Administration Guide
Page 2
Norton Internet Security, Norton Personal Firewall, Symantec AntiVirus, Symantec Client Firewall, Symantec Client Security, and Symantec Security Response are U.S. Symantec reserves the ...Symantec Corporation is the copyrighted work of Symantec Corporation and is being delivered to you AS-IS, and Symantec Corporation makes no warranty as to make changes without the express written permission of Symantec Corporation. Any use . registered trademarks of America. 10 9 8 7 6 5 4 3 2 1 Printed in the United States of Symantec Corporation. Symantec AntiVirus™ Corporate Edition...
Norton Internet Security, Norton Personal Firewall, Symantec AntiVirus, Symantec Client Firewall, Symantec Client Security, and Symantec Security Response are U.S. Symantec reserves the ...Symantec Corporation is the copyrighted work of Symantec Corporation and is being delivered to you AS-IS, and Symantec Corporation makes no warranty as to make changes without the express written permission of Symantec Corporation. Any use . registered trademarks of America. 10 9 8 7 6 5 4 3 2 1 Printed in the United States of Symantec Corporation. Symantec AntiVirus™ Corporate Edition...
Administration Guide
Page 91
...Internet and send information to the strict definitions of viruses, Trojan horses, worms, or other types of threats. You can then obtain confidential information regarding user behavior. ■ Security risks: Threats that do not conform to the target system. Scanning for viruses and other threats 91 About scans in Symantec AntiVirus...9632; Auto-Protect scanning for Internet email messages and attachments that Symantec AntiVirus can configure the following types of Symantec AntiVirus. Viruses, Trojan horses, and worms are scanned for Internet email also includes outbound email ...
...Internet and send information to the strict definitions of viruses, Trojan horses, worms, or other types of threats. You can then obtain confidential information regarding user behavior. ■ Security risks: Threats that do not conform to the target system. Scanning for viruses and other threats 91 About scans in Symantec AntiVirus...9632; Auto-Protect scanning for Internet email messages and attachments that Symantec AntiVirus can configure the following types of Symantec AntiVirus. Viruses, Trojan horses, and worms are scanned for Internet email also includes outbound email ...
Administration Guide
Page 106
...-Protect on your file system, Symantec AntiVirus detects the virus as Hotmail and Yahoo! Symantec AntiVirus also detects the virus if the user tries to save attachments to prevent the spread of threats such as worms that uses SSL (Secure Sockets Layer) ■ HTTP-...on your file system. When Auto-Protect scanning for Internet email protects both the body text of your users receives a message with an infected attachment, Symantec AntiVirus can use the POP3 or SMTP communications protocol. Symantec AntiVirus also provides outbound email heuristics scanning that uses Bloodhound...
...-Protect on your file system, Symantec AntiVirus detects the virus as Hotmail and Yahoo! Symantec AntiVirus also detects the virus if the user tries to save attachments to prevent the spread of threats such as worms that uses SSL (Secure Sockets Layer) ■ HTTP-...on your file system. When Auto-Protect scanning for Internet email protects both the body text of your users receives a message with an infected attachment, Symantec AntiVirus can use the POP3 or SMTP communications protocol. Symantec AntiVirus also provides outbound email heuristics scanning that uses Bloodhound...
Administration Guide
Page 113
... expanded threat categories for which you monitor user Internet behavior with a company approved trackware application that are... scans. For example, your company's security policy may want to exclude folders that contain only data files that are left on computers by threats When Symantec AntiVirus deletes a file that are not subject... scheduled scans Configuring scheduled scans consists of: ■ Scheduling scans for Symantec AntiVirus servers and clients ■ Setting options for missed scans ■ Optionally editing, deleting, or disabling a scan, or running a scheduled scan on...
... expanded threat categories for which you monitor user Internet behavior with a company approved trackware application that are... scans. For example, your company's security policy may want to exclude folders that contain only data files that are left on computers by threats When Symantec AntiVirus deletes a file that are not subject... scheduled scans Configuring scheduled scans consists of: ■ Scheduling scans for Symantec AntiVirus servers and clients ■ Setting options for missed scans ■ Optionally editing, deleting, or disabling a scan, or running a scheduled scan on...
Administration Guide
Page 209
...-bit operating systems using Continuous LiveUpdate 147 virus definitions files 147 A access list reloading 51 using to enhance server group security 48 values for IP and IPX addresses 50 Action Status for alerts 83 Active Directory requirement for Discovery 21 address cache discovery... Internet Mail 71 Send Page 72 forwarding for roaming clients 192 to AMS servers 85 message parameters 64 size limitation 65 antivirus clients configuring with Grc.dat 13 antivirus protection 13, 15, 37 antivirus servers configuring using the Virus Definition Transport Method 148 audits determining network security...
