This document provides guidance on upgrading and migrating to Symantec Endpoint Protection 12.1 from previous versions. It outlines supported upgrade paths from versions 11.x and 12.0 to 12.1. It also discusses feature mapping when upgrading clients to maintain existing protections. Additionally, it provides recommendations on feature sets to install based on client computer roles.
This document provides guidance on recovering from various types of hardware failures in Veritas Volume Manager (VxVM). It describes how to list unstartable volumes, display volume and plex states, recover from failures of mirrored volumes, RAID-5 volumes, and more. The document also covers recovery procedures for failures involving the boot disk, disk group configuration backups, and error messages.
This document provides an implementation guide for Symantec Mail Security for Microsoft Exchange Server 2007/2010. It discusses installing and configuring the software, including setting up servers, licensing, identifying spam, filtering content, scanning for threats, managing quarantines, and generating reports. The guide is intended to help users effectively implement and manage Mail Security on their Exchange servers.
The document is the user guide for Norton Ghost 15.0. It provides information on technical support resources, licensing and registration, contacting support, and additional enterprise services available from Symantec. The document outlines how to get assistance and support for Norton Ghost 15.0 and other Symantec products.
Backup exec 2014 deduplication option white paperSymantec
This white paper is intended to assist technical personnel as they design and implement Backup Exec™ 2014 and the Deduplication Option and make related decisions.
The attached white paper includes the following topics:
● Business Value
● Exchange Protection Methods and Technology
● Backup Exec & Exchange High Availability Configurations
● Exchange Recovery Methods & Technology
● Managing Backup Exec Rights and Permissions in Exchange Environments
● Example Backup Exec Configurations for Protecting ● Exchange
● Exchange Protection Notes and Best Practices
● Additional Resources
Modern Data Management and Protection Challenges
Customers of all types and sizes are seeking new and innovative ways to overcome challenges associated with data growth and storage management. While these challenges are not necessarily new, they continue to become more complex and more difficult to overcome due to the following:
Pace of data growth has accelerated
Location of data has become more disperse
Linkages between data sets have become more complex
Data and storage management challenges are compounded by the need for companies to protect critical data assets against disaster through backup and recovery solutions. In order to maintain backups of critical data assets, additional secondary storage resources are required. This additional layer of backup storage must be implemented wherever backups occur, including central data centers and remote offices.
Backup Exec 15 Tuning and Performance GuideSymantec
This document provides guidance on tuning Symantec Backup Exec 15 for optimal performance. It includes steps for analyzing backup requirements, measuring current performance, and tuning various components like the Backup Exec server, data transfer path, Agents for Windows, and tape drives. The goal is to calculate sizing needs and identify configuration changes that can speed up backups and restores.
The document provides instructions for administrators on how to use Symantec Backup Exec 15, including installation, configuration, backup and recovery procedures. It covers topics such as installing Backup Exec agents, configuring backup jobs, monitoring job status, managing storage, and restoring data. Contact and licensing information is also included for Technical Support and maintenance contracts.
This Blueprint is designed to help with customers who are utilising OST technology with Backup Exec’s deduplication Option to improve back end storage capabilities within a complex backup environment.
Relentless Information Growth
The data deduplication technology within Backup Exec 2014 breaks down streams of backup data into “blocks.” Each data block is identified as either unique or non-unique, and a tracking database is used to ensure that only a single copy of a data block is saved to storage by that Backup Exec server. For subsequent backups, the tracking database identifies which blocks have been protected and only stores the blocks that are new or unique. For example, if five different client systems are sending backup data to a Backup Exec server and a data block is found in backup streams from all five of those client systems, only a single copy of the data block is actually stored by the Backup Exec server. This process of reducing redundant data blocks that are saved to backup storage leads to significant reduction in storage space needed for backups.
Data has increased the necessity in making greater investments in IT infrastructure, with the increase in the duplication of data and Data protection processes, such as backup, has compound data growth creating multiple copies of primary data made for operational and disaster recovery. This has also made the Backup Infrastructure far more complex. Now that disk-based systems inherently offer faster restores, disk systems can also make backup environments more complex and difficult to manage. This creates a problem for many backup solutions to manage advanced storage device capabilities such as data deduplication, replication, and ability to write directly to tape.
Power of OpenStorage Technology (OST)
Symantec Backup Exec software and the OpenStorage technology (OST) have been designed to provide centrally managed, edge-to-core data protection in order to span multiple sites and provide disk-to-disk-to-tape (D2D2T) functionality and automate Data Movement. The OpenStorage API introduced in Backup Exec 2010 provides automated movement of data between sites and storage tiers and acts as a single Point of Management and Catalog for Backup Data, regardless of where it resides (remote office or corporate data center) or of what type of media it is stored on (disk or tape), or its age (recent backup or long term archive), providing better Control of Advanced Storage Devices.
The OpenStorage initiative allows customers to better utilize advanced, disk-based storage solutions from qualified partners. It gives the ability to ensure tighter integration between the backup software and storage, greater efficiency and performance using an easy-to-deploy, purpose-built appliance that does not have the limitation of tape emulation devices: increasing Performance and Optimization, achieving faster backups to deduplication appliances via a third-party OST plug-in enabled by Backup Exec.
Backup Exec 15 is a backup and recovery software that provides:
- Agentless and agent-based backup methods for virtual and physical environments including VMware, Hyper-V, Windows, and applications like Exchange and SQL.
- Flexible storage options including disk, tape, cloud and appliances with features like global deduplication.
- Simplified disaster recovery capabilities like bare metal and dissimilar hardware recovery included with no additional license.
- Advanced monitoring, reporting and management features for backup jobs and infrastructure.
- Support for the latest virtualization platforms and applications through compatible agent updates.
This document provides guidance on recovering from various types of hardware failures in Veritas Volume Manager (VxVM). It describes how to list unstartable volumes, display volume and plex states, recover from failures of mirrored volumes, RAID-5 volumes, and more. The document also covers recovery procedures for failures involving the boot disk, disk group configuration backups, and error messages.
This document provides an implementation guide for Symantec Mail Security for Microsoft Exchange Server 2007/2010. It discusses installing and configuring the software, including setting up servers, licensing, identifying spam, filtering content, scanning for threats, managing quarantines, and generating reports. The guide is intended to help users effectively implement and manage Mail Security on their Exchange servers.
The document is the user guide for Norton Ghost 15.0. It provides information on technical support resources, licensing and registration, contacting support, and additional enterprise services available from Symantec. The document outlines how to get assistance and support for Norton Ghost 15.0 and other Symantec products.
Backup exec 2014 deduplication option white paperSymantec
This white paper is intended to assist technical personnel as they design and implement Backup Exec™ 2014 and the Deduplication Option and make related decisions.
