SlideShare a Scribd company logo
MODULE 17: CONFIGURING
REPLICATION AND FAILOVER AND
LOAD BALANCING
1
ABOUT SITES AND REPLICATION
A site consists of one database, one or more management servers,
and clients. By
default, you deploy Symantec Endpoint Protection with a single site.
Organizations
with more than one datacenter or physical location generally use
multiple sites.

2
ABOUT SITES AND REPLICATION
Before you set up multiple sites and replication, make sure that it is
necessary.
Symantec recommends that you set up replication only in specific
circumstances.
If you do add an additional site, decide which site design works for
your organization.

3
ABOUT SITES AND REPLICATION
When you install Symantec Endpoint Protection for the first time, by
default you have installed the first site, or the local site.
You install the management server for the second site by using the
Management Server Configuration wizard. In the wizard, click the
Install an additional site option and following the instructions in the
wizard.

4
ABOUT SITES AND REPLICATION
The second management server is classified as a remote site and
called a replication partner. When you add the second site as a
replication partner, you perform the following tasks:
■ By default, replication is scheduled to occur automatically. However,
you can change the replication schedule, based on the amount of disk
space that is available.
■ Choose whether to replicate logs, client installation packages, or
LiveUpdate content.

5
ABOUT SITES AND REPLICATION
The first time that the databases between the two sites replicate, let
the replication finish completely. The replication may take a long time
because the entire database gets replicated.
You may want to replicate the data immediately, rather than waiting
until the database are scheduled to replicate. You can also change the
replication schedule to occur earlier or later.

6
HOW REPLICATION WORKS
Replication is the process of sharing information between databases
to ensure that the content is consistent.
You can use replication to increase the number of database servers
that are available to clients and thereby reduce the load on each.
Replication is typically set up during the initial installation.

7
ABOUT SITES AND REPLICATION

8
HOW REPLICATION WORKS
A replication partner is another site with one database server. It also
has a connection to the site that you designate as a main site or a
local site.
A site may have as many replication partners as needed. All
replication partners share a common license key.
The changes that you made on any replication partner are duplicated
to all other replication partners whenever Symantec Endpoint
Protection Manager is scheduled to replicate data.

9
HOW REPLICATION WORKS
Replication partners are listed on the Admin page.
You can display information about replication partners by selecting
the partner in the tree.
All sites typically have the same type of database.

You can, however, set up replication between sites by using different
types of databases. In addition, you can also set up replication
between an embedded database and an MS SQL database.

10
HOW REPLICATION WORKS
If you use an embedded database, you can only connect one
Symantec Endpoint Protection Manager to it because of configuration
requirements.
If you use anMS SQL database, you can connect multiple management
servers or share one database.
Only the first management server needs to be set up as a replication
partner.

11
HOW REPLICATION WORKS
All sites that are set up as replication partners are considered to be
on the same site farm.
Initially, you install the first site, then install a second site as a
replication partner.
A third site can be installed and set up to connect to either of the first
two sites.
You can add as many sites as needed to the site farm.
You can delete replication partners to stop the replication.

Later you can add that replication partner back to make the
databases consistent. However, some changes may collide.
12
HOW REPLICATION WORKS
You can set up data replication during the initial installation or at a
later time.
When you set up replication during the initial installation, you can also
set up a schedule for the synchronization of the replication partners.

13
SYMANTEC ENDPOINT PROTECTION
REPLICATION SCENARIOS
If administrators make changes on at each replication site
simultaneously, some changes may get lost.
If you change the same setting on both sites and a conflict arises, the
last change is the one that takes effect when replication occurs.
For example, site 1 (New York) replicates with site 2 (Tokyo) and site
2 replicates with site 3 (London).
You want the clients that connect to the network in New York to also
connect with the Symantec Endpoint Protection Manager in New York.
However, you do not want them to connect to the management server
in either Tokyo or London.

