one
of the following:
■ To deploy client software with the Migration and Deployment Wizard,
click Yes, and then click Finish.
18 Getting Started
Configuring and deploying client software on Windows computers

■ To log on to the Symantec Endpoint Protection Manager console first, and


then deploy client software, click No, and then click Finish.

See “Configuring and deploying client software on Windows computers”


on page 18.

Configuring and deploying client software on


Windows computers
The Migration and Deployment Wizard lets you configure a client software
package. The Push Deployment Wizard then optionally appears to let you deploy
the client software package to Windows computers.

Note: This procedure has you select a directory in which to place installation files.
You may want to create this directory before you start this procedure. Also, you
need to authenticate with administrative credentials to the Windows Domain or
Workgroup that contain the computers.

Computers that run firewalls, Windows XP, Windows Vista, or Windows Server
2008 have special requirements. Firewalls must permit remote deployment over
TCP ports 139 and 445. Also, disable simple file sharing on the computers that
are in workgroups and that run Windows XP. On Windows Vista and Windows
Server 2008, you must enable network discovery.
For a comprehensive list of system requirements, including port and protocol
requirements, see the Installation Guide for Symantec Endpoint Protection and
Symantec Network Access Control.
You can also use the Find Unmanaged Computers utility that lets you locate the
client computers that do not run client software and then install the client software
on those computers.

Note: You can use the Migration and Deployment Wizard to create a client software
package for Mac computers. You cannot use the Push Deployment Wizard to
deploy the package.

For more information on installing and deploying client software, see the
Installation Guide for Symantec Endpoint Protection and Symantec Network Access
Control.
To configure and deploy client software on Windows computers
1 Start the Migration and Deployment Wizard by doing one of the following:
Getting Started 19
Configuring and deploying client software on Windows computers

■ On the Windows Start menu, click Start > Programs > Symantec Endpoint
Protection Manager > Migration and Deployment Wizard.
The path may be different depending on the version of Windows that you
use.
■ On the last panel of the Management Server Configuration Wizard, click
Yes, and then click Finish.
See “Installing and configuring the Symantec Endpoint Protection Manager
with an embedded database” on page 14.

2 In the Welcome to the Migration and Deployment Wizard panel, click Next.
3 In the What would you like to do panel, check Deploy the Windows client,
and then click Next.
4 In the next panel, check Specify the name of a new group that you wish to
deploy clients to, type a group name in the box, and then click Next.
After you have deployed client software and logged on to the console, you
can locate this group in the console.
5 In the next panel, uncheck any types of protection that you do not want to
install (Symantec Endpoint Protection only), and then click Next.
6 In the next panel, check the installation options that you want for packages,
files, and user interaction.
7 Click Browse, locate and select a directory in which to place the installation
file(s), and then click Open.
8 Click Next.
9 In the next panel, check Yes, and then click Finish.
It can take several minutes to create and export the installation package for
your group before the Push Deployment Wizard appears.
To deploy the client software with the Push Deployment Wizard
1 In the Push Deployment Wizard, under Available computers, expand the
trees and select the computers on which to install the client software, and
then click Add >.
2 In the Remote Client Authentication dialog box, type the user name and
password, and then click OK.
The user name and password must be able to authenticate to the Windows
Domain or Workgroup that contains the computers.
3 When you have selected all of the computers and they appear in the right
pane, click Finish.
20 Getting Started
Where to get more information

Where to get more information


Sources of information include the following:
■ Installation Guide for Symantec Endpoint Protection and Symantec Network
Access Control
■ Administration Guide for Symantec Endpoint Protection and Symantec Network
Access Control
■ Client Guide for Symantec Endpoint Protection and Symantec Network Access
Control
■ LiveUpdate Administrator Getting Started Guide
■ LiveUpdate Administrator User's Guide
■ Symantec Central Quarantine Implementation Guide
■ Symantec Endpoint Protection 11.0 Windows Small Business Server Best
Practices White Paper
■ Tool-specific documents, located in some subdirectories of the Tools folders
on the product disc 3
■ Readme files, located in the root folder of the installation product disc
■ Online Help that contains the information that is in the guides plus
context-specific content
The primary documentation is available in the Documentation folder on the
product discs. Updates to the documentation are available from the Symantec
Technical Support Web site.

Table 1-8 Symantec Web sites

Types of information Web address

Symantec Endpoint Protection http://www.symantec.com/business/products/downloads/


trialware

Public Knowledge Base http://www.symantec.com/business/support/overview.jsp?pid=54619

Releases and updates

Manuals and documentation updates

Contact options

Release notes and additional http://www.symantec.com/business/support/overview.jsp?pid=54619


post-release information
Getting Started 21
Where to get more information

Table 1-8 Symantec Web sites (continued)

Types of information Web address

Virus and other threat information and http://securityresponse.symantec.com


updates

Product news and updates http://enterprisesecurity.symantec.com

Symantec Endpoint Protection forums https://forums.symantec.com/syment/board?


board.id=endpoint_protection11
22 Getting Started
Where to get more information

You might also like