The attached white paper includes the following topics:
● Business Value
● Exchange Protection Methods and Technology
● Backup Exec & Exchange High Availability Configurations
● Exchange Recovery Methods & Technology
● Managing Backup Exec Rights and Permissions in Exchange Environments
● Example Backup Exec Configurations for Protecting ● Exchange
● Exchange Protection Notes and Best Practices
● Additional Resources
Modern Data Management and Protection Challenges
Customers of all types and sizes are seeking new and innovative ways to overcome challenges associated with data growth and storage management. While these challenges are not necessarily new, they continue to become more complex and more difficult to overcome due to the following:
Pace of data growth has accelerated
Location of data has become more disperse
Linkages between data sets have become more complex
Data and storage management challenges are compounded by the need for companies to protect critical data assets against disaster through backup and recovery solutions. In order to maintain backups of critical data assets, additional secondary storage resources are required. This additional layer of backup storage must be implemented wherever backups occur, including central data centers and remote offices.
Backup Exec 15 Tuning and Performance GuideSymantec
This document provides guidance on tuning Symantec Backup Exec 15 for optimal performance. It includes steps for analyzing backup requirements, measuring current performance, and tuning various components like the Backup Exec server, data transfer path, Agents for Windows, and tape drives. The goal is to calculate sizing needs and identify configuration changes that can speed up backups and restores.
The document provides instructions for administrators on how to use Symantec Backup Exec 15, including installation, configuration, backup and recovery procedures. It covers topics such as installing Backup Exec agents, configuring backup jobs, monitoring job status, managing storage, and restoring data. Contact and licensing information is also included for Technical Support and maintenance contracts.
This Blueprint is designed to help with customers who are utilising OST technology with Backup Exec’s deduplication Option to improve back end storage capabilities within a complex backup environment.
Relentless Information Growth
The data deduplication technology within Backup Exec 2014 breaks down streams of backup data into “blocks.” Each data block is identified as either unique or non-unique, and a tracking database is used to ensure that only a single copy of a data block is saved to storage by that Backup Exec server. For subsequent backups, the tracking database identifies which blocks have been protected and only stores the blocks that are new or unique. For example, if five different client systems are sending backup data to a Backup Exec server and a data block is found in backup streams from all five of those client systems, only a single copy of the data block is actually stored by the Backup Exec server. This process of reducing redundant data blocks that are saved to backup storage leads to significant reduction in storage space needed for backups.
Data has increased the necessity in making greater investments in IT infrastructure, with the increase in the duplication of data and Data protection processes, such as backup, has compound data growth creating multiple copies of primary data made for operational and disaster recovery. This has also made the Backup Infrastructure far more complex. Now that disk-based systems inherently offer faster restores, disk systems can also make backup environments more complex and difficult to manage. This creates a problem for many backup solutions to manage advanced storage device capabilities such as data deduplication, replication, and ability to write directly to tape.
Power of OpenStorage Technology (OST)
Symantec Backup Exec software and the OpenStorage technology (OST) have been designed to provide centrally managed, edge-to-core data protection in order to span multiple sites and provide disk-to-disk-to-tape (D2D2T) functionality and automate Data Movement. The OpenStorage API introduced in Backup Exec 2010 provides automated movement of data between sites and storage tiers and acts as a single Point of Management and Catalog for Backup Data, regardless of where it resides (remote office or corporate data center) or of what type of media it is stored on (disk or tape), or its age (recent backup or long term archive), providing better Control of Advanced Storage Devices.
The OpenStorage initiative allows customers to better utilize advanced, disk-based storage solutions from qualified partners. It gives the ability to ensure tighter integration between the backup software and storage, greater efficiency and performance using an easy-to-deploy, purpose-built appliance that does not have the limitation of tape emulation devices: increasing Performance and Optimization, achieving faster backups to deduplication appliances via a third-party OST plug-in enabled by Backup Exec.
Backup Exec 15 is a backup and recovery software that provides:
- Agentless and agent-based backup methods for virtual and physical environments including VMware, Hyper-V, Windows, and applications like Exchange and SQL.
- Flexible storage options including disk, tape, cloud and appliances with features like global deduplication.
- Simplified disaster recovery capabilities like bare metal and dissimilar hardware recovery included with no additional license.
- Advanced monitoring, reporting and management features for backup jobs and infrastructure.
- Support for the latest virtualization platforms and applications through compatible agent updates.
Backup Exec 15: Designing Protection for the Future, TodaySymantec
Change in it infrastructures is fast and constant not only in the technology employed but in the expectations of the teams and the business value that they can add
Despite being a significant investment backup and recovery is often left out of strategic planning and included as an after-thought.
Backup and recovery are a set of products and processes that can provide value beyond just data protection when designed and used in the right way
Our aim here is explore the difficulties i.t. Teams and professionals are telling us about, understand how we can positively impact them by modernising antiquated systems and processes and add value beyond backup to help you drive your core business.
Windows 7 provides several new features to improve security, mobility, and manageability for IT professionals and end users. Key features include DirectAccess for seamless remote access, BranchCache to optimize bandwidth usage in branch offices, BitLocker and BitLocker To Go for data encryption, and AppLocker for application control. Windows 7 also includes enhancements to User Account Control, auditing, and network security to provide a more secure platform overall. These new capabilities are designed to help IT professionals securely manage mobile and distributed workforces while also improving the user experience.
Mct summit na what's new in forefront endpoint protection 2012 betaPeter De Tender
The document discusses new features in Forefront Endpoint Protection 2012. It provides an overview of the product, outlines the server installation process, and describes how clients can be managed and deployed. It also discusses the update mechanism and new reporting and alerting capabilities. The presentation aims to demonstrate how FEP 2012 offers enhanced protection and simplified desktop management through its integration with System Center Configuration Manager.
Seyed Salehi has over 21 years of experience in IT including network engineering, systems administration, and application deployment. He has specialized expertise in application packaging, testing, deployment, imaging computers and systems. Salehi currently works as a Senior Software Engineer supporting the Commodity Futures Trading Commission, where his responsibilities include managing their VDI platform, application deployments, and security patching. Previously he held similar roles supporting other government agencies.
K. Manoharan is a senior Wintel/VMware administrator with over 10 years of experience in technology support across cultures. He currently works at CITI Bank in Singapore through Encora Technologies as a team lead managing a project to migrate servers from Windows 2003 to newer versions. Prior to this, he held roles providing IT support, infrastructure management, and project work for companies including Accenture, CITI Bank, and others.
Why Backup Exec for Virtualization?