14
SYMANTEC ENDPOINT PROTECTION
REPLICATION SCENARIOS
When you set up replication, client communication settings are also
replicated. Therefore, you need to make sure that the communication
settings are correct for all sites on the site farm in the following
manner:
■ Create generic communication settings so that a client's connection is
based on the type of connection. For example, you can use a generic
DNS name, such as symantec.com for all sites on a site farm.
Whenever clients connect, the DNS server resolves the name and
connects the client to the local Symantec Endpoint Protection Manager.
■ Create specific communication settings by assigning groups to sites
so that all clients in a group connect to a designated management
server.
15
SYMANTEC ENDPOINT PROTECTION
REPLICATION SCENARIOS
For example, you can create two groups for clients at site 1, two
different groups for site 2, and two other groups for site 3.
You can apply the communication settings at the group level so clients
connect to the designated management server.
You may want to set up guidelines for managing location settings for
groups.
Guidelines may help prevent conflicts from occurring on the same
locations.
You may also help prevent conflicts from occurring for any groups that
are located at different sites.

16
SYMANTEC ENDPOINT PROTECTION
REPLICATION SCENARIOS
After replication occurs, the database on site 1 and the database on
site 2 are the same.
Only computer identification information for the servers differs.
If administrators change settings on all sites on a site farm, conflicts
can occur.
For example, administrators on site 1 and site 2 can both add a group
with the same name.
If you want to resolve this conflict, both groups then exist after
replication. However, one of them is renamed with a tilde and the
numeral 1 (~1).

17
SYMANTEC ENDPOINT PROTECTION
REPLICATION SCENARIOS
If both sites added a group that is called Sales, after replication you
can see two groups at both sites.
One group is called Sales and the other is called Sales 1.
This duplication occurs whenever a policy with the same name is
added to the same place at two sites.
If duplicate network adapters are created at different sites with the
same name, a tilde and the numeral 1 (~1) is added. The two symbols
are added to one of the names.

18
SYMANTEC ENDPOINT PROTECTION
REPLICATION SCENARIOS
If different settings are changed at both sites, the changes are
merged after replication.
For example, if you change Client Security Settings on site 1 and
Password Protection on site 2, both sets of changes appear after
replication.
Whenever possible, changes are merged between the two sites.
If policies are added at both sites, new policies appear on both sites
after replication.
Conflicts can occur when one policy is changed at two different sites.
If a policy is changed at multiple sites, the last update of any change
is then maintained after replication.
19
SYMANTEC ENDPOINT PROTECTION
REPLICATION SCENARIOS
If you perform the following tasks with the replication that is scheduled
to occur every hour on the hour:
■ You edit the AvAsPolicy1 on site 1 at 2:00 P.M.
■ You edit the same policy on site 2 at 2:30 P.M.

Then only the changes that have been completed on site 2 appear
after replication is complete when replication occurs at 3:00 P.M.
If one of the replication partners is taken offline, the remote site may
still indicate the status as online.

20
CONFIGURING REPLICATION
Adding and disconnecting a replication partner
If you want to replicate data with another site, you may have already
set it up during the initial installation.
If you did not set up replication during the initial installation, you can
do so now by adding a replication partner.
Multiple sites are called a site farm whenever they are set up as
replication partners.
You can add any site on the site farm as a replication partner.

21
CONFIGURING REPLICATION
Disconnecting replication partners
Deleting a replication partner merely disconnects a replication
partner from Symantec Endpoint Protection Manager.
It does not delete the site.

You can add the site back later if you need to do so by adding a
replication partner.

22
CONFIGURING REPLICATION
Replicating data on demand
Replication normally occurs according to the schedule that you set up
when you added a replication partner during installation.
The site with the smaller ID number initiates the scheduled replication.

At times, you may want replication to occur immediately.

23
CONFIGURING REPLICATION
Changing replication frequencies
Replication normally occurs according to the schedule that you set up
when you added a replication partner during the initial installation.
The site with the smaller ID number initiates the scheduled replication.

When a replication partner has been established, you can change the
replication schedule.
When you change the schedule on a replication partner, the schedule
on both sides is the same after the next replication.

24
CONFIGURING REPLICATION
Replicating client packages and LiveUpdate content
You can replicate or duplicate client packages and LiveUpdate
content between the local site and this partner at a remote site.
You may want to copy the latest version of a client package or
LiveUpdate content from a local site to a remote site.
The administrator at the remote site can then deploy the client
package and LiveUpdate content.

25
CONFIGURING REPLICATION
If you decide to replicate client packages and LiveUpdate content,
you may duplicate a large volume of data.
Should you replicate many packages, the data may be as large as 5
GB.
Both Symantec Endpoint Protection and Symantec Network Access
Control 32- bit and 64-bit installation packages may require as much
as 500 MB of disk space.

