Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

How to use the SCSP Agent Configuration Tool

Created: 02 Feb 2012 • Updated: 08 Apr 2014 | 1 comment
Language Translations
Shulk's picture
+10 10 Votes
Login to vote

Content:

  • To run the Agent Configuration Tool
  • The Agent Configuration Tool Commands
  • Running the Agent Configuration Tool
  • Related articles

(Source: SCSP Administration Guide)

To run the Agent Configuration Tool:

1. Log on to the agent computer with administrator rights

2. Navigate to the directory that contains the agent config tool

Windows agents

Named sisipsconfig

Located in C:\Program Files\Symantec\Critical System Protection\Agent\IPS\bin

Note: It can be run as Administrator and Standard user. 

UNIX agents

Named sisipsconfig.sh

Located in /opt/Symantec/scspagent/IPS/

Note: You can only SU to sisips user once you are already logged in as root.

3. At a command prompt, type sisipsconfig (Windows) or sisipsconfig.sh (UNIX) followed by the command, and then press Enter

 sisipsconfig -view / sisipsconfig.sh -view

 

The agent configuration tool commands are as follows:

-test

This option will force the Config Tool to test the connection information using Nth server entry in the list. By default it uses the first entry.

Examples:

sisipsconfig -test  

-host  (-h)

This option sets a list of Management Server hostnames.

Examples:

sisipsconfig -host MGTSERVER1,MGTSERVER2
sisipsconfig -h MGTSERVER1,MGTSERVER2 

-port (-p)

This option sets the Management Server's communication port.

Examples:

sisipsconfig -port 8080
sisipsconfig -p 8080 

-protocol

This option sets the Management Server communications protocol.

Examples:

sisipsconfig -protocol http
sisipsconfig -protocol https 

-certfile (-c)

This option sets the path to the client certificate file on the local computer. Enclose paths with spaces in quotes.

Examples:

sisipsconfig -certfile "C:/Program Files/Symantec/agent-cert.ssl"
sisipsconfig -c c:/Program Files/Symantec/agent-cert.ssl

./sisipsconfig.sh -c /tmp/agent-cert.ssl 

-failbackinterval

This option sets the interval (in minutes) at which the agent will try to connect to the primary Management Server when it has failed over to another Server.

Examples:

sisipsconfig -failbackinterval 60 

-forcereg

This option forces the Agent to re-register and obtain a new GUID from the Management Server.

Examples:

sisipsconfig -forcereg 

-setpolicy (-s)

This option replaces the policy currently in use by the Agent with the policy that was most recently set on this Agent from the Management Server. This policy will remain in use until another policy is set on this Agent from the Management Server or by using this tool with the -resetpolicy option.

Note: it applies to IPS policy only.

Examples:

sisipsconfig -setpolicy
sisipsconfig -s

-resetpolicy (-r)

This option replaces the policy currently in use by the Agent with the default null policy. This policy will remain in use until another policy is set on this Agent from the Management Server or by using this tool with the -setpolicy option.

Note: it applies to IPS policy only.

Examples:

sisipsconfig -resetpolicy
sisipsconfig -r 

-ipsstate on/off

This option enables/disables the IPS Driver. This change would only take effect after a reboot.

Examples:

sisipsconfig -ipsstate on 

Note: -toggleIPSState (-i) option is now deprecated from 5.2.9.

-trace

This option turns the Agent tracing on/off

Examples:

sisipsconfig -trace 

-rollagent (-a)

This option forces the Agent log file to rollover now.

Examples:

sisipsconfig -rollagent
sisipsconfig -a 

-rollcsv (-csv)

This option forces the CSV log file to rollover now.

Examples:

sisipsconfig -rollcsv
sisipsconfig -csv 

-retranslate (-n)

This option forces a policy retranslation.

Examples:

sisipsconfig –retranslate
sisipsconfig -n 

-export

This option prints out the configuration file verbatim. This option may not be used with other options.

Example:

sisipsconfig -export 

Running the Agent Configuration Tool

If an Agent's policy prevents running the Agent Configuration Tool, do one of the following:

  • Apply the null policy to the Agent.
  • Override the Agent's current policy.

See the SCSP Prevention Policy Reference Guide for details on policy override.

Related articles

How to install SCSP with Microsoft SQL Server 2008 R2 Express Edition

SCSP - Error "Database population FAILED"

How to install SCSP agent on Windows, UNIX and Solaris

How to use the SCSP Agent Configuration Tool

How to upgrade SCSP to a newer release

How to import, create and update default policies in SCSP

Configuring Virtual Agents in SCSP 5.2 RU8

How to install the SCSP SymIDS ISAPI filter on Windows Server 2008 R2

Symantec Critical System Protection 5.2 RU9 Docs

Comments 1 CommentJump to latest comment

cemilebaşak's picture

Thanks.

Its very usefull.

Regards;

Cemile Denerel BAŞAK

Note: Please mark as solution if its help you.

0
Login to vote