Symantec™ bv-Control for Windows 9.0.1 Getting Started Guide

Article:DOC2779  |  Created: 2010-08-23  |  Updated: 2010-08-23  |  Article URL http://www.symantec.com/docs/DOC2779
Article Type
Documentation


Description



Table of Contents:
Technical Support
About Symantec bv- Control for Windows
About the RMS Console
About Symantec bv-Control for Windows
About the RMS Console components
Information Server
Configuration folder
About the Enterprise Configuration Service
About the bv-Config utility
About the Query Engine service
Master Query Engine
Slave Query Engine
Data Collection Agents
About the BindView Support Service
Component installation
Query Engine installation
Query Engine settings
About uninstalling the components
Installing bv-Control for Windows
System requirements
bv-Control for Windows
Enterprise Configuration Service
BindView Support Service
Master or Slave Query Engines
Before installing bv-Control for Windows
About installing bv-Control for Windows
About installing the bv-Config utility
Configuring bv-Control for Windows
About uninstalling bv-Control for Windows
Uninstalling bv-Control for Windows from your computer
Uninstalling bv-Control for Windows from the Console
Installing Query Engine services
About the Query Engine services
About installing a Master Query Engine
About installing a Master Query Engine
Installing the Master Query Engine
About network caching in Master Query Engines
Setting the update interval
About user caching in Master Query Engines
Setting the user cache
Selecting a machine port
Selecting a destination directory
About installing a Slave Query Engine
Installing a Slave Query Engine
About network caching in Slave Query Engines
Setting the update interval
About user caching in Slave Query Engines
Setting the user cache
Selecting a destination directory
About the Query Engine silent installation
Preparations for the silent installation
Doing the silent installation
Installing the Enterprise Configuration Service
About the Enterprise Configuration Service
Launching the ECS
Installing the ECS
Upgrading bv-Control for Windows
About upgrading bv-Control for Windows
About the Familiarization phase
About the Discovery phase
Locating the ECS components
About the Implementation phase
Upgrading bv-Control for Windows and Query Engines
About the Migration phase
Migrating the Query Engines
The BindView Support Service
About the BindView Support Service
Installing the service using bv-Config
Installing the service using the Support Service executable
Uninstalling program components using bv-Config
About uninstalling the product components
Removing a Query Engine
Removing a Support Service
Removing an Enterprise Configuration Service
Viewing details of the Query Engine uninstall
Configuring Query Engine settings
About the Query Engine configuration
Accessing the Query Engine settings dialog box
Selecting the Query Engine computer
About the Query Engine settings tabs
About the Cache tab
Scheduling the computer cache update
About the Agents tab
About the Event Logging tab
About the Options tab
About the Error Logging tab
About the Jobs tab
About the Advanced tab
About the Advanced Security tab
Master Query Engine/Information Server communication protocol
About the ECS tab
About the Sessions tab
About the IP Cache tab
About the SQE Usage tab
About the Bandwidth Schedule tab
Exporting the Query Engine settings
About the distribution rules
About creating distribution rules
Adding an absolute rule manually
Adding a wildcard rule manually
Adding a computer group rule manually
Adding a rule using the wizard
Saving a distribution rule
Removing a distribution rule
Setting the default group
Viewing distribution rule results
Generating IP Groups
Promoting and demoting Query Engines
Configuring bv-Control for Windows
About configuring bv-Control for Windows
Running the configuration wizard
Changing the configuration manually
About connection databases
Using the Connection Database dialog box
About the Modifying dialog box
Removing a Query Engine
About managing credential databases
Creating a credential database
Managing the credential database manually
Assigning a credential database to a user
About the port settings
Modifying the ECS communication port settings
Modifying the Query Engine communication port settings
Modifying both the ECS and Query Engine communication ports
Before deploying bv-Control for Windows
About bv-Control for Windows deployment plan
Architectural overview
About query processing
About the distribution rules
User-definable distribution rules
Built-in distribution rules
Expression type
Regular expressions
Fault tolerance
Query Engine deployment issues
General deployment issues
Deploying bv-Control for Windows
About bv-Control for Windows deployment
About optimal deployment strategy
Basic Information Server deployment strategies
Information Server and local console
Information Server and remote consoles
Network design factors and infrastructure deployment
Centralized environments with a single domain
Centralized environments with multiple domains
Distributed environments with multiple domains
About defining a deployment strategy
Create a table of potential users
Diagram the logical organization of the enterprise
Diagram the physical organization of the enterprise
Determine the probable reporting areas for each user
Diagram the probable reporting areas for each user
Do preliminary testing
Estimate disk space requirements
Develop an Information Server deployment strategy
Estimate the size of each bv-Control system
Estimate the projected volume of use for each bv-Control system
Finalize the Information Sever deployment strategy
Select the hardware
Deploy the software
About optimizing MQE and SQE deployment
Use the bv-Control for Windows product for a trial period
Reevaluate original deployment decisions
Modify the original deployment configuration
Optimize the number of agents for each SQE
Deploy additional SQEs as required
Optimize distribution rules
Deploy additional MQEs as required
Evaluating bv-Control for Windows
Introduction to evaluation scenarios
About access control to sensitive files and directories
Accessing user privileges when added to a group
Reviewing access permissions to sensitive files
About account management and analysis
Deleting unused user accounts
About auditing user privileges
Auditing user privileges
About configuration assessment and reporting
Assessing share permissions
About service configurations reports
Viewing the service configurations report
About flexible registry and event log reporting
Viewing event log report
About security of sensitive files and directories
Auditing user and group access
About Web Services
Using MD5 Checksum functionality
About the IIS Server Lock Down template
Determining the correctness of the applied settings
Reviewing permissions to Web site home directory
Identifying unauthorized ISAPI filters
Summary
Appendix
Administrator rights
Appendix
About the communication architecture
Communication between the Information Server and the ECS
Communication between the Information Server and an MQE
Communication during ECS Installation
Communication during ECS IP port assignment
Communication between bv-Config the ECS
Communication between the ECS and an MQE
Communication between the ECS and an SQE
Communication during installation of the Support Service
Communication between bv-Config and a Support Service
Communication between bv-Config and a Query Engine
Communication between MQEs
Communication between an MQE and an SQE
Communication between an MQE and a support service
Appendix
About replication
Verifying replication
Forcing replication


Article URL http://www.symantec.com/docs/DOC2779


Terms of use for this information are found in Legal Notices