26
CONFIGURING REPLICATION
Replicating logs
You can specify that you want to replicate or duplicate logs as well as
the database of a replication partner.
You can specify the replication of logs when adding replication
partners or by editing the replication partner properties.
If you plan to replicate logs, make sure that you have sufficient disk
space for the additional logs on all the replication partner computers.

27
FAILOVER AND LOAD BALANCING
The client computers must be able to connect to a management server
at all times to download the security policy and to receive log events.
Failover is used to maintain communication with a Symantec Endpoint
Protection Manager when the management server becomes
unavailable.
Load balancing is used to distribute client management between
multiple management servers.

28
FAILOVER AND LOAD BALANCING
You can set up failover and load balancing if you use a Microsoft SQL
Server database.
You can set up failover with the embedded database, but only if you
use replication.
When you use replication with an embedded database, Symantec
recommends that you do not configure load balancing, as data
inconsistency and loss may result.
To set up failover and load balancing, you add multiple management
servers or Enforcers to a management server list.

29
FAILOVER AND LOAD BALANCING
You can install two or more management servers that communicate
with one Microsoft SQL Server database and configure them for
failover or load balancing.
Since you can install only one Symantec Endpoint Protection Manager
to communicate with the embedded database, you can set up failover
only if you replicate with another site.
When you use replication with an embedded database, Symantec
recommends that you do not configure load balancing, as data
inconsistency and loss may result.

30
FAILOVER AND LOAD BALANCING
A management server list is a prioritized list of management servers
that is assigned to a group.
You should add at least two management servers to a site to
automatically distribute the load among them.
You can install more management servers than are required to handle
your clients to protect against the failure of an individual management
server. In a custom management server list, each server is assigned to
a priority level

31
FAILOVER AND LOAD BALANCING
A client that comes onto the network selects a priority one server to
connect to at random.
If the first server it tries is unavailable and there are other priority
one servers in the list, it randomly tries to connect to another.
If no priority one servers are available, then the client tries to connect
to one of the priority two servers in the list.
This method of distributing client connections randomly distributes the
client load among your management servers.

32
FAILOVER AND LOAD BALANCING

33
FAILOVER AND LOAD BALANCING
In a failover configuration, all clients send traffic to and receive traffic
from server 1.
If server 1 goes offline, all clients send traffic to and receive traffic
from server 2 until server 1 comes back online.
The database is illustrated as a remote installation, but it also can be
installed on a computer that runs the Symantec Endpoint Protection
Manager.

34
FAILOVER AND LOAD BALANCING
You may also want to consider failover for content updates, if you
intend to use local servers.
All the components that run LiveUpdate can also use a prioritized list
of update sources.
Your management servers can use a local LiveUpdate server and
failover to LiveUpdate servers in other physical locations.

35

More Related Content

What's hot

Module 3: NETCONF and YANG Concepts
Module 3: NETCONF and YANG ConceptsModule 3: NETCONF and YANG Concepts
Module 3: NETCONF and YANG Concepts
Tail-f Systems
 
Arquitetura de computadores cap 5 e 6
Arquitetura de computadores cap 5 e 6Arquitetura de computadores cap 5 e 6
Arquitetura de computadores cap 5 e 6
PamelaAssuno1
 
Red Hat Certified engineer course
  Red Hat Certified engineer course   Red Hat Certified engineer course
Red Hat Certified engineer course
Ali Abdo
 
SSH
SSHSSH
Desktop virtualization customer presentation
Desktop virtualization customer presentationDesktop virtualization customer presentation
Desktop virtualization customer presentation
Nuno Alves
 
Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)
Tuan Yang
 
Aula 08 meios de comunicação de dados
Aula 08 meios de comunicação de dadosAula 08 meios de comunicação de dados
Aula 08 meios de comunicação de dados
Jorge Ávila Miranda
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
Knoldus Inc.
 
