Software update best practices
|Article:HOWTO25731|||||Created: 2010-01-24|||||Updated: 2010-01-10|||||Article URL http://www.symantec.com/docs/HOWTO25731|
Table: Software update procedure describes the steps to prepare and run a software update.
Do not reboot or shut down an appliance while the software update runs. The appliance can become corrupted and require reinstallation.
Table: Software update procedure
Read software update documentation
Read the software update notes, release notes, and late-breaking news for the software update. The documentation may describe special steps to prepare for the software update.
Delete messages in Spam Quarantine
If your site policies let you, delete all the messages in Spam Quarantine.
Delete log messages
If your site policies let you, delete all Scanner and directory data service log messages.
Delete content filtering incidents
If your site policies let you, delete all incidents from the content incident folders.
See Deleting incidents.
Perform a backup
Perform a backup to save your configuration settings.
Stop incoming messages and drain the queue
If you are running software update on a Scanner or a combination Control Center and Scanner, set the MTA operation to Do not accept incoming messages. Incoming messages are temporarily rejected. After you stop incoming messages, flush messages to drain them from the queue.
Do not stop the Scanner Services as described in that section.
Monitor the update progress
Optionally, you can monitor the update process by running the tail -f update.log on the command line. Run the command before the software update so you can see the data being written to the log.
Run the software update
Run the software update either using the Control Center or the update command.
Restart incoming messages
After the update completes, exit from your Web browser, restart the Web browser, and log into the Control Center. If you ran the software update on a Scanner or a combination Control Center and Scanner, set the MTA operation to Accept and deliver messages normally.
Article URL http://www.symantec.com/docs/HOWTO25731