Liveupdate Administrator 2.3 And Sep 12.1 For Mac

1 Symantec Endpoint Protection Getting Started Guide 2 Symantec Endpoint Protection Getting Started Guide Product version: Documentation version: 1 This document was last updated on: September 17, 2014 Legal Notice Copyright 2014 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, the Checkmark Logo, LiveUpdate, and TruScan are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. And other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED 'AS IS' AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section 'Commercial Computer Software - Restricted Rights' and DFARS, 'Rights in Commercial Computer Software or Commercial Computer Software Documentation', as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation 350 Ellis Street Mountain View, CA 3 Getting Started with Symantec Endpoint Protection This document includes the following topics: What is Symantec Endpoint Protection? What's new in Symantec Endpoint Protection System requirements for Symantec Endpoint Protection How Symantec Endpoint Protection uses layers to protect computers How does Symantec Endpoint Protection enforce compliance? Components of Symantec Endpoint Protection Getting up and running on Symantec Endpoint Protection for the first time Installing Symantec Endpoint Protection Manager Activating or importing your Symantec Endpoint Protection 12.1.x product license Installing clients with Web Link and Installing clients with Save Package Installing clients with Remote Push Testing Symantec Endpoint Protection Manager policies Where to get more information 4 What is Symantec Endpoint Protection?

4 What is Symantec Endpoint Protection? Symantec Endpoint Protection is a client-server solution that protects laptops, desktops, and servers in your network against malware, risks, and vulnerabilities. Symantec Endpoint Protection combines virus protection with advanced threat protection to proactively secure your client computers against known and unknown threats, such as viruses, worms, Trojan horses, and adware. Symantec Endpoint Protection provides protection against even the most sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and spyware that mutates. Providing low maintenance and high power, Symantec Endpoint Protection communicates over your network to automatically safeguard both physical systems and virtual systems against attacks. Symantec Endpoint Protection provides management solutions that are efficient and easy to deploy and use. Symantec Endpoint Protection protects your network by accomplishing the following key tasks: Protects your endpoints from malware and maximizes system uptime.

See How Symantec Endpoint Protection uses layers to protect computers on page 14. Enforces protection policies and compliance on the endpoint.

See How does Symantec Endpoint Protection enforce compliance? Responds to threats and incidents effectively by quickly quarantining and removing malware from endpoints. Monitors and tracks risk exposure across platforms, devices, remote locations, and in physical, virtual or hybrid environments. See Components of Symantec Endpoint Protection on page 17.

Liveupdate Administrator 2.3 And Sep 12.1 For Mac

What's new in Symantec Endpoint Protection Note: Symantec Endpoint Protection is the last release update to support Symantec Protection Center 2.0. In addition, LiveUpdate Administration Utility 1.x reaches end of life on January 5, If you use this utility in your environment, you should migrate to LiveUpdate Administrator 2.3.x. To get the latest version of LiveUpdate Administrator, see Downloading LiveUpdate Administrator. 5 What's new in Symantec Endpoint Protection Table 1-1 describes the new features in the latest version of Symantec Endpoint Protection. Table 1-1 New features in Symantec Endpoint Protection Feature OpenSSL 1.0.1h for Symantec Endpoint Protection Manager Description Symantec Endpoint Protection Manager now uses OpenSSL 1.0.1h. The update to OpenSSL addresses several security vulnerabilities, including the one known as Heartbleed, which the OpenSSL Security Advisory for CVE describes.