Ansible - Hands on Training
Ansible - Hands on TrainingAnsible - Hands on Training
Ansible - Hands on Training
Mehmet Ali Aydın
 
Unifying Network Filtering Rules for the Linux Kernel with eBPF
Unifying Network Filtering Rules for the Linux Kernel with eBPFUnifying Network Filtering Rules for the Linux Kernel with eBPF
Unifying Network Filtering Rules for the Linux Kernel with eBPF
Netronome
 
Configuration Management in Ansible
Configuration Management in Ansible Configuration Management in Ansible
Configuration Management in Ansible
Bangladesh Network Operators Group
 
Network Automation with Ansible
Network Automation with AnsibleNetwork Automation with Ansible
Network Automation with Ansible
Anas
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domaintameemyousaf
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
Rohit Phulsunge
 
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdfCCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
ngombeemmanuel
 
Docker Networking Overview
Docker Networking OverviewDocker Networking Overview
Docker Networking Overview
Sreenivas Makam
 
Ubuntu Linux
Ubuntu LinuxUbuntu Linux
Ubuntu Linux
israeljrs
 

What's hot (20)

Module 3: NETCONF and YANG Concepts
Module 3: NETCONF and YANG ConceptsModule 3: NETCONF and YANG Concepts
Module 3: NETCONF and YANG Concepts
 
Arquitetura de computadores cap 5 e 6
Arquitetura de computadores cap 5 e 6Arquitetura de computadores cap 5 e 6
Arquitetura de computadores cap 5 e 6
 
Red Hat Certified engineer course
  Red Hat Certified engineer course   Red Hat Certified engineer course
Red Hat Certified engineer course
 
Linux
Linux Linux
Linux
 
SSH
SSHSSH
SSH
 
Desktop virtualization customer presentation
Desktop virtualization customer presentationDesktop virtualization customer presentation
Desktop virtualization customer presentation
 
Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)Windows Server 2016 First Look (Part 1)
Windows Server 2016 First Look (Part 1)
 
Aula 08 meios de comunicação de dados
Aula 08 meios de comunicação de dadosAula 08 meios de comunicação de dados
Aula 08 meios de comunicação de dados
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
 
Endereçamento IPV4
Endereçamento IPV4Endereçamento IPV4
Endereçamento IPV4
 
Ansible - Hands on Training
Ansible - Hands on TrainingAnsible - Hands on Training
Ansible - Hands on Training
 
Unifying Network Filtering Rules for the Linux Kernel with eBPF
Unifying Network Filtering Rules for the Linux Kernel with eBPFUnifying Network Filtering Rules for the Linux Kernel with eBPF
Unifying Network Filtering Rules for the Linux Kernel with eBPF
 
Configuration Management in Ansible
Configuration Management in Ansible Configuration Management in Ansible
Configuration Management in Ansible
 
Network Automation with Ansible
Network Automation with AnsibleNetwork Automation with Ansible
Network Automation with Ansible
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
 
Fortimanager admin-40-mr3
Fortimanager admin-40-mr3Fortimanager admin-40-mr3
Fortimanager admin-40-mr3
 
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdfCCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
CCNA1 v7.0_ ITN Practice PT Skills Assessment (PTSA)12 Answers.pdf
 
Docker Networking Overview
Docker Networking OverviewDocker Networking Overview
Docker Networking Overview
 
Ubuntu Linux
Ubuntu LinuxUbuntu Linux
Ubuntu Linux
 

Viewers also liked

Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 courseKenan Spahi
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
Eng. Emad Al-Atoum
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
Sarmad Ali
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
slotiopo
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
IT Tech
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
rafiq123
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsDsunte Wilson
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
Swapnil Kapate
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
Ali Usman
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists QuestionsDsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsDsunte Wilson
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
dkaya
 

Viewers also liked (18)

Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 course
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
Cisco Ccna Certification
Cisco Ccna CertificationCisco Ccna Certification
Cisco Ccna Certification
 

Similar to SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Balancing

Nt1330 Unit 1
Nt1330 Unit 1Nt1330 Unit 1
Nt1330 Unit 1
Jenny Calhoon
 
MongoDB Replication and Sharding
MongoDB Replication and ShardingMongoDB Replication and Sharding
MongoDB Replication and ShardingTharun Srinivasa
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
Olavo Dalcorso
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
Robert Crane
 
Suse service virtualization_image_set up_guide_140214
Suse service virtualization_image_set up_guide_140214Suse service virtualization_image_set up_guide_140214
Suse service virtualization_image_set up_guide_140214Darrel Rader
 
Tech sametime-deployment-enablement
Tech sametime-deployment-enablementTech sametime-deployment-enablement
Tech sametime-deployment-enablement
a8us
 