- Easy Migration and Instant Recovery
- Single Management Console for Virtual & Physical
- Virtualization with Modern Architecture
- Simplify Disaster Recovery
Partner adaptive backup and recovery 2018Juan Niekerk
Micro Focus offers a comprehensive data protection suite that includes Data Protector, Control Point, and Backup Navigator. The suite provides centralized protection across platforms and locations, advanced backup and recovery options, and predictive analytics. Backup Navigator provides advanced analytics, reporting, and monitoring to identify protection gaps, analyze backup inefficiencies, and aid in capacity planning. The suite helps customers meet SLAs, reduce costs and risks, and gain business resiliency through standardized and automated data protection.
How Microsoft Technologies And Windows Vista Improve SupportingMicrosoft TechNet
This document provides an overview and agenda for a training session on how Microsoft technologies and Windows Vista can improve support and maintenance of the desktop. The session will cover advances in Windows Vista, standard software deployment methods, client monitoring and management, and securing the Windows Vista desktop. Specific topics include deploying standard images, monitoring clients with System Center Operations Manager, managing group policy, and demonstrating applications like deploying NetMeeting with Configuration Manager and monitoring clients.
The document provides 7 scenarios describing how to properly license Windows for virtual desktop infrastructure (VDI) environments. It explains that for devices covered under Software Assurance, no additional licensing is required to access VDI desktops. However, devices not covered by Software Assurance, such as thin clients, require Windows Virtual Desktop Access (VDA) licenses, which are $100 per year per device. The document provides guidance on the number of VDA licenses needed for each scenario based on the number of non-Software Assurance accessing devices.
IBM Power Systems servers (AS/400, iSeries) enjoy a reputation as one of the most secure platforms in the data center, and this is reinforced each time IBM enhances the already impressive set of built-in security features.
Unfortunately, many organizations are surprised to learn that IBM i ships in a completely open default state. Addressing this starts with understanding and configuring the supplied operating system controls.
Jeff Uehling of IBM outlines new security functions incorporated into recent editions of IBM i, including:
• New password policy controls
• Encryption
• User profile enhancements
• Field procedures (FieldProc)
• Row and column access control (RCAC)
This document discusses supporting client-server applications and resources on a network. It covers topics like sharing and securing files and folders, mapping network drives, troubleshooting issues, and supporting cloud services. Specific applications and resources covered include Internet Explorer, Remote Desktop Connection, file servers, print servers, and administrative shares. The document provides instructions and best practices for configuring settings and implementing permissions to control access to shared network resources.
This document discusses maintaining Windows systems through scheduled preventative maintenance tasks. It describes verifying critical Windows settings, updating drivers and firmware, performing patch management, cleaning up hard drives, checking for errors, moving the virtual memory paging file, and preparing for disaster through backups of user data and system files. The document provides guidance on using commands and Disk Management to manage files, folders, and hard drives to maintain Windows.
The document provides information about Windows 10 deployment options for enterprises. It discusses the Long Term Servicing Branch (LTSB) which provides long term support for mission critical systems. It also discusses the Current Branch for Business (CBB) which allows business users to stay up to date while giving IT flexibility to deploy updates after they have been tested. The CBB gives businesses access to the latest features on an ongoing basis while allowing time for planning and testing updates.
Jaime Gutierrez is seeking a position and has over 15 years of experience providing IT support including desktop support, hardware and software troubleshooting, imaging and reimaging computers, and assisting users. He has worked for various contractors supporting large companies such as Lockheed Martin, FTS International, and IBM. Gutierrez has various technical certifications and security clearances. He is bilingual in English and Spanish.
This document summarizes chapter 18 of the A+ Guide to IT Technical Support, 9th Edition on security strategies. The chapter covers securing Windows personal computers, mobile devices, and small office/home office networks. It discusses authentication, authorization, passwords, encryption, firewalls, group policy, BitLocker encryption, UEFI/BIOS security features, BYOD policies, and additional security methods like smart cards, biometrics, and physical security devices. The overall goal is to protect systems and network resources while allowing authorized users access to perform their functions.
Viewfinity offers the following Privilege Management features:
• Elevate Privileges
• Policy Management
• Block Application/Whitelisting
• Activity Auditing
• Policy Auditing
• Support for FDCC, SOX, PCI Compliance and other desktop-level control procedures
Technical Professional with 5+ years of IT experience in Administration, Windows Servers, Proxy Server, MBAM and Enterprise Application of hardware/software products, VMware, Hyper-V, Veritas NetBackup, DHCP, DNS.
This document provides a summary of qualifications for Mary Jhun Macayana, including 8 years of systems and security administration experience along with experience in hardware support, software development, and security. It details technical skills in operating systems like AIX, Linux, Solaris, and HP-UX as well as capabilities in troubleshooting, upgrading, patching, and securing various platforms. Work experience is outlined for positions at Fuji Xerox, JPMorgan Chase, and Smart Communications providing systems administration, patch management, security administration, and support across various operating systems. Education is listed as a Bachelor of Science in Computer Engineering from Polytechnic University of the Philippines along with various technical trainings. Character references are also provided.
This document provides an implementation guide for Symantec Endpoint Protection and Symantec Network Access Control. It contains information about installing, configuring, and managing these products. The guide includes sections on planning installation, installing the management server and client software, upgrading and migrating from previous versions, setting up sites and replication, managing protection on clients, and using policies to manage security settings.
Symantec Enterprise Security Manager™ Modules for MySQL ...webhostingguy
Symantec ESM Modules for MySQL Databases extends Symantec ESM to secure MySQL databases. It includes 5 modules that check MySQL accounts, configuration, databases, passwords, and privileges. It also includes a template for MySQL configuration parameters. When run as part of a Symantec ESM policy, the modules identify vulnerabilities and policy violations within MySQL databases.
Backup Exec 15: Designing Protection for the Future, TodaySymantec
Change in it infrastructures is fast and constant not only in the technology employed but in the expectations of the teams and the business value that they can add
Despite being a significant investment backup and recovery is often left out of strategic planning and included as an after-thought.
Backup and recovery are a set of products and processes that can provide value beyond just data protection when designed and used in the right way
Our aim here is explore the difficulties i.t. Teams and professionals are telling us about, understand how we can positively impact them by modernising antiquated systems and processes and add value beyond backup to help you drive your core business.
Windows 7 provides several new features to improve security, mobility, and manageability for IT professionals and end users. Key features include DirectAccess for seamless remote access, BranchCache to optimize bandwidth usage in branch offices, BitLocker and BitLocker To Go for data encryption, and AppLocker for application control. Windows 7 also includes enhancements to User Account Control, auditing, and network security to provide a more secure platform overall. These new capabilities are designed to help IT professionals securely manage mobile and distributed workforces while also improving the user experience.
