Preparing for client installation

Article:HOWTO55085  |  Created: 2011-06-29  |  Updated: 2011-12-16  |  Article URL
Article Type
How To


Preparing for client installation

Table: Client computer preparation lists the actions that are usually required to prepare computers for client installation.

Table: Client computer preparation



Identify client computers

Identify the computers on which you want to install the client software. All the computers must run a supported operating system.

See the knowledge base article: System Requirements for Symantec Endpoint Protection and Network Access Control 12.1

See About managed and unmanaged clients.


Symantec recommends that you also install the client on the computer that hosts Symantec Endpoint Protection Manager.

Identify computer groups

Identify the computer groups to use during client installation. You can also import an existing group structure such as an Active Directory structure.

See Managing groups of clients.

See Importing an existing organizational structure.

See Assigning clients to groups before you install the client software.

Uninstall currently installed virus protection software

  • Remove third-party virus protection software.

  • Uninstall any legacy Symantec virus protection software if you do not plan to migrate the settings.

    See About migrating to Symantec Endpoint Protection.

    See the Symantec documentation for your legacy Symantec virus protection software for information about uninstallation.

Prepare computers for remote deployment

Prepare your computers for remote client deployment.

  • Set administrative rights to the client computers.


    If you do not want to provide users with administrative rights to their computers, use remote push installation to remotely install the client software. Remote push installation requires you to have local administrative rights to the computers.

    See Deploying clients by using Remote Push .

Deploy client software

You deploy the client software using any of the three available methods.

See About client deployment methods.

Consider post-installation options

You can take additional steps to secure unmanaged computers and optimize the performance of your Symantec Endpoint Protection installation.

See Installing an unmanaged client.

See Getting up and running on Symantec Endpoint Protection for the first time.

Legacy ID


Article URL

Terms of use for this information are found in Legal Notices