...-bit operating systems using Continuous LiveUpdate 147 virus definitions files 147 A access list reloading 51 using to enhance server group security 48 values for IP and IPX addresses 50 Action Status for alerts 83 Active Directory requirement for Discovery 21 address cache discovery... Internet Mail 71 Send Page 72 forwarding for roaming clients 192 to AMS servers 85 message parameters 64 size limitation 65 antivirus clients configuring with Grc.dat 13 antivirus protection 13, 15, 37 antivirus servers configuring using the Virus Definition Transport Method 148 audits determining network security...
Administration Guide
Page 214
214 Index configuring 113 deleting 119 secondary server 38 security, enhancing for server groups 48 Send Internet Mail alert, configuring 71 Send Page alert configuring... selecting primary server for 45 unlocking and locking 42 viewing 47 servers about antivirus protection for 37 Auto-Protect options 96 changing parent servers with Grc.dat 46, 58 changing...SmartScan 98 SNMP trap destinations, configuring 75 spyware 90 subnet, IP discovery for 23 Symantec Security Response, tracking submissions 177 Symantec System Center changing views 16 console views 15 icons 17 locating found items 29 ...
214 Index configuring 113 deleting 119 secondary server 38 security, enhancing for server groups 48 Send Internet Mail alert, configuring 71 Send Page alert configuring... selecting primary server for 45 unlocking and locking 42 viewing 47 servers about antivirus protection for 37 Auto-Protect options 96 changing parent servers with Grc.dat 46, 58 changing...SmartScan 98 SNMP trap destinations, configuring 75 spyware 90 subnet, IP discovery for 23 Symantec Security Response, tracking submissions 177 Symantec System Center changing views 16 console views 15 icons 17 locating found items 29 ...
Reference Guide
Page 2
... and are hereby acknowledged. Any technical documentation that is made available by Symantec Corporation. Norton Internet Security, Norton Personal Firewall, Symantec AntiVirus, Symantec Client Firewall, Symantec Client Security, and Symantec Security Response are U.S. Documentation version 10.0 Copyright Notice Copyright © 2005 Symantec Corporation. Documentation may be copied without prior notice. Symantec AntiVirus™ Corporate Edition Reference Guide The software described in this book is furnished under a license...
... and are hereby acknowledged. Any technical documentation that is made available by Symantec Corporation. Norton Internet Security, Norton Personal Firewall, Symantec AntiVirus, Symantec Client Firewall, Symantec Client Security, and Symantec Security Response are U.S. Documentation version 10.0 Copyright Notice Copyright © 2005 Symantec Corporation. Documentation may be copied without prior notice. Symantec AntiVirus™ Corporate Edition Reference Guide The software described in this book is furnished under a license...
Reference Guide
Page 12
...that product, and configure Symantec AntiVirus to prevent problems with the Internet Mail Connector (IMC) or Information Store (IS). Products such as a client on an email server, be excluded from scanning by Symantec AntiVirus to run LiveUpdate. All installed Symantec antivirus products share the same ...on the Exchange server ■ Damage to the Exchange databases To correctly configure file scanning, you configure Symantec AntiVirus as Symantec Mail Security™ for email servers download are installed Note: For the latest details on which directories and files to retrieve ...
...that product, and configure Symantec AntiVirus to prevent problems with the Internet Mail Connector (IMC) or Information Store (IS). Products such as a client on an email server, be excluded from scanning by Symantec AntiVirus to run LiveUpdate. All installed Symantec antivirus products share the same ...on the Exchange server ■ Damage to the Exchange databases To correctly configure file scanning, you configure Symantec AntiVirus as Symantec Mail Security™ for email servers download are installed Note: For the latest details on which directories and files to retrieve ...
Reference Guide
Page 29
... you might need to understand the basics of cryptography as it is used , you need to conduct secure transactions between Web servers and clients. Most online transactions that involve money moving across the Internet use the Secure Sockets Layer (SSL) protocol, which Netscape® created to manage or create certificates. SSL uses a Public...; Overview ■ About cryptographic keys and algorithms ■ About one-way hashes and digital signatures ■ About digital certificates and PKIs ■ About SSL Overview Symantec AntiVirus communications use SSL.
... you might need to understand the basics of cryptography as it is used , you need to conduct secure transactions between Web servers and clients. Most online transactions that involve money moving across the Internet use the Secure Sockets Layer (SSL) protocol, which Netscape® created to manage or create certificates. SSL uses a Public...; Overview ■ About cryptographic keys and algorithms ■ About one-way hashes and digital signatures ■ About digital certificates and PKIs ■ About SSL Overview Symantec AntiVirus communications use SSL.