Mct summit na what's new in forefront endpoint protection 2012 betaPeter De Tender
The document discusses new features in Forefront Endpoint Protection 2012. It provides an overview of the product, outlines the server installation process, and describes how clients can be managed and deployed. It also discusses the update mechanism and new reporting and alerting capabilities. The presentation aims to demonstrate how FEP 2012 offers enhanced protection and simplified desktop management through its integration with System Center Configuration Manager.
Seyed Salehi has over 21 years of experience in IT including network engineering, systems administration, and application deployment. He has specialized expertise in application packaging, testing, deployment, imaging computers and systems. Salehi currently works as a Senior Software Engineer supporting the Commodity Futures Trading Commission, where his responsibilities include managing their VDI platform, application deployments, and security patching. Previously he held similar roles supporting other government agencies.
K. Manoharan is a senior Wintel/VMware administrator with over 10 years of experience in technology support across cultures. He currently works at CITI Bank in Singapore through Encora Technologies as a team lead managing a project to migrate servers from Windows 2003 to newer versions. Prior to this, he held roles providing IT support, infrastructure management, and project work for companies including Accenture, CITI Bank, and others.
Why Backup Exec for Virtualization?
- Easy Migration and Instant Recovery
- Single Management Console for Virtual & Physical
- Virtualization with Modern Architecture
- Simplify Disaster Recovery
Partner adaptive backup and recovery 2018Juan Niekerk
Micro Focus offers a comprehensive data protection suite that includes Data Protector, Control Point, and Backup Navigator. The suite provides centralized protection across platforms and locations, advanced backup and recovery options, and predictive analytics. Backup Navigator provides advanced analytics, reporting, and monitoring to identify protection gaps, analyze backup inefficiencies, and aid in capacity planning. The suite helps customers meet SLAs, reduce costs and risks, and gain business resiliency through standardized and automated data protection.
How Microsoft Technologies And Windows Vista Improve SupportingMicrosoft TechNet
This document provides an overview and agenda for a training session on how Microsoft technologies and Windows Vista can improve support and maintenance of the desktop. The session will cover advances in Windows Vista, standard software deployment methods, client monitoring and management, and securing the Windows Vista desktop. Specific topics include deploying standard images, monitoring clients with System Center Operations Manager, managing group policy, and demonstrating applications like deploying NetMeeting with Configuration Manager and monitoring clients.
The document provides 7 scenarios describing how to properly license Windows for virtual desktop infrastructure (VDI) environments. It explains that for devices covered under Software Assurance, no additional licensing is required to access VDI desktops. However, devices not covered by Software Assurance, such as thin clients, require Windows Virtual Desktop Access (VDA) licenses, which are $100 per year per device. The document provides guidance on the number of VDA licenses needed for each scenario based on the number of non-Software Assurance accessing devices.
IBM Power Systems servers (AS/400, iSeries) enjoy a reputation as one of the most secure platforms in the data center, and this is reinforced each time IBM enhances the already impressive set of built-in security features.
Unfortunately, many organizations are surprised to learn that IBM i ships in a completely open default state. Addressing this starts with understanding and configuring the supplied operating system controls.
Jeff Uehling of IBM outlines new security functions incorporated into recent editions of IBM i, including:
• New password policy controls
• Encryption
• User profile enhancements
• Field procedures (FieldProc)
• Row and column access control (RCAC)
This document discusses supporting client-server applications and resources on a network. It covers topics like sharing and securing files and folders, mapping network drives, troubleshooting issues, and supporting cloud services. Specific applications and resources covered include Internet Explorer, Remote Desktop Connection, file servers, print servers, and administrative shares. The document provides instructions and best practices for configuring settings and implementing permissions to control access to shared network resources.
This document discusses maintaining Windows systems through scheduled preventative maintenance tasks. It describes verifying critical Windows settings, updating drivers and firmware, performing patch management, cleaning up hard drives, checking for errors, moving the virtual memory paging file, and preparing for disaster through backups of user data and system files. The document provides guidance on using commands and Disk Management to manage files, folders, and hard drives to maintain Windows.
The document provides information about Windows 10 deployment options for enterprises. It discusses the Long Term Servicing Branch (LTSB) which provides long term support for mission critical systems. It also discusses the Current Branch for Business (CBB) which allows business users to stay up to date while giving IT flexibility to deploy updates after they have been tested. The CBB gives businesses access to the latest features on an ongoing basis while allowing time for planning and testing updates.
Jaime Gutierrez is seeking a position and has over 15 years of experience providing IT support including desktop support, hardware and software troubleshooting, imaging and reimaging computers, and assisting users. He has worked for various contractors supporting large companies such as Lockheed Martin, FTS International, and IBM. Gutierrez has various technical certifications and security clearances. He is bilingual in English and Spanish.
This document summarizes chapter 18 of the A+ Guide to IT Technical Support, 9th Edition on security strategies. The chapter covers securing Windows personal computers, mobile devices, and small office/home office networks. It discusses authentication, authorization, passwords, encryption, firewalls, group policy, BitLocker encryption, UEFI/BIOS security features, BYOD policies, and additional security methods like smart cards, biometrics, and physical security devices. The overall goal is to protect systems and network resources while allowing authorized users access to perform their functions.
Viewfinity offers the following Privilege Management features:
• Elevate Privileges
• Policy Management
• Block Application/Whitelisting
• Activity Auditing
• Policy Auditing
• Support for FDCC, SOX, PCI Compliance and other desktop-level control procedures
Technical Professional with 5+ years of IT experience in Administration, Windows Servers, Proxy Server, MBAM and Enterprise Application of hardware/software products, VMware, Hyper-V, Veritas NetBackup, DHCP, DNS.
This document provides a summary of qualifications for Mary Jhun Macayana, including 8 years of systems and security administration experience along with experience in hardware support, software development, and security. It details technical skills in operating systems like AIX, Linux, Solaris, and HP-UX as well as capabilities in troubleshooting, upgrading, patching, and securing various platforms. Work experience is outlined for positions at Fuji Xerox, JPMorgan Chase, and Smart Communications providing systems administration, patch management, security administration, and support across various operating systems. Education is listed as a Bachelor of Science in Computer Engineering from Polytechnic University of the Philippines along with various technical trainings. Character references are also provided.
This document provides an implementation guide for Symantec Endpoint Protection and Symantec Network Access Control. It contains information about installing, configuring, and managing these products. The guide includes sections on planning installation, installing the management server and client software, upgrading and migrating from previous versions, setting up sites and replication, managing protection on clients, and using policies to manage security settings.
Symantec Enterprise Security Manager™ Modules for MySQL ...webhostingguy
Symantec ESM Modules for MySQL Databases extends Symantec ESM to secure MySQL databases. It includes 5 modules that check MySQL accounts, configuration, databases, passwords, and privileges. It also includes a template for MySQL configuration parameters. When run as part of a Symantec ESM policy, the modules identify vulnerabilities and policy violations within MySQL databases.