Earlier versions of OpenSSL can reveal sensitive information from the computer's memory to a remote attacker. You can read the full text of the OpenSSL Security Advisory at the following link: OpenSSL Security Advisory for CVE System requirements The Symantec Endpoint Protection client for Linux replaces the Symantec AntiVirus client for Linux and supports a greater range of distributions and kernels. Added distributions include Red Hat Enterprise Linux Server (RHEL) 6.5 and CentOS 6.5. Symantec Endpoint Protection adds the following operating system support: Windows 8.1 Update 2 Windows Server 2012 Update 2 Mac OS X You can now access Symantec Endpoint Protection Manager from the following browsers: Microsoft Internet Explorer 10.2, 11 Mozilla Firefox 5.x through 31.0 Google Chrome through For the complete list of system requirements: See System requirements for Symantec Endpoint Protection on page 8. 6 What's new in Symantec Endpoint Protection Table 1-1 New features in Symantec Endpoint Protection (continued) Feature Windows client protection features Description The Windows client provides the following new protection enhancements: Virus and Spyware Protection: Power Eraser can now be run from the Symantec Endpoint Protection Manager console.

Power Eraser provides aggressive scanning and analysis to help resolve issues with heavily infected Windows computers. You should only run Power Eraser in emergency situations, such as when a repair fails or a computer is unstable. Note that when you run Power Eraser from the management console, Power Eraser does not scan and analyze user-specific locations.

Use Power Eraser in the SymHelp tool directly on the client computer to examine user-specific locations. Download Insight and SONAR can now scan Office 2013 applications. The client no longer scans and deletes backed up files on a server where the Symantec Endpoint Protection client and either Symantec Backup Exec or Symantec NetBackup is installed. Network Threat Protection: For firewall rules, you can now define a host group with an IPv6 IP address. Intrusion Prevention policies do not support host names with IPv6 addresses. The default firewall policy includes a default Allow ICMPv6 firewall rule that contains ICMPv6 types of 1-4,148,149, You can also add a rule with ICMPv6 as a protocol in the network service list. You can now use SHA-256 checksums as well as MD5 checksums for file fingerprints in the firewall rules and the application learning feature.

IPS audit signatures monitor the network traffic of certain applications on Windows computers. For example, you can use these signatures to detect Yahoo IM logons. You can enable logging, review the Network Threat Protection traffic logs, and then decide whether or not to take action on the traffic.

Liveupdate Administrator 2.3 And Sep 12.1 For Mac Download

Linux management The Symantec Endpoint Protection for Linux client replaces the Symantec AntiVirus for Linux client. You can now provide Virus and Spyware Protection on the clients that run Linux. Symantec Endpoint Protection Manager provides client policy management, reporting, monitoring, logging, and licensing in a single client package for Linux. Policy enforcement The Host Integrity policy is now included with Symantec Endpoint Protection. The Host Integrity policy evaluates the client computers and ensures that they meet the security policies you have downloaded to those client computers. 7 What's new in Symantec Endpoint Protection Table 1-1 New features in Symantec Endpoint Protection (continued) Feature Management server updates Management server integration with network security technology Description You can now remotely deploy the Mac client installation package in addition to deploying it with a third-party installation tool. See Installing clients with Remote Push on page 36.

Liveupdate Administrator 2.3 And Sep 12.1 For Mac Mac

Symantec Protection Center 1 is removed for Symantec Endpoint Protection You can still integrate Symantec Endpoint Protection Manager with Symantec Protection Center 2, but the feature is no longer tested or available for download. You can configure the installation package to remove from the client computer over 300 third-party software products from more than 60 vendors.

For more information, see: Third-party security software removal support in Symantec Endpoint Protection Client password settings dialog box The client password protection settings now appear in a more accessible location in Clients Policies Password Settings. This dialog also provides a new option to enable password protection globally for all clients. You can also access the Password Settings dialog box when you log on to Symantec Endpoint Protection Manager. You can no longer set the console timeout to Never. For security reasons, the maximum timeout period is one hour. After an administrator's failed logon attempts trigger an account lockout, the lockout interval now doubles with each subsequent lockout.

Symantec Endpoint Protection Manager reverts to the original lockout interval after a successful logon, or after 24 hours since the first lockout. Web services on the management server now support integration with Symantec Managed Security Services. Together, Symantec Managed Security Services and Symantec Endpoint Protection Manager provide advanced threat monitoring and targeted remediation options. The following new web services are also available for use by third-party remote monitoring and management solutions: You can run the new Power Eraser commands. You can place clients into Quarantine. You can run an Evidence of Compromise command on the client. Documentation and other tools for remote monitoring and management support appear in the web services SDK.

