Symantec™ bv-Control® for UNIX® 10.0 Getting Started Guide

Article:DOC2773  |  Created: 2010-08-23  |  Updated: 2010-08-23  |  Article URL http://www.symantec.com/docs/DOC2773
Article Type
Documentation


Description



Table of Contents:
Introduction to Symantec bv-Control for UNIX
About RMS Console and Information Server
bv-Control for UNIX features
bv-Control for UNIX architecture
About the agent-based architecture
About the agentless architecture
SSH communication with an agentless target computer
bv-Control for UNIX data source
About bv-Config UNIX
Overview on product deployment requirements
System requirements
System requirements to install bv-Control for UNIX on the Windows computer
Hardware requirements to install UNIX agents of bv-Control for UNIX
Software requirements to install UNIX agents of bv-Control for UNIX
Upgrading bv-Control for UNIX and the UNIX agent
Security best practices
About installing bv-Control for UNIX on Windows computers
About bv-Control for UNIX configuration
Installation options for the UNIX agent
Package dependencies to install the UNIX agent
Installing the UNIX agent using install.sh on the target computers
Installing the UNIX agent manually on AIX target computers
Installing the UNIX agent manually on HP-UX target computers
Installing the UNIX agent manually on Sun Solaris target computers
Installing the UNIX agent manually on SUSE Linux target computers
Installing the UNIX agent manually on Red Hat Linux target computers
Installing the UNIX agent using bv-Config UNIX
About registering UNIX target computers with the Information Server
Registering UNIX target computers with the Information Server using resource credentials
Registering UNIX target computers without providing resource credentials
Running the setup.sh script
Starting UNIX agent on a specified IP Address
Notifying Information Servers about target IP address
Retrieving snap-ins that are installed on the Information Server
Configuring the Information Server to register specific IP address using setup.sh script
Configuring multiple IP addresses for multi-NIC target computers
Configuring UNIX target computers in the agent-based registration mode
Selecting protocols for UNIX target computers to communicate with the Information Server
Using native credentials or resource credentials for the target computers that are registered as agent-based
Using default query credentials for the target computers that are registered as agent-based
Unregistering a UNIX agent-based target computer from the Information Server
About configuring UNIX target computers as agentless
Registering and configuring the target computers using Configuration Wizard
Adding native credentials for the target computers that are registered as agentless
Adding credentials for Public Key Authentication support
Adding superuser credentials for the target computers that are registered as agentless
Adding default query credentials for the target computers that are registered as agentless
Configuring target computers with default query credentials
Switching registration modes of target computers
About configuration of SSH connector settings
About Public Key Authentication
About evaluation of bv-Control for UNIX
Agentless Registration and Configuration
Configuring agentless target computers by importing a .csv file
Switching target computers from agent-based registration mode to agentless
Configuring a SUDO setting in the bvAgentlessConfig.ini file for query execution
Credential management
Credential management for agent-based UNIX target computers
Executing queries on agentless targets using default su query credentials
Executing queries on agentless target computers using native credentials
Credential management for agentless UNIX target computers
Executing queries for UNIX agents that are configured with default query credentials
Executing queries for UNIX agents that are configured with resource credentials
Executing queries for UNIX agents that are configured with native credentials
Security management
About Kernel Parameters
Reporting on SANS TOP 10 vulnerabilities for UNIX target computers
Configuration management
Retrieving computer information
Retrieving the list of packages that are installed on the computers
Retrieving user information
Content and capacity management
Using disk space less than 50 percent of total allocation
Using Composite File Descriptor's Find options to search data
ActiveAdmin function in bv-Control for UNIX
Summary
About uninstalling bv-Control for UNIX from the Windows computer
Uninstalling the UNIX agents from the target computers using bv-Config UNIX utility
Manually uninstalling the UNIX agents from the target computers
Uninstalling from the Solaris target computers
Uninstalling from the Red Hat and SUSE Linux target computers
Uninstalling from the HP-UX target computers
Uninstalling from the AIX target computers


Article URL http://www.symantec.com/docs/DOC2773


Terms of use for this information are found in Legal Notices