Installation Guide for Symantec™ Endpoint Protection 11.0 RU5 and Symantec Network Access Control 11.0 RU5

Article:DOC2365  |  Created: 2010-08-10  |  Updated: 2010-10-19  |  Article URL http://www.symantec.com/docs/DOC2365
Article Type
Documentation


Description



This guide includes product information and procedures to install the product.


 

Table of Contents:
1. Introducing Symantec Endpoint Protection and Symantec Network Access Control
About Symantec Endpoint Protection
About Symantec Network Access Control
Components of Symantec Endpoint Protection and Symantec Network Access Control
Key features of Symantec Endpoint Protection and Symantec Network Access Control
Technical Support resources
2. System and installation requirements
System requirements
System requirements for the Symantec Endpoint Protection Manager, console, and embedded database
System requirements for the Symantec Endpoint Protection Manager and console
System requirements for the Symantec Endpoint Protection Remote Console
System requirements for the Symantec Endpoint Protection client software
System requirements for the Symantec Network Access Control client software
About the Symantec AntiVirus client for Linux
System requirements for the Quarantine Console
System requirements for the Central Quarantine Server
Internationalization requirements
About VMware support
About Microsoft Virtual Server support
About Symantec Endpoint Protection Manager compatibility with other products
3. Planning for the installation
About choosing a database type
About client firewalls and communication ports
About disabling and modifying Windows firewalls
About Windows and Symantec firewalls
About turning off Windows Firewall
About modifying Windows Vista, Windows Server 2008, and Windows 7 Firewall
About preparing computers for remote deployment
About preparing a Windows Server 2003 server for installation using a Remote Desktop connection
Preparing your client computers for installation
Required computer restarts when installing or migrating
4. Installing and configuring the Symantec Endpoint Protection Manager
Installing the product for the first time
About embedded database settings
Installing and configuring the Symantec Endpoint Protection Manager with an embedded database
About SQL Server configuration settings
About Microsoft SQL database authentication modes
Installing and configuring Symantec Endpoint Protection Manager with a SQL Server database
About installing multiple instances of Symantec Endpoint Protection Manager
Installing additional Symantec Endpoint Protection Manager consoles
About failover and load balancing
About installing and configuring Symantec Endpoint Protection Manager for failover or load balancing
Installing a Symantec Endpoint Protection Manager server for failover or load balancing
Configuring failover and load balancing for Symantec Endpoint Protection Manager
Upgrading from the embedded database to a SQL Server database
Backing up the keystore and server.xml files
Backing up the embedded database
Installing an instance of Microsoft SQL 2000, 2005, or 2008
Uninstalling the Symantec Endpoint Protection Manager with an embedded database
Reinstalling the Symantec Endpoint Protection Manager with a Microsoft SQL database
Restoring the original Java keystore file
Reconfiguring the Symantec Endpoint Protection Manager with a SQL Server database
About installing and configuring Symantec Endpoint Protection Manager for replication
Installing Symantec Endpoint Protection Manager for replication
Configuring the Symantec Endpoint Protection Manager for replication
About uninstalling Symantec Endpoint Protection Manager
5. Installing Symantec client software
About Symantec client installation software
About installing protection components on the client
About Symantec Network Access Control client software
About deploying 32-bit and 64-bit clients
Configuring and deploying client software
About installing unmanaged client software
Installing unmanaged client software by using the product disc
About deploying unmanaged client software using the console
About deploying unmanaged client software using the Push Deployment Wizard
Creating client installation packages
About deploying client software from a mapped drive
Deploying client software with the Push Deployment Wizard
Deploying client software with Find Unmanaged Computers
Importing a list of computers from a text file
About installing and deploying software with Altiris
Third-party installation options
About installing clients using third-party products
About customizing installations by using .msi options
About installing clients with Microsoft SMS 2003
About installing clients with Active Directory Group Policy Object
Uninstalling client software with Active Directory Group Policy Object
Starting the Symantec Endpoint Protection client
About uninstalling the Symantec Endpoint Protection client
Uninstalling client software on Windows Server 2008 Server Core
6. Installing Quarantine and LiveUpdate servers
About installing and configuring the Central Quarantine
Installing the Quarantine Console
Installing the Quarantine Server
Configuring groups to use the Central Quarantine
About using a Symantec LiveUpdate server
7. Upgrading to the latest Maintenance Release
Upgrading to a new release of Symantec Endpoint Protection or Symantec Network Access Control
Backing up the database
Migrating to Microsoft SQL 2008 from a previous version
Turning off replication before upgrading or migrating
Stopping the Symantec Endpoint Protection Manager service
Upgrading the Symantec Endpoint Protection Manager
Turning on replication after migration or upgrade
About upgrading client software
Upgrading clients by using AutoUpgrade
Updating client software with a LiveUpdate Settings Policy
About upgrading to Symantec Endpoint Protection or Symantec Network Access Control
About upgrading Symantec Endpoint Protection clients with Symantec Network Access Control
About upgrading Symantec Network Access Control clients with Symantec Endpoint Protection
8. Migrating Symantec AntiVirus and Symantec Client Security
Migrating from Symantec AntiVirus and Symantec Client Security
Supported and unsupported migration paths
Migrations that are supported
Migrations that are blocked
Migrations that are not supported
About migrating Central Quarantine
Preparing legacy installations for migration
Preparing all legacy installations
About preparing Symantec 10.x/3.x legacy installations
About migrating and not preserving server and client groups and settings
About migrating groups and settings
About the settings that are not migrated
About packages and deployment
About the client installation packages that are generated during migration
Exporting and formatting a list of client computer names to migrate
About opening communications ports for migration
About preparing client computers for migration
Migrating server and client group settings
About verifying the updates to your migrated policies
About migrating unmanaged clients
About migrating unmanaged clients with the product disc
Migrating unmanaged clients with exported packages
About new and updated features for legacy administrators
9. Migrating legacy Symantec Sygate software
About migrating to Symantec Endpoint Protection 11.x
About migrating Symantec Sygate server and management software
About migrating legacy Symantec Sygate client software
About migrating to Symantec Network Access Control 11.x
About migrating legacy Symantec Sygate server software
About migrating legacy Symantec Sygate client software
About Enforcer upgrades
Server migration scenarios
Migrating an installation instance that uses one management server
Migrating an installation instance that uses one Microsoft SQL database and multiple management servers
Migrating an installation instance that uses multiple embedded databases and management servers
Migrating an installation instance that uses multiple SQL database and management servers
About scenarios for migrating management servers
Migrating a management server
Stopping the servers before load balancing and failover migration
Turning off replication before migration
Enabling replication after migration
About console user interface and functionality changes post migration
Migrating remote management consoles
About configuring migrated and new policies
About removing the client password protections from group settings
Migrating legacy Symantec Sygate client software
A. Symantec Endpoint Protection installation features and properties
About installation features and properties
About configuring Setaid.ini
About configuring msi command strings
Symantec Endpoint Protection client features
Symantec Endpoint Protection client installation properties
Windows Installer parameters
Windows Security Center properties
About using the log file to check for errors
Identifying the point of failure of an installation
Command-line examples for installing the client
B. Disaster recovery
Preparing for disaster recovery
Performing disaster recovery
Restoring the Symantec Endpoint Protection Manager
Restoring the server certificate
Restoring client communications
Restoring client communications with a database backup
Restoring client communications without a database backup

Attachments

Installation_Guide_SEP11.0.5.pdf (2.1 MBytes)

Article URL http://www.symantec.com/docs/DOC2365


Terms of use for this information are found in Legal Notices