Practical solutions for connections administrators
Practical solutions for connections administratorsPractical solutions for connections administrators
Practical solutions for connections administrators
Sharon James
 
Sccm Interview Questions and Answers
Sccm Interview Questions and AnswersSccm Interview Questions and Answers
Sccm Interview Questions and Answers
KashifSCCMTrainer
 
Microsoft Sync Framework (part 2) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 2) ABTO Software Lecture GarntsarikMicrosoft Sync Framework (part 2) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 2) ABTO Software Lecture GarntsarikABTO Software
 
Ms app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguideMs app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguide
wardell henley
 
WP-Ultimo Guide
WP-Ultimo GuideWP-Ultimo Guide
WP-Ultimo Guide
Wendy Permana
 
Pairing VMware vCenter Site Recovery Manager with virtual SAN
Pairing VMware vCenter Site Recovery Manager with virtual SANPairing VMware vCenter Site Recovery Manager with virtual SAN
Pairing VMware vCenter Site Recovery Manager with virtual SAN
thephuck
 
Safe peak installation guide version 2.1
Safe peak installation guide version 2.1Safe peak installation guide version 2.1
Safe peak installation guide version 2.1Vladi Vexler
 
Netapp snapmirror unified_replication_v1.2-lab_guide
Netapp snapmirror unified_replication_v1.2-lab_guideNetapp snapmirror unified_replication_v1.2-lab_guide
Netapp snapmirror unified_replication_v1.2-lab_guide
Vikas Sharma
 
Database Mirror for the exceptional DBA – David Izahk
Database Mirror for the exceptional DBA – David IzahkDatabase Mirror for the exceptional DBA – David Izahk
Database Mirror for the exceptional DBA – David Izahksqlserver.co.il
 
SCCM Interview Questions & Answers
SCCM Interview Questions & AnswersSCCM Interview Questions & Answers
SCCM Interview Questions & Answers
MirasrajSrivastava
 
patchVantage Cloud Starter Pack
patchVantage Cloud Starter Pack patchVantage Cloud Starter Pack
patchVantage Cloud Starter Pack
David McNish
 
Percona Cluster with Master_Slave for Disaster Recovery
Percona Cluster with Master_Slave for Disaster RecoveryPercona Cluster with Master_Slave for Disaster Recovery
Percona Cluster with Master_Slave for Disaster RecoveryRam Gautam
 
VMware Site Recovery Manager 6
VMware Site Recovery Manager 6VMware Site Recovery Manager 6
VMware Site Recovery Manager 6
Vepsun Technologies
 

Similar to SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Balancing (20)

Nt1330 Unit 1
Nt1330 Unit 1Nt1330 Unit 1
Nt1330 Unit 1
 
MongoDB Replication and Sharding
MongoDB Replication and ShardingMongoDB Replication and Sharding
MongoDB Replication and Sharding
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Suse service virtualization_image_set up_guide_140214
Suse service virtualization_image_set up_guide_140214Suse service virtualization_image_set up_guide_140214
Suse service virtualization_image_set up_guide_140214
 
Ad installation
Ad installationAd installation
Ad installation
 
Tech sametime-deployment-enablement
Tech sametime-deployment-enablementTech sametime-deployment-enablement
Tech sametime-deployment-enablement
 
Practical solutions for connections administrators
Practical solutions for connections administratorsPractical solutions for connections administrators
Practical solutions for connections administrators
 
Sccm Interview Questions and Answers
Sccm Interview Questions and AnswersSccm Interview Questions and Answers
Sccm Interview Questions and Answers
 
Microsoft Sync Framework (part 2) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 2) ABTO Software Lecture GarntsarikMicrosoft Sync Framework (part 2) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 2) ABTO Software Lecture Garntsarik
 
Ms app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguideMs app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguide
 
WP-Ultimo Guide
WP-Ultimo GuideWP-Ultimo Guide
WP-Ultimo Guide
 
Pairing VMware vCenter Site Recovery Manager with virtual SAN
Pairing VMware vCenter Site Recovery Manager with virtual SANPairing VMware vCenter Site Recovery Manager with virtual SAN
Pairing VMware vCenter Site Recovery Manager with virtual SAN
 
Safe peak installation guide version 2.1
Safe peak installation guide version 2.1Safe peak installation guide version 2.1
Safe peak installation guide version 2.1
 
