Best Practices for Symantec Endpoint Protection on Citrix and Terminal Servers
|Article:TECH91070|||||Created: 2008-01-24|||||Updated: 2013-08-13|||||Article URL http://www.symantec.com/docs/TECH91070|
You are looking for information on how to best configure Symantec Endpoint Protection (SEP) for Terminal Server and Citrix solutions
The following white paper provides information on the best configuration of SEP in Terminal Server and Citrix environments.
These recommendations apply to SEP 11 and with minor differences also to SEP 12.1.
In SEP 12.1 some processes have changed on the client:
- ccApp.exe and Rtvscan.exe are no longer present. Their functionality has been moved into ccSvcHost.exe.
- SmcGui.exe will only be running if the user launches the SEP GUI and it should only be launched for that user session.
- The ccSvcHst.exe handles the system tray icon which is supposed to run in every session.
The start of these multiple instances can be prevented by modifying the registry value for LaunchSmcGui as described in the document.
Prevent the process from starting by changing the registry value:
- Click Start, Run and type “regedit” then click OK
- Browse to HKLM\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC
- Find the entry LaunchSmcGui and change it from DWORD 1 to DWORD 0 (add it if it is not already present)
Note: When LaunchSmcGui is disabled, the help and support > troubleshooting window will show the server as offline. However the client will still update policies/content as needed. The Policy Serial Number can be verified by viewing the SerialNumber string in the registry editor (HKLM\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC\SYLINK\Sylink).
If you are unable to modify the listed registry keys please temporarily deactivate the Tamper Protection option. Please find an example how to modify the tamper protection settings in the SEPM in the following KB:
Article URL http://www.symantec.com/docs/TECH91070