Liveupdate administrator 2.3 and sep 12.1 for mac

The SDK is located in the Tools installation file in the following folder: /Integration/SEPMWebServiceSDK Management server integration with advanced reporting Symantec Endpoint Protection comes with a new version of IT Analytics. This new version removes the need for the Symantec Management Platform, supports most common browsers, requires no plug-ins, and also supports mobile devices. IT Analytics delivers advanced reporting and query capability for customers who want more sophisticated reporting than Symantec Endpoint Protection Manager can provide alone. The IT Analytics installer is located in the Tools installation file in the following folder: /ITAnalytics 8 System requirements for Symantec Endpoint Protection 8 Table 1-1 New features in Symantec Endpoint Protection (continued) Feature Management server and client performance Documentation Description The management server and the client include the following performance improvements: Bandwidth control for client communication The management server now includes an Apache module that you can configure to control network bandwidth. The module reduces the network load between Symantec Endpoint Protection Manager and the client computers, especially when the clients download content definitions or client installation packages. To reduce hard disk space, Symantec Endpoint Protection Manager now stores only the most recent full set of virus definitions, plus the deltas for previous versions.

Storing the deltas reduces delivery time and network bandwidth, and improves disk storage requirements on the management server by 65% to 80%. The client startup time has improved by more than 10%. The client service needs fewer processes to run. Enhancements to the scan throttling logic for the Windows client improve scan performance.

These enhancements also minimize the effect on computers with solid-state drives (SSDs) or that run in a virtualized or Terminal Services environment. If Symantec Endpoint Protection and Critical System Protection are both installed on the same client computer, these applications now share Symantec components. Symantec Endpoint Protection provides the following documentation changes: The main PDF files are now on the Technical Support site. You can now look for and download the most current PDF files from a single location: Product guides for all versions of Symantec Endpoint Protection and Symantec Endpoint Protection Business Edition (English) Symantec Endpoint Protection (all other languages) The documents for specific tools remain in the same folder as the associated tool. The Symantec Endpoint Protection Installation and Administration Guide no longer includes Network Access Control topics. A new Symantec Network Access Control Installation and Administration Guide includes the Network Access Control topics.

System requirements for Symantec Endpoint Protection In general, the system requirements for Symantec Endpoint Protection Manager and the Symantec Endpoint Protection clients are the same as those of the operating systems on which they are supported. For the most current system requirements, see: Release Notes and System Requirements for all versions of Symantec Endpoint Protection and Symantec Network Access Control 9 System requirements for Symantec Endpoint Protection 9 System requirements for Symantec Endpoint Protection Manager See System requirements for Symantec Endpoint Protection Manager on page 9. System requirements for the Symantec Endpoint Protection client for Windows See System requirements for the Symantec Endpoint Protection client for Windows on page 11. System requirements for the Symantec Endpoint Protection client for Mac See System requirements for the Symantec Endpoint Protection client for Mac on page 12. System requirements for the Symantec Endpoint Protection client for Linux See System requirements for the Symantec Endpoint Protection client for Linux on page 13. See Getting up and running on Symantec Endpoint Protection for the first time on page 20.

System requirements for Symantec Endpoint Protection Manager Table 1-2 displays the minimum requirements for Symantec Endpoint Protection Manager. Table 1-2 Component Symantec Endpoint Protection Manager system requirements Requirements Processor 32-bit processor: Intel Pentium 4 or equivalent (minimum dual core or hyper-threading recommended) 64-bit processor: Intel Pentium 4 with x86-64 support or equivalent (minimum dual core or hyper-threading recommended) Note: Intel Itanium IA-64 processors are not supported. Physical RAM 2 GB RAM available minimum; 4 GB or more available recommended. Note: Your Symantec Endpoint Protection Manager server may require additional RAM depending on the RAM requirements of other applications that are already installed. Hard drive Display 16 GB available minimum (100 GB recommended) for the management server.