Preparing for client installation

Article:HOWTO80804  |  Created: 2012-10-24  |  Updated: 2014-09-21  |  Article URL http://www.symantec.com/docs/HOWTO80804
Article Type
How To


Subject


Preparing for client installation

You must install a Symantec Endpoint Protection client on every computer you want to protect, whether the computer is physical or virtual.

Table: Client computer preparation lists the actions that you must perform to install the client software on the computers in your network.

Table: Client computer preparation

Action

Description

Identify client computers

Identify the computers on which you want to install the client software. Check that all the computers run a supported operating system.

Note:

Symantec recommends that you also install the client on the computer that hosts Symantec Endpoint Protection Manager.

For the most current system requirements, see: Release Notes and System Requirements for all versions of Symantec Endpoint Protection and Symantec Network Access Control

Identify computer groups (optional)

Identify the computer groups to which you want the clients to belong. For example, you can group clients based on type of computer, to conform to your corporate organization, or to the security level required. You can create these groups before or after you install the client software.

You can also import an existing group structure such as an Active Directory structure.

See Managing groups of clients.

See Importing existing groups and computers from an Active Directory or an LDAP server.

See Assigning clients to groups before you install the client software.

Prepare client computers for deployment and installation

Prepare the computers for remote client deployment and for successful communication with Symantec Endpoint Protection Manager after installation.

  • Modify any existing firewall settings to allow communication during Remote Push deployment, and between Symantec Endpoint Protection components after installation.

    If your users do not have administrative rights for their computers, then you should remotely install the client software using Remote Push. The Remote Push installation requires you to enter the credentials that have local administrative rights for the computers.

    See About the communication ports that Symantec Endpoint Protection uses.

    See Installing clients with Remote Push.

    See Preparing Windows and Mac computers for remote deployment.

  • Uninstall any legacy Symantec virus protection software, such as Symantec AntiVirus or Symantec Client Security. Migration directly from these legacy products is not supported.

    You must also uninstall any consumer-branded Symantec security products, such as Norton Internet Security.

    See the documentation for your Symantec software for information about uninstallation.

  • Uninstall third-party security software on all operating systems. For Windows operating systems, you can configure client packages to automatically uninstall existing third-party security software when you prepare to deploy clients.

    Note:

    Some programs may have special uninstallation routines. See the documentation for the third-party software.

    See Configuring client packages to uninstall existing third-party security software.

Determine features and deploy client software

You deploy the client software using one of the available methods. You can also export a customized client package to deploy later or with a third-party tool.

See About client installation methods.

See Exporting client installation packages.

See Installing Windows client software using third-party tools.

Verify installation status

Confirm that the client installation succeeded and that clients communicate with Symantec Endpoint Protection Manager. Managed clients may not appear in the console until after they are restarted.

See How to determine whether the client computer is connected and protected.

See Restarting the client computers from Symantec Endpoint Protection Manager.

After installation, you can take additional steps to secure unmanaged computers and optimize the performance of your Symantec Endpoint Protection installation.

After installation, you can take additional steps to optimize the performance of your Symantec Endpoint Protection installation.

See Getting up and running on Symantec Endpoint Protection for the first time.


Legacy ID



v16742985_v81626096


Article URL http://www.symantec.com/docs/HOWTO80804


Terms of use for this information are found in Legal Notices