This document provides an administrator's guide for using Veritas File System (VxFS) with HP-UX 11i v3. It describes features of VxFS including extent-based allocation, fast file system recovery, quotas, Storage Checkpoints, and file change logging. It also provides instructions for tasks like creating and mounting VxFS file systems, setting file system attributes, tuning performance, and using Veritas extensions for database optimization. The document contains several chapters and appendixes that describe VxFS commands, diagnostic messages, and a quick reference guide.
Symantec AntiVirus provides virus and security risk protection for computers. It can detect and remove viruses, worms, trojans, and other security risks. Symantec AntiVirus keeps protection current through automatic updates that are delivered via LiveUpdate. This helps ensure computers are protected from the latest viruses and security risks.
The document is a getting started guide for Trend Micro ServerProtect that provides centralized virus protection for servers. It introduces the main features of ServerProtect, including its architecture of a management console, information server, and normal servers. It also covers installation instructions, virus detection technologies, and managing the software through domains and tasks.
Symantec CryptoExec for WHMCS - Installation and Management GuideSSLRenewals
Symantec would like to introduce the new CryptoExec API exclusively for Symantec Website Security business partners. Check out easy to understand guidelines here:
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330Symantec
Symantec AutoSupport is a set of infrastructure, process, and systems that enhance the support experience through proactive monitoring of Symantec Appliance hardware and software, as well as providing automated error reporting and support case creation.
Through automation, internet access, and case management integration, Symantec can vastly improve the support process and give our support engineers the tools to solve problems faster. The AutoSupport infrastructure within Symantec analyzes the Call Home data from each appliance to provide proactive customer support and incident response for hardware failures thus reducing the need for an administrator to initiate support cases. It also enables Symantec to better understand how customers configure and use appliances, and where improvements would be most beneficial.
AutoSupport can also correlate the Call Home data with other site configuration data held by Symantec, for technical support and error analysis. With AutoSupport, Symantec greatly improves the customer support experience.
The number of US households experiencing problems with Internet Security, PC Hardware/Software and Home Networking are 41.3M, 21.7M and 10.8M respectively. The opportunity for enhancing your customers’ experience through services that personally protect their systems and data, also serves to protect and enhance their perception of your ISP network’s value and quality.
ISP partners find that the SecureIT Services not only increase their revenue, but decrease their expenses by reducing the number of virus and spyware related technical support calls.
Products Included in Overview:
* Internet Security
* Parental Controls
* Technical Support
* Virtual Advanced Computer Repair
* Remote Support and Communication Platform
* Online Backup
* Community Portal
Enik Rudisill has over 15 years of experience providing technical support and security services for Symantec Endpoint Protection. He has expertise troubleshooting software and hardware issues, removing virus threats, and communicating with customers at all levels. Currently he is a Principal Business Critical Engineer, providing the highest level of technical support and services to top enterprise customers. Previously he held roles with increasing responsibility at Symantec, including Technical Account Manager and Senior Technical Support Analyst.
Lenovo's ThinkVantage Technologies (TVT) help reduce the total cost of PC ownership through various tools that assist with deployment, connectivity, security, support, and disposal of PCs. TVT tools such as ImageUltra Builder, System Migration Assistant, Access Connections, Client Security Solution, and Rescue and Recovery help make deployment simpler, improve connectivity, enhance security, and aid support, potentially saving customers $50-180 per PC. Lenovo has also won legal cases allowing it to claim its PCs are the "most secure" and "most manageable" due to the capabilities of TVT and integrated security features.
1) The document discusses IBM Software Subscription and Support, which provides upgrades, technical support, and expertise for IBM software installed on-premises or in hybrid cloud environments.
2) Subscription and Support benefits include access to new software versions and releases, fixes, security patches, and online/phone support from IBM experts.
3) Maintaining active Subscription and Support delivers value through innovation, increased efficiency, security updates, and help from IBM experts to ensure software continues providing value over time.
This document discusses IBM Software Subscription and Support, which provides upgrades, technical support, and expertise for IBM software. It offers these services for on-premise software, software-as-a-service, and hybrid cloud models. Subscription and Support ensures software continues to deliver value over years with access to innovations from IBM Research and expertise from IBM technical support. It emphasizes how these benefits help users reduce costs, improve performance, and empower technical teams.
The document summarizes IBM's Rational Development and Test Environment as a Managed Service (RD&T aaMS) offering. Some key points:
- IBM will oversee configuration and implementation of IBM software products in their data centers, monitor them for 24/7 availability, and provide infrastructure support.
- Customers can access the software through the internet or their internal networks. IBM assigns a Client Success Manager to ensure successful deployment.
- The service reduces upfront IT costs, alleviates day-to-day maintenance responsibilities, and provides ongoing expertise from IBM to help customers maximize value.
HMI/SCADA 리스크 감소
돌발적인 가동중지를 최소화하고 조직을 보호할 수 있는 핵심 단계
Decrease your HMI/SCADA risk
Key steps to minimize unplanned downtime and protect your organization
IBM Software Subscription and Support provides upgrades, technical support, and expertise for on-premise IBM software. It ensures software continues to deliver value over years by providing access to innovations like new releases and versions, security fixes, and IBM expert support. Customers can choose to consume capabilities on-premise, as a service, or via hybrid cloud based on their needs. Renewing Subscription and Support every year delivers benefits like increased innovation, security, and reduced costs and risks versus letting coverage lapse.
Symantec Endpoint Protection (SEP) provides three layers of protection: network threat protection, proactive threat protection, and antivirus/antispyware protection. It combines essential threat protection technologies into a single client. The management console allows administrators to manage SEP and Symantec Network Access Control from a single interface, monitor security threats, and control user access. Installing SEP involves installing the manager software first, then the client software, accepting license agreements, selecting client types, and allowing the installation to complete and check for updates.
TSI Managed Network Services and IT SupportJeffery Walker
TSI Solutions provides IT managed services including remote monitoring, support, and reporting 24/7 to help businesses improve operational productivity and reduce IT costs. Their services include proactive monitoring of systems and networks, automated alerting and ticket generation, patching, and data backup solutions. TSI is an authorized partner of leading technology providers and offers consultative IT services and solutions.