Reference Guide
Page 34
...CA's public key. In some implementations, John can request that the CA create the private and public key pair, and return the private key securely. The RA confirms the person's identity, and then the RA sends the CSR to a Registration Authority (RA). Now, if John wants ...For reference, Symantec AntiVirus uses an internal root CA (external CAs include Entrust and VeriSign), and the primary server in transit, and that it is used across the Internet, that person (John, for 10 years. 34 Cryptography basics About digital certificates and PKIs When a person or corporation wants a certificate...
...CA's public key. In some implementations, John can request that the CA create the private and public key pair, and return the private key securely. The RA confirms the person's identity, and then the RA sends the CSR to a Registration Authority (RA). Now, if John wants ...For reference, Symantec AntiVirus uses an internal root CA (external CAs include Entrust and VeriSign), and the primary server in transit, and that it is used across the Internet, that person (John, for 10 years. 34 Cryptography basics About digital certificates and PKIs When a person or corporation wants a certificate...
Reference Guide
Page 35
...same process, and potentially a different algorithm. The traffic between Web servers and browsers. They verify that are installed with Internet Explorer, check Tools, Internet Options, Content, Certificates, Trusted Root Certification Authorities. You can also tell the client to try another symmetric key and... session key by using the symmetric key and algorithm. Cryptography basics 35 About SSL About SSL Netscape developed SSL to secure traffic between the server and client is encrypted by using symmetric cryptography because is it much faster than asymmetric cryptography. ...
...same process, and potentially a different algorithm. The traffic between Web servers and browsers. They verify that are installed with Internet Explorer, check Tools, Internet Options, Content, Certificates, Trusted Root Certification Authorities. You can also tell the client to try another symmetric key and... session key by using the symmetric key and algorithm. Cryptography basics 35 About SSL About SSL Netscape developed SSL to secure traffic between the server and client is encrypted by using symmetric cryptography because is it much faster than asymmetric cryptography. ...
Reference Guide
Page 51
About viewing certificates Internet Explorer and most Web browsers let you can double-click the .cer files and view them in your environment. Typically, most Web browsers then trust ... on Windows computers. You should be capable of moving your private key to a removable storage device, secure the device in the private-keys directory on the primary server, add the secondary server, and then re-secure the key. If you do, you promote a secondary server to a primary server, the server group private...
About viewing certificates Internet Explorer and most Web browsers let you can double-click the .cer files and view them in your environment. Typically, most Web browsers then trust ... on Windows computers. You should be capable of moving your private key to a removable storage device, secure the device in the private-keys directory on the primary server, add the secondary server, and then re-secure the key. If you do, you promote a secondary server to a primary server, the server group private...
Client Guide
Page 2
... Symantec, the Symantec logo, LiveUpdate, Norton AntiVirus, and Norton SystemWorks are trademarks of Symantec Corporation. Other brands and product names mentioned in accordance with the terms of the user. NO WARRANTY. Any technical documentation that is at the risk of the agreement. Norton Internet Security, Norton Personal Firewall, Symantec AntiVirus, Symantec Client Firewall, Symantec Client Security, Symantec Desktop Firewall, Symantec Enterprise Security Architecture, Symantec Packager, Symantec Security Response...
... Symantec, the Symantec logo, LiveUpdate, Norton AntiVirus, and Norton SystemWorks are trademarks of Symantec Corporation. Other brands and product names mentioned in accordance with the terms of the user. NO WARRANTY. Any technical documentation that is at the risk of the agreement. Norton Internet Security, Norton Personal Firewall, Symantec AntiVirus, Symantec Client Firewall, Symantec Client Security, Symantec Desktop Firewall, Symantec Enterprise Security Architecture, Symantec Packager, Symantec Security Response...
Client Guide
Page 10
... adjust them . A modem or Internet connection is managed by the Symantec System Center administrator program. Stand-alone computers are available several times each month from Symantec. Note: Options that do not receive virus and security risk definitions updates from a Symantec site, and then replaces the old definitions files in the Symantec AntiVirus directory. If your administrator. LiveUpdate...
... adjust them . A modem or Internet connection is managed by the Symantec System Center administrator program. Stand-alone computers are available several times each month from Symantec. Note: Options that do not receive virus and security risk definitions updates from a Symantec site, and then replaces the old definitions files in the Symantec AntiVirus directory. If your administrator. LiveUpdate...
Client Guide
Page 11
... exist inside of viruses. See "About security risks" on a particular date. Blended threats use memory. System administrators may have to run Symantec AntiVirus with server and Internet vulnerabilities to propagate and attack, and cause widespread damage throughout a network. Introducing Symantec AntiVirus 11 About viruses About remote computers that connect to a corporate network Remote computers that replicates itself...
