Control Compliance Suite bv-Control_for_UNIX_Getting_Started_Guide v 9.0

Article:TECH116503  |  Created: 2009-01-01  |  Updated: 2012-12-19  |  Article URL http://www.symantec.com/docs/TECH116503
Article Type
Technical Solution


Issue



How to manually install agents? How do I install the bv-Control_for_UNIX?

 


Solution




Technical Support ............................................................................................... 4

Chapter 1 About bv-Control for UNIX ................................................ 13
Introduction to bv-Control for UNIX ................................................ 13
About RMS Console and Information Server ..................................... 14
bv-Control for UNIX features ......................................................... 14
bv-Control for UNIX architecture .................................................... 15
bv-Control for UNIX agent-based architecture ................................... 15
bv-Control for UNIX agentless architecture ....................................... 15
bv-Control for UNIX communication with an agentless target
computer .............................................................................. 16
bv-Control for UNIX data source ..................................................... 16
About bv-Config UNIX .................................................................. 17

Chapter 2 About product deployment requirements ..................... 19
Overview on product deployment requirements ................................. 19
System requirements .................................................................... 19
System requirements for installing bv-Control for UNIX on the
Windows computer ................................................................ 20
Hardware requirements for installing bv-Control for UNIX agents ........ 20
Software requirements for installing bv-Control for UNIX agents ......... 21
About upgrades for UNIX agents from previous versions ..................... 23
Security best practices ................................................................. 23

Chapter 3 About installing and configuring bv-Control for
UNIX ................................................................................. 25
About installing bv-Control for UNIX on Windows computers .............. 25
About bv-Control for UNIX configuration ......................................... 25

Chapter 4 Installing the UNIX agent ................................................... 27
Installation options for the UNIX agent ............................................ 27
Package dependencies to install the UNIX agent ................................ 28
Installing the UNIX agent using install.sh on the target
computers ............................................................................ 33

Installing the UNIX agent manually on AIX target computers .............. 35
Installing the UNIX agent manually on HP-UX target computers .......... 38
Installing the UNIX agent manually on Sun Solaris target
computers ............................................................................ 40
Installing the UNIX agent manually on SUSE Linux target
computers ............................................................................ 43
Installing the UNIX agent manually on Red Hat Linux target
computers ............................................................................ 44
Installing the UNIX agent using bv-Config UNIX ................................ 45

Chapter 5 Registering and configuring target computers as
agent-based .................................................................... 53
About registering UNIX target computers with the Information Server
........................................................................................... 54
Registering UNIX target computers with the Information Server using
resource credentials ............................................................... 54
Registering UNIX target computers without providing resource
credentials ............................................................................ 55
Running the setup.sh script ........................................................... 56
Starting UNIX agent on a specified IP Address ................................... 56
Notifying Information Servers about target IP address ........................ 57
Retrieving snap-ins that are installed on the Information Server .......... 58
Configuring the Information Server to accept information from a
specific IP address using setup.sh script ..................................... 58
Configuring UNIX target computers in the agent-based registration
mode ................................................................................... 60
Selecting protocols for UNIX target computers to communicate with
the Information Server ........................................................... 62
Using native credentials or resource credentials for the target
computers that are registered as agent-based .............................. 64
Using default query credentials for the target computers that are
registered as agent-based ........................................................ 65
Unregistering a UNIX agent-based target computer from the
Information Server ................................................................. 66

Chapter 6 Registering and configuring UNIX target computers
as agentless .................................................................... 67
About configuring UNIX target computers as agentless ....................... 67
About Public Key Authentication .................................................... 68
Registering and configuring the target computers using Configuration
Wizard ................................................................................. 68
Adding native credentials for the target computers that are
registered as agentless ...................................................... 71
Adding credentials for Public Key Authentication support ............ 72
Adding superuser credentials for the target computers that are
registered as agentless ...................................................... 72
Adding default query credentials for the target computers that
are registered as agentless ................................................. 73
Configuring target computers with default query credentials ............... 73
Switching registration modes of target computers ............................. 74
About configuration of SSH connector settings .................................. 76

Chapter 7 Evaluating bv-Control for UNIX ........................................ 79
About evaluation of bv-Control for UNIX .......................................... 79
Agentless Registration and Configuration ......................................... 80
Configuring agentless target computers by importing a .csv
file ................................................................................ 81
Switching target computers from agent-based registration mode
to agentless ..................................................................... 83
Configuring a SUDO setting in the bvAgentlessConfig.ini file for
query execution ............................................................... 86
Credential management ................................................................ 87
Credential management for agent-based UNIX target
computers ...................................................................... 87
Executing queries on agentless targets using default su query
credentials ...................................................................... 88
Executing queries on agentless target computers using native
credentials ...................................................................... 90
Credential management for agentless UNIX target
computers ...................................................................... 94
Executing queries for UNIX agents that are configured with
default query credentials ................................................... 95
Executing queries for UNIX agents that are configured with
resource credentials ......................................................... 95
Executing queries for UNIX agents that are configured with
native credentials ............................................................. 96
Security management ................................................................... 97
About Kernel Parameters ......................................................... 98
Reporting on SANS TOP 10 vulnerabilities for UNIX target
computers ...................................................................... 98
Configuration management ........................................................... 99
Retrieving computer information .............................................. 99
Retrieving the list of packages that are installed on the
computers ...................................................................... 99
Retrieving user information ................................................... 100
Content and capacity management ................................................ 100
Using disk space less than 50 percent of total allocation .............. 100
Using Composite File Descriptor’s Find options to search
data ............................................................................. 101
ActiveAdmin function in bv-Control for UNIX ................................. 106
Summary ............................................................................ 107

Chapter 8 Uninstalling the UNIX agent ............................................ 109
About uninstalling bv-Control for UNIX from the Windows
computer ............................................................................ 109
Uninstalling the UNIX agents from the target computers using
bv-Config UNIX utility ........................................................... 109
Manually uninstalling the UNIX agents from the target
computers ........................................................................... 110
Uninstalling from the Solaris target computers ......................... 110
Uninstalling from the Red Hat and SUSE Linux target
computers ..................................................................... 111
Uninstalling from the HP-UX target computers .......................... 112
Uninstalling from the AIX target computers .............................. 113
Index ................................................................................................................... 117



 



Legacy ID



2009120111032353


Article URL http://www.symantec.com/docs/TECH116503


Terms of use for this information are found in Legal Notices