Maninder Singh is a highly accomplished technical consultant with over 10 years of experience managing complex IT projects for financial and education clients. He has extensive experience implementing data center, network, and IT management systems. His areas of expertise include Windows servers, Active Directory, networking, Microsoft Office, and hardware like Dell servers. Currently he is the IT Operations Manager for Bestseller Retail India, overseeing technical support for 59 stores across North and East India. Previously he held system engineer roles providing desktop and network support for clients like IBM, Bajaj Allianz Life Insurance, and Fullerton India.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
4. Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s support offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers software upgrades
■ Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■ Premium service offerings that include Account Management Services
For information about Symantec’s support offerings, you can visit our Web site
at the following URL:
www.symantec.com/business/support/
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Contacting Technical Support
Customers with a current support agreement may access Technical Support
information at the following URL:
www.symantec.com/business/support/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be
at the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
■ Product release level
5. ■ Hardware information
■ Available memory, disk space, and NIC information
■ Operating system
■ Version and patch level
■ Network topology
■ Router, gateway, and IP address information
■ Problem description:
■ Error messages and log files
■ Troubleshooting that was performed before contacting Symantec
■ Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/business/support/
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and support contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs, DVDs, or manuals
6. Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
Asia-Pacific and Japan customercare_apac@symantec.com
Europe, Middle-East, and Africa semea@symantec.com
North America and Latin America supportsolutions@symantec.com
7. Upgrading or migrating to
Symantec Endpoint
Protection
This document includes the following topics:
■ Where to go for information on upgrading and migrating
■ Supported server upgrade paths
■ Supported client upgrade paths
■ Migrations that are supported and unsupported for the Mac client
■ Deciding which features to install on the client
■ Feature mapping between 11.x and 12.1 clients
■ Client protection features by platform
■ Management features by platform
■ Virus and Spyware Protection policy settings available for Windows and Mac
■ LiveUpdate policy settings available for Windows and Mac
■ Increasing Symantec Endpoint Protection Manager disk space before upgrading
to version 12.1
8. 8 Upgrading or migrating to Symantec Endpoint Protection
Where to go for information on upgrading and migrating
Where to go for information on upgrading and
migrating
Table 1-1 lists the key topics that pertain to upgrading and migrating to Symantec
Endpoint Protection.
To locate these topics, see the Symantec Endpoint Protection and Symantec Network
Access Control Implementation Guide.
Table 1-1 Product upgrade and migration resources
Task Topic
Supported and unsupported For new installations, you deploy client software to
upgrade paths your computers after you install the Symantec
Endpoint Protection Manager. For existing
installations, you upgrade existing clients to the new
version of Symantec Endpoint Protection after you
upgrade the Symantec Endpoint Protection Manager.
See “Supported client upgrade paths” on page 10.
See “Supported server upgrade paths” on page 9.
See “Migrations that are supported and unsupported
for the Mac client” on page 10.
Preparing computers to receive the "Preparing for client installation"
client software installation
packages
Creating security policies for the "The types of security policies"
clients
"Adding a policy"
Configuring feature sets for clients "About the client installation settings"
"Configuring client installation package features"
See “Deciding which features to install on the client”
on page 11.
"About client deployment methods"
Deploying clients to the client "About client deployment methods"
computers
Migrating clients to a newer "About migrating to Symantec Endpoint Protection"
version
9. Upgrading or migrating to Symantec Endpoint Protection 9
Supported server upgrade paths
Table 1-1 Product upgrade and migration resources (continued)
Task Topic
How protection technologies and See “Feature mapping between 11.x and 12.1 clients”
features from legacy clients map to on page 12.
new clients
Feature and policy descriptions "About the types of threat protection that Symantec
Endpoint Protection provides"
"The types of security policies"
Feature dependencies "How Symantec Endpoint Protection protection
features work together"
Feature availability by platform See “Client protection features by platform”
on page 15.
Upgrade licensing "About product upgrades and licenses"
Migration procedures and general "About migrating to Symantec Endpoint Protection"
information
For more information on migration, see the knowledge base article, Endpoint
Security Migration & Installation.
Supported server upgrade paths
The following Symantec Endpoint Protection Manager upgrade paths are
supported:
■ From 11.x to 12.1 (full version)
■ From 12.0 Small Business Edition to 12 .1 (full version)
■ From 12.1 Small Business Edition to 12.1 (full version)
Note: Symantec AntiVirus 9.x and 10.x server information can be imported during
the installation of Symantec Endpoint Protection Manager version 12.1.
The following downgrade paths are not supported:
■ 12.1 (full version) to 12.1 Small Business Edition
■ 11.x to 12.1 Small Business Edition
10. 10 Upgrading or migrating to Symantec Endpoint Protection
Supported client upgrade paths
Supported client upgrade paths
The following Symantec Endpoint Protection client versions can upgrade directly
to version 12.1:
■ 11.0.780.1109
■ 11.0.1000.1375 - MR1
■ 11.0.2000.1567 - MR2, with maintenance patches
■ 11.0.3001.2224 - MR3
■ 11.0.4000.2295 - MR4, with maintenance patches
■ 11.0.5002.333 - RU5
■ 11.0.6000.550 - RU6, with maintenance patches
■ 12.0.122.192 Small Business Edition
■ 12.0.1001.95 Small Business Edition RU1
Upgrading from Symantec Sygate Enterprise Protection 5.x, and Symantec
AntiVirus 9.x and 10.x to 12.1 (full version) is supported.
Migrations that are supported and unsupported for
the Mac client
Table 1-2 displays the products that can be migrated to the Symantec Endpoint
Protection for Mac client.
Table 1-2 Migration paths from Symantec AntiVirus for Mac to the Symantec
Endpoint Protection Mac client
Migrate from Migrate to Supported?
Managed Symantec AntiVirus Managed Symantec Yes
for Mac client Endpoint Protection for Mac
client
Unmanaged Symantec AntiVirus Unmanaged Symantec Yes
for Mac client Endpoint Protection for Mac
client
Unmanaged Symantec AntiVirus Managed Symantec Yes
for Mac client Endpoint Protection for Mac
client
11. Upgrading or migrating to Symantec Endpoint Protection 11
Deciding which features to install on the client
Table 1-2 Migration paths from Symantec AntiVirus for Mac to the Symantec
Endpoint Protection Mac client (continued)
Migrate from Migrate to Supported?
Managed Symantec AntiVirus Unmanaged Symantec Yes, but managed client
for Mac client Endpoint Protection for Mac settings are retained.
client
Norton AntiVirus for Mac Managed or unmanaged No. Client must uninstall
Symantec Endpoint Norton products before
Protection for Mac client installing Symantec
Endpoint Protection.
Deciding which features to install on the client
When you deploy the client using the Client Deployment Wizard, you must choose
the feature set. The feature set includes multiple protection components that are
installed on the client. You can select a default feature set or select individual
components. Decide which feature set to install based on the role of the computers,
and the level of security or performance that the computers need.
Table 1-3 lists the protection technologies you should install on client computers
based on their role.
Table 1-3 Recommended feature set by computer role
Client computer role Recommended feature set
Workstations, desktop, and Full Protection for Clients
laptop computers
Includes all protection technologies. Appropriate for
laptops, workstations, and desktops. Includes the full
download protection and mail protocol protection.