... exist inside of viruses. See "About security risks" on a particular date. Blended threats use memory. System administrators may have to run Symantec AntiVirus with server and Internet vulnerabilities to propagate and attack, and cause widespread damage throughout a network. Introducing Symantec AntiVirus 11 About viruses About remote computers that connect to a corporate network Remote computers that replicates itself...
Client Guide
Page 14
... can away from a software program. ■ Adware: Stand-alone or appended programs that can secretly gather personal information through the Internet to a 900 number or FTP site, typically to accrue charges. ■ Hack tools: Programs that is a keystroke logger, ...typically in the following categories: ■ Spyware: Stand-alone programs that do not self-replicate. 14 Introducing Symantec AntiVirus About security risks About security risks Security risks are used to create tools for advertising purposes. Adware may also be unknowingly downloaded from Web sites (typically...
... can away from a software program. ■ Adware: Stand-alone or appended programs that can secretly gather personal information through the Internet to a 900 number or FTP site, typically to accrue charges. ■ Hack tools: Programs that is a keystroke logger, ...typically in the following categories: ■ Spyware: Stand-alone programs that do not self-replicate. 14 Introducing Symantec AntiVirus About security risks About security risks Security risks are used to create tools for advertising purposes. Adware may also be unknowingly downloaded from Web sites (typically...
Client Guide
Page 15
... white papers and detailed information about threats and security risks. See "Initiating manual scans" on page 43. The Symantec™ Security Response Web site provides the latest information about viruses and security risks. Introducing Symantec AntiVirus 15 About security risks ■ Remote access: Programs that allow access over the Internet from Web sites, email messages, or instant messenger...
... white papers and detailed information about threats and security risks. See "Initiating manual scans" on page 43. The Symantec™ Security Response Web site provides the latest information about viruses and security risks. Introducing Symantec AntiVirus 15 About security risks ■ Remote access: Programs that allow access over the Internet from Web sites, email messages, or instant messenger...
Client Guide
Page 16
... may install itself on page 38. How Symantec AntiVirus responds to viruses and security risks Figure 1-1 Symantec Security Response security risk description See "Accessing the Symantec Security Response Web site" on your computer without your knowledge when you access the Internet. Computers are also protected from viruses and security risks that travel across networks. Computers are protected from viruses and...
... may install itself on page 38. How Symantec AntiVirus responds to viruses and security risks Figure 1-1 Symantec Security Response security risk description See "Accessing the Symantec Security Response Web site" on your computer without your knowledge when you access the Internet. Computers are also protected from viruses and security risks that travel across networks. Computers are protected from viruses and...
Installation Guide
Page 2
... errors. Norton Internet Security, Norton Personal Firewall, Symantec AntiVirus, Symantec Client Firewall, Symantec Client Security, and Symantec Security Response are trademarks of Symantec Corporation and is owned by Symantec Corporation is the copyrighted work of Symantec Corporation. Symantec reserves the right... 10 9 8 7 6 5 4 3 2 1 registered trademarks of Symantec Corporation. NO WARRANTY. Documentation may be copied without prior notice. Symantec AntiVirus™ Corporate Edition Installation Guide The software described in this book is furnished under a license...
... errors. Norton Internet Security, Norton Personal Firewall, Symantec AntiVirus, Symantec Client Firewall, Symantec Client Security, and Symantec Security Response are trademarks of Symantec Corporation and is owned by Symantec Corporation is the copyrighted work of Symantec Corporation. Symantec reserves the right... 10 9 8 7 6 5 4 3 2 1 registered trademarks of Symantec Corporation. NO WARRANTY. Documentation may be copied without prior notice. Symantec AntiVirus™ Corporate Edition Installation Guide The software described in this book is furnished under a license...
Installation Guide
Page 77
... 7.6x, the 7.6x client software attempts to install over the following products: ■ Symantec AntiVirus Corporate Edition 8.0 and later ■ Norton AntiVirus Corporate Edition 7.6 and later ■ Symantec Client Security, all versions ■ Norton Internet Security 2003 if the Norton AntiVirus component has not been installed Unsupported migration paths Symantec AntiVirus migration is not supported for DOS/Windows 3.1, all versions ■ Intel LANDesk Virus...
... 7.6x, the 7.6x client software attempts to install over the following products: ■ Symantec AntiVirus Corporate Edition 8.0 and later ■ Norton AntiVirus Corporate Edition 7.6 and later ■ Symantec Client Security, all versions ■ Norton Internet Security 2003 if the Norton AntiVirus component has not been installed Unsupported migration paths Symantec AntiVirus migration is not supported for DOS/Windows 3.1, all versions ■ Intel LANDesk Virus...