Netapp snapmirror unified_replication_v1.2-lab_guide
Netapp snapmirror unified_replication_v1.2-lab_guideNetapp snapmirror unified_replication_v1.2-lab_guide
Netapp snapmirror unified_replication_v1.2-lab_guide
 
Database Mirror for the exceptional DBA – David Izahk
Database Mirror for the exceptional DBA – David IzahkDatabase Mirror for the exceptional DBA – David Izahk
Database Mirror for the exceptional DBA – David Izahk
 
SCCM Interview Questions & Answers
SCCM Interview Questions & AnswersSCCM Interview Questions & Answers
SCCM Interview Questions & Answers
 
patchVantage Cloud Starter Pack
patchVantage Cloud Starter Pack patchVantage Cloud Starter Pack
patchVantage Cloud Starter Pack
 
Percona Cluster with Master_Slave for Disaster Recovery
Percona Cluster with Master_Slave for Disaster RecoveryPercona Cluster with Master_Slave for Disaster Recovery
Percona Cluster with Master_Slave for Disaster Recovery
 
VMware Site Recovery Manager 6
VMware Site Recovery Manager 6VMware Site Recovery Manager 6
VMware Site Recovery Manager 6
 

More from Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services QuestionsDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsDsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsDsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices QuestionsDsunte Wilson
 

More from Dsunte Wilson (20)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Balancing