Note: Whenever possible, use Full Protection for
maximum security.
Servers Full Protection for Servers
Includes all protection technologies except mail protocol
protection. Appropriate for any servers that require
maximum network security.
High-throughput servers Basic Protection for Servers
Includes Virus and Spyware Protection and Download
Protection. Appropriate for any servers that require
maximum network performance.
12. 12 Upgrading or migrating to Symantec Endpoint Protection
Feature mapping between 11.x and 12.1 clients
Feature mapping between 11.x and 12.1 clients
When you upgrade clients using the autoupgrade feature, and check the Maintain
Existing Features option, the features that are configured in legacy clients are
mapped to the new version.
The tables in this section depict the feature mapping between previous versions
and the new version of Symantec Endpoint Protection for common update
scenarios.
If you migrate from a previous version, be aware that Antivirus and Antispyware
Protection in Symantec Endpoint Protection 11.x is called Virus and Spyware
Protection in version 12.1.
Table 1-4 compares the default protection technologies between 11.x and 12.1
clients.
Table 1-4 11.x to 12.1 default client protection
Default 11.x client protection Default 12.1 client protection
Antivirus + TruScan Antivirus + SONAR + Download Insight
Antivirus Antivirus + Basic Download Insight
Antivirus without Proactive Threat Antivirus without SONAR or Download
Protection Insight
Table 1-5 11.x to 12.1 full protection
Existing 11.x features installed 12.1 features installed after
Autoupgrade
Antivirus and Antispyware Protection Virus and Spyware Protection
■ Antivirus and Antispyware Protection ■ Basic Virus and Spyware Protection
■ Download Insight
Auto-Protect Email Protection Auto-Protect Email Protection
■ POP3/SMTP Scanner ■ POP3/SMTP Scanner
■ Microsoft Outlook Scanner ■ Microsoft Outlook Scanner
■ Lotus Notes Scanner ■ Lotus Notes Scanner
Proactive Threat Protection Proactive Threat Protection
■ TruScan proactive threat scan ■ SONAR
■ Application and Device Control ■ Application and Device Control
13. Upgrading or migrating to Symantec Endpoint Protection 13
Feature mapping between 11.x and 12.1 clients
Table 1-5 11.x to 12.1 full protection (continued)
Existing 11.x features installed 12.1 features installed after
Autoupgrade
Network Threat Protection Network Threat Protection
■ Network Threat Protection ■ Network Threat Protection
■ Intrusion Prevention ■ Intrusion Prevention
Table 1-6 11.x to 12.1 AV only
Existing 11.x features installed 12.1 features installed after
Autoupgrade
Antivirus and Antispyware Protection Virus and Spyware Protection
■ Antivirus and Antispyware Protection ■ Basic Virus and Spyware Protection
Auto-Protect Email Protection Auto-Protect Email Protection
■ POP3/SMTP Scanner ■ POP3/SMTP Scanner
■ Microsoft Outlook Scanner ■ Microsoft Outlook Scanner
■ Lotus Notes Scanner ■ Lotus Notes Scanner
Table 1-7 11.x to 12.1 AV + Proactive Threat Protection
Existing 11.x features installed 12.1 features installed after
Autoupgrade
Antivirus and Antispyware Protection Virus and Spyware Protection
■ Antivirus and Antispyware Protection ■ Basic Virus and Spyware Protection
■ Download Insight
Auto-Protect Email Protection Auto-Protect Email Protection
■ POP3/SMTP Scanner ■ POP3/SMTP Scanner
■ Microsoft Outlook Scanner ■ Microsoft Outlook Scanner
■ Lotus Notes Scanner ■ Lotus Notes Scanner
Proactive Threat Protection Proactive Threat Protection
■ TruScan proactive threat scan ■ SONAR
■ Application and Device Control ■ Application and Device Control
Network Threat Protection Network Threat Protection
■ Intrusion Prevention System ■ Intrusion Prevention System
14. 14 Upgrading or migrating to Symantec Endpoint Protection
Feature mapping between 11.x and 12.1 clients
Table 1-8 11.x to 12.1 (full version) firewall only
Existing 11.x features installed 12.1 features installed after
Autoupgrade
Auto-Protect Email Protection Auto-Protect Email Protection
■ POP3/SMTP Scanner ■ POP3/SMTP Scanner
■ Microsoft Outlook Scanner ■ Microsoft Outlook Scanner
■ Lotus Notes Scanner ■ Lotus Notes Scanner
Proactive Threat Protection Proactive Threat Protection
■ Application and Device Control ■ Application and Device Control
Network Threat Protection Network Threat Protection
■ Network Threat Protection ■ Network Threat Protection
Note: The 12.1 version only includes the
firewall
Table 1-9 12.0 Small Business Edition to 12.1 (full version)
Existing 12.0 Small Business Edition 12.1 features installed after
features installed Autoupgrade
Virus and Spyware Protection Virus and Spyware Protection
■ Virus and Spyware Protection ■ Basic Virus and Spyware Protection
■ Download Insight
Auto-Protect Email Protection Auto-Protect Email Protection
■ POP3/SMTP Scanner ■ POP3/SMTP Scanner
■ Microsoft Outlook Scanner ■ Microsoft Outlook Scanner
Proactive Threat Protection Proactive Threat Protection
■ TruScan proactive threat scan ■ SONAR
■ Application and Device Control
Network Threat Protection Network Threat Protection
■ Firewall and Intrusion Prevention ■ Network Threat Protection
■ Intrusion Prevention
15. Upgrading or migrating to Symantec Endpoint Protection 15
Client protection features by platform
Client protection features by platform
Table 1-10 explains the differences in the protection features that are available
on the different client computer platforms.
Table 1-10 Symantec Endpoint Protection client protection
Client feature Windows XP Windows XP Windows Windows Mac Linux
(SP2), (SP2), Server 2003, Server 2003,
Windows Windows Windows Windows
Vista, Vista, Server 2008, Server 2008,
Windows 7, Windows 7, 32-bit 64-bit
32-bit 64-bit
Scheduled scans Yes Yes Yes Yes Yes Yes
On-demand scans Yes Yes Yes Yes Yes Yes
Auto-Protect for the file Yes Yes Yes Yes Yes Yes
system
Internet Email Auto-Protect Yes No No No No No
Microsoft Outlook Yes Yes Yes Yes No No
Auto-Protect
Lotus Notes Auto-Protect Yes Yes Yes Yes No No
SONAR Yes Yes Yes Yes No No
Firewall Yes Yes Yes Yes No No
Intrusion Prevention Yes Yes Yes Yes No No
Application and Device Yes Yes Yes Yes No No
Control
Host Integrity Yes Yes Yes Yes No No
Tamper Protection Yes Yes, with Yes Yes, with No No
limitations limitations
See “Management features by platform” on page 16.