  • 1. MODULE 17: CONFIGURING REPLICATION AND FAILOVER AND LOAD BALANCING 1
  • 2. ABOUT SITES AND REPLICATION A site consists of one database, one or more management servers, and clients. By default, you deploy Symantec Endpoint Protection with a single site. Organizations with more than one datacenter or physical location generally use multiple sites. 2
  • 3. ABOUT SITES AND REPLICATION Before you set up multiple sites and replication, make sure that it is necessary. Symantec recommends that you set up replication only in specific circumstances. If you do add an additional site, decide which site design works for your organization. 3
  • 4. ABOUT SITES AND REPLICATION When you install Symantec Endpoint Protection for the first time, by default you have installed the first site, or the local site. You install the management server for the second site by using the Management Server Configuration wizard. In the wizard, click the Install an additional site option and following the instructions in the wizard. 4
  • 5. ABOUT SITES AND REPLICATION The second management server is classified as a remote site and called a replication partner. When you add the second site as a replication partner, you perform the following tasks: ■ By default, replication is scheduled to occur automatically. However, you can change the replication schedule, based on the amount of disk space that is available. ■ Choose whether to replicate logs, client installation packages, or LiveUpdate content. 5
  • 6. ABOUT SITES AND REPLICATION The first time that the databases between the two sites replicate, let the replication finish completely. The replication may take a long time because the entire database gets replicated. You may want to replicate the data immediately, rather than waiting until the database are scheduled to replicate. You can also change the replication schedule to occur earlier or later. 6
  • 7. HOW REPLICATION WORKS Replication is the process of sharing information between databases to ensure that the content is consistent. You can use replication to increase the number of database servers that are available to clients and thereby reduce the load on each. Replication is typically set up during the initial installation. 7
  • 8. ABOUT SITES AND REPLICATION 8
  • 9. HOW REPLICATION WORKS A replication partner is another site with one database server. It also has a connection to the site that you designate as a main site or a local site. A site may have as many replication partners as needed. All replication partners share a common license key. The changes that you made on any replication partner are duplicated to all other replication partners whenever Symantec Endpoint Protection Manager is scheduled to replicate data. 9
  • 10. HOW REPLICATION WORKS Replication partners are listed on the Admin page. You can display information about replication partners by selecting the partner in the tree. All sites typically have the same type of database. You can, however, set up replication between sites by using different types of databases. In addition, you can also set up replication between an embedded database and an MS SQL database. 10
  • 11. HOW REPLICATION WORKS If you use an embedded database, you can only connect one Symantec Endpoint Protection Manager to it because of configuration requirements. If you use anMS SQL database, you can connect multiple management servers or share one database. Only the first management server needs to be set up as a replication partner. 11
  • 12. HOW REPLICATION WORKS All sites that are set up as replication partners are considered to be on the same site farm. Initially, you install the first site, then install a second site as a replication partner. A third site can be installed and set up to connect to either of the first two sites. You can add as many sites as needed to the site farm. You can delete replication partners to stop the replication. Later you can add that replication partner back to make the databases consistent. However, some changes may collide. 12
  • 13. HOW REPLICATION WORKS You can set up data replication during the initial installation or at a later time. When you set up replication during the initial installation, you can also set up a schedule for the synchronization of the replication partners. 13
  • 14. SYMANTEC ENDPOINT PROTECTION REPLICATION SCENARIOS If administrators make changes on at each replication site simultaneously, some changes may get lost. If you change the same setting on both sites and a conflict arises, the last change is the one that takes effect when replication occurs. For example, site 1 (New York) replicates with site 2 (Tokyo) and site 2 replicates with site 3 (London). You want the clients that connect to the network in New York to also connect with the Symantec Endpoint Protection Manager in New York. However, you do not want them to connect to the management server in either Tokyo or London. 14
  • 15. SYMANTEC ENDPOINT PROTECTION REPLICATION SCENARIOS When you set up replication, client communication settings are also replicated. Therefore, you need to make sure that the communication settings are correct for all sites on the site farm in the following manner: ■ Create generic communication settings so that a client's connection is based on the type of connection. For example, you can use a generic DNS name, such as symantec.com for all sites on a site farm. Whenever clients connect, the DNS server resolves the name and connects the client to the local Symantec Endpoint Protection Manager. ■ Create specific communication settings by assigning groups to sites so that all clients in a group connect to a designated management server. 15
  • 16. SYMANTEC ENDPOINT PROTECTION REPLICATION SCENARIOS For example, you can create two groups for clients at site 1, two different groups for site 2, and two other groups for site 3. You can apply the communication settings at the group level so clients connect to the designated management server. You may want to set up guidelines for managing location settings for groups. Guidelines may help prevent conflicts from occurring on the same locations. You may also help prevent conflicts from occurring for any groups that are located at different sites. 16
  • 17. SYMANTEC ENDPOINT PROTECTION REPLICATION SCENARIOS After replication occurs, the database on site 1 and the database on site 2 are the same. Only computer identification information for the servers differs. If administrators change settings on all sites on a site farm, conflicts can occur. For example, administrators on site 1 and site 2 can both add a group with the same name. If you want to resolve this conflict, both groups then exist after replication. However, one of them is renamed with a tilde and the numeral 1 (~1). 17
  • 18. SYMANTEC ENDPOINT PROTECTION REPLICATION SCENARIOS If both sites added a group that is called Sales, after replication you can see two groups at both sites. One group is called Sales and the other is called Sales 1. This duplication occurs whenever a policy with the same name is added to the same place at two sites. If duplicate network adapters are created at different sites with the same name, a tilde and the numeral 1 (~1) is added. The two symbols are added to one of the names. 18