See “Virus and Spyware Protection policy settings available for Windows and
Mac” on page 17.
See “LiveUpdate policy settings available for Windows and Mac” on page 18.
16. 16 Upgrading or migrating to Symantec Endpoint Protection
Management features by platform
Management features by platform
Table 1-11 explains the management features that are available for the Windows
and Mac client platforms.
Table 1-11 Comparison between Symantec Endpoint Protection Manager
features for Windows and Mac
Feature Windows Mac
Deploy client remotely from Yes No
Symantec Endpoint Protection
Manager
Manage client from Symantec Yes Yes
Endpoint Protection Manager
Update virus definitions and Yes No
product from management server
Run commands from ■ Scan ■ Scan
management server ■ Update Content ■ Update Content
■ Update Content and Scan ■ Update Content and Scan
■ Restart Client Computers ■ Restart Client Computers
■ Enable Auto-Protect ■ Enable Auto-Protect
■ Restart Client Computers ■ Restart Client Computers
■ Enable Auto-Protect ■ Enable Auto-Protect
■ Enable Network Threat
Protection
■ Disable Network Threat
Protection
Provide updates by using Group Yes No
Update Providers
Run Intelligent Updater Yes Yes
Package updates for third-party Yes No*
tools in management server
Set randomized scans Yes No
Set randomized updates Yes Yes
*You can run Intelligent Updater to get Mac content updates. You can then push
the updates to Mac clients by using a third-party tool such as Apple Remote
Desktop.
17. Upgrading or migrating to Symantec Endpoint Protection 17
Virus and Spyware Protection policy settings available for Windows and Mac
See “Virus and Spyware Protection policy settings available for Windows and
Mac” on page 17.
See “LiveUpdate policy settings available for Windows and Mac” on page 18.
See “Client protection features by platform” on page 15.
Virus and Spyware Protection policy settings available
for Windows and Mac
Table 1-12 displays the differences in the policy settings that are available for
Windows clients and Mac clients.
Table 1-12 Virus and Spyware Protection policy settings (Windows and Mac
only)
Policy setting Windows Mac
Define actions for scans You can specify first and second actions You can specify either of the following
when different types of virus or risk are actions:
found. You can specify the following
■ Automatically repair infected files
actions:
■ Quarantine files that cannot be
■ Clean repaired
■ Quarantine
■ Delete
■ Leave alone
Specify remediation if a virus You can specify the following remediation Remediation is automatically associated
or a risk is found actions: with actions.
■ Back up files before repair
■ Terminate processes
■ Stop services
Set scan type Active, Full, Custom Custom only
Retry scheduled scans Yes No
Set scans to check additional Yes No
locations (scan
enhancement)
Configure storage migration Yes No
scans
Configure scan exceptions Yes Yes
18. 18 Upgrading or migrating to Symantec Endpoint Protection
LiveUpdate policy settings available for Windows and Mac
See “Management features by platform” on page 16.
See “LiveUpdate policy settings available for Windows and Mac” on page 18.
See “Client protection features by platform” on page 15.
LiveUpdate policy settings available for Windows and
Mac
Table 1-13 displays the LiveUpdate Settings policy options that the Windows
client and the Mac client support.
Table 1-13 LiveUpdate policy settings (Windows and Mac only)
Policy setting Windows Mac
Use the default management server Yes No
Use a LiveUpdate server (internal or Yes Yes
external)
Use a Group Update Provider Yes No
Enable third-party content Yes No
management
You can, however, run Intelligent
Updater to get Mac content updates.
You can then push the updates to
Mac clients by using a third-party
tool such as Apple Remote Desktop.
LiveUpdate Proxy Configuration Yes Yes, but it is not configured in the
LiveUpdate policy. It is configured
from the External Communications
settings.
LiveUpdate Scheduling Yes Yes, for Frequency and Download
Randomization options; no for all
other scheduling options
User Settings Yes No
Product Update Settings Yes Yes
HTTP Headers Yes No
See “Management features by platform” on page 16.
19. Upgrading or migrating to Symantec Endpoint Protection 19
Increasing Symantec Endpoint Protection Manager disk space before upgrading to version 12.1
See “Virus and Spyware Protection policy settings available for Windows and
Mac” on page 17.
See “Client protection features by platform” on page 15.
Increasing Symantec Endpoint Protection Manager
disk space before upgrading to version 12.1
The Symantec Endpoint Protection Manager version 12.1 requires a minimum of
5 GB of available disk space. Make sure that any legacy servers or new hardware
meet the minimum hardware requirements.
Note: Make a backup of the database before making configuration changes.
Table 1-14 lists ways you can make more disk space available for the upgrade.
Table 1-14 Tasks to increase disk space on the management server
Task Description
Change the LiveUpdate settings 1 Go to Admin > Servers and right-click on Local
to reduce space requirements. Site. Select Edit Properties.
2 On the LiveUpdate tab, uncheck Store client
packages unzipped to provide better network
performance for upgrades
3 On the LiveUpdate tab, reduce the number of
content revisions to keep. The optimum value is
30 revisions but a lower setting uses less disk
space. For the upgrade, you can lower the setting
to 10, and then after the upgrade, return the
setting to 30.
Make sure unused virus 1 Go to Admin > Servers and right-click on Local
definitions are deleted from the Site. Select Edit Properties
Symantec Endpoint Protection
2 On the Database tab, make sure that Delete
Manager database.
unused virus definitions is checked.
20. 20 Upgrading or migrating to Symantec Endpoint Protection
Increasing Symantec Endpoint Protection Manager disk space before upgrading to version 12.1
Table 1-14 Tasks to increase disk space on the management server (continued)
Task Description
Relocate or remove co-existing ■ If other programs are installed on the same computer
programs and files with the Symantec Endpoint Protection Manager,
consider relocating them to another server. Unused
programs can be removed.
■ If the Symantec Endpoint Protection Manager shares
the computer with other storage intensive
applications, consider dedicating a computer to
support only the Symantec Endpoint Protection
Manager.
■ Remove temporary Symantec Endpoint Protection
files.
For a list of temporary files that you can remove, see
the knowledge base article, Symantec Endpoint
Protection Manager directories contain many .TMP
folders consuming large amounts of disk space.
Note: Defragment the hard drive after removing
programs and files.
Use an external database If the Symantec Endpoint Protection database resides
on the same computer with the Symantec Endpoint
Protection Manager, consider installing a Microsoft SQL
database on another computer. Significant disk space
is saved and in most cases, performance is improved.
Note: Make sure that the client computers also have enough disk space before an
upgrade. Check the system requirements and as needed, remove unnecessary
programs and files, and then defragment the client computer hard drive.