  • 19. SYMANTEC ENDPOINT PROTECTION REPLICATION SCENARIOS If different settings are changed at both sites, the changes are merged after replication. For example, if you change Client Security Settings on site 1 and Password Protection on site 2, both sets of changes appear after replication. Whenever possible, changes are merged between the two sites. If policies are added at both sites, new policies appear on both sites after replication. Conflicts can occur when one policy is changed at two different sites. If a policy is changed at multiple sites, the last update of any change is then maintained after replication. 19
  • 20. SYMANTEC ENDPOINT PROTECTION REPLICATION SCENARIOS If you perform the following tasks with the replication that is scheduled to occur every hour on the hour: ■ You edit the AvAsPolicy1 on site 1 at 2:00 P.M. ■ You edit the same policy on site 2 at 2:30 P.M. Then only the changes that have been completed on site 2 appear after replication is complete when replication occurs at 3:00 P.M. If one of the replication partners is taken offline, the remote site may still indicate the status as online. 20
  • 21. CONFIGURING REPLICATION Adding and disconnecting a replication partner If you want to replicate data with another site, you may have already set it up during the initial installation. If you did not set up replication during the initial installation, you can do so now by adding a replication partner. Multiple sites are called a site farm whenever they are set up as replication partners. You can add any site on the site farm as a replication partner. 21
  • 22. CONFIGURING REPLICATION Disconnecting replication partners Deleting a replication partner merely disconnects a replication partner from Symantec Endpoint Protection Manager. It does not delete the site. You can add the site back later if you need to do so by adding a replication partner. 22
  • 23. CONFIGURING REPLICATION Replicating data on demand Replication normally occurs according to the schedule that you set up when you added a replication partner during installation. The site with the smaller ID number initiates the scheduled replication. At times, you may want replication to occur immediately. 23
  • 24. CONFIGURING REPLICATION Changing replication frequencies Replication normally occurs according to the schedule that you set up when you added a replication partner during the initial installation. The site with the smaller ID number initiates the scheduled replication. When a replication partner has been established, you can change the replication schedule. When you change the schedule on a replication partner, the schedule on both sides is the same after the next replication. 24
  • 25. CONFIGURING REPLICATION Replicating client packages and LiveUpdate content You can replicate or duplicate client packages and LiveUpdate content between the local site and this partner at a remote site. You may want to copy the latest version of a client package or LiveUpdate content from a local site to a remote site. The administrator at the remote site can then deploy the client package and LiveUpdate content. 25
  • 26. CONFIGURING REPLICATION If you decide to replicate client packages and LiveUpdate content, you may duplicate a large volume of data. Should you replicate many packages, the data may be as large as 5 GB. Both Symantec Endpoint Protection and Symantec Network Access Control 32- bit and 64-bit installation packages may require as much as 500 MB of disk space. 26
  • 27. CONFIGURING REPLICATION Replicating logs You can specify that you want to replicate or duplicate logs as well as the database of a replication partner. You can specify the replication of logs when adding replication partners or by editing the replication partner properties. If you plan to replicate logs, make sure that you have sufficient disk space for the additional logs on all the replication partner computers. 27
  • 28. FAILOVER AND LOAD BALANCING The client computers must be able to connect to a management server at all times to download the security policy and to receive log events. Failover is used to maintain communication with a Symantec Endpoint Protection Manager when the management server becomes unavailable. Load balancing is used to distribute client management between multiple management servers. 28
  • 29. FAILOVER AND LOAD BALANCING You can set up failover and load balancing if you use a Microsoft SQL Server database. You can set up failover with the embedded database, but only if you use replication. When you use replication with an embedded database, Symantec recommends that you do not configure load balancing, as data inconsistency and loss may result. To set up failover and load balancing, you add multiple management servers or Enforcers to a management server list. 29
  • 30. FAILOVER AND LOAD BALANCING You can install two or more management servers that communicate with one Microsoft SQL Server database and configure them for failover or load balancing. Since you can install only one Symantec Endpoint Protection Manager to communicate with the embedded database, you can set up failover only if you replicate with another site. When you use replication with an embedded database, Symantec recommends that you do not configure load balancing, as data inconsistency and loss may result. 30
  • 31. FAILOVER AND LOAD BALANCING A management server list is a prioritized list of management servers that is assigned to a group. You should add at least two management servers to a site to automatically distribute the load among them. You can install more management servers than are required to handle your clients to protect against the failure of an individual management server. In a custom management server list, each server is assigned to a priority level 31
  • 32. FAILOVER AND LOAD BALANCING A client that comes onto the network selects a priority one server to connect to at random. If the first server it tries is unavailable and there are other priority one servers in the list, it randomly tries to connect to another. If no priority one servers are available, then the client tries to connect to one of the priority two servers in the list. This method of distributing client connections randomly distributes the client load among your management servers. 32
  • 33. FAILOVER AND LOAD BALANCING 33
  • 34. FAILOVER AND LOAD BALANCING In a failover configuration, all clients send traffic to and receive traffic from server 1. If server 1 goes offline, all clients send traffic to and receive traffic from server 2 until server 1 comes back online. The database is illustrated as a remote installation, but it also can be installed on a computer that runs the Symantec Endpoint Protection Manager. 34
  • 35. FAILOVER AND LOAD BALANCING You may also want to consider failover for content updates, if you intend to use local servers. All the components that run LiveUpdate can also use a prioritized list of update sources. Your management servers can use a local LiveUpdate server and failover to LiveUpdate servers in other physical locations. 35

Editor's Notes

  1. Symantec recommends that you add a maximum of five sites in the site farm.
  2. The use of internal LiveUpdate servers, Group Update Providers, and sitereplication does not provide load balancing functionality. You should not set upmultiple sites for load balancing.