SCSP Installation Guide
SCSP Installation Guide
SCSP Installation Guide
9 Installation Guide
Legal Notice
Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (Third Party Programs). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantecs support offerings include the following:
A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services
For information about Symantecs support offerings, you can visit our Web site at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy.
Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description:
Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes
Customer service
Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues:
Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs, DVDs, or manuals
Contents
Technical Support ............................................................................................... 4 Chapter 1 Introducing Symantec Critical System Protection .......................................................................
About Symantec Critical System Protection ...................................... Components of Symantec Critical System Protection .......................... How Symantec Critical System Protection works ............................... About Symantec Critical System Protection features .......................... About policies, agents, events, and reports ........................................ Where to get more information ....................................................... 11 11 12 13 14 15 16
Chapter 2
Contents
Chapter 3
Contents
Chapter 4
Chapter 5
10
Contents
Chapter
About Symantec Critical System Protection Components of Symantec Critical System Protection How Symantec Critical System Protection works About Symantec Critical System Protection features About policies, agents, events, and reports Where to get more information
12
Introducing Symantec Critical System Protection Components of Symantec Critical System Protection
Symantec Critical System Protection agents detect behavior by auditing and monitoring processes, files, log data, and Windows registry settings. For example, a Symantec Critical System Protection detection policy can specify to monitor the Windows registry keys that the Welchia worm changes during infection and send an alert. As a result, Windows registry security-related events can be put into context and appropriate measures taken. See About installing Symantec Critical System Protection on Windows on page 34. See Components of Symantec Critical System Protection on page 12.
Introducing Symantec Critical System Protection How Symantec Critical System Protection works
13
A prevention policy is a collection of rules that governs how processes and users access resources. For example, prevention policies can contain a list of files and registry keys that no program or user can access. Prevention policies can contain a list of UDP and TCP ports that permit and deny traffic. Prevention policies can deny access to startup folders. Prevention policies define the actions to take when unacceptable behavior occurs. A detection policy is a collection of rules that are configured to detect specific events and take action. An agent can enforce one or more detection policies simultaneously. For example, detection policies can be configured to generate events when files and registry keys are deleted; when known, vulnerable CGI scripts are run on Microsoft Internet Information Server (IIS); when USB devices are inserted and removed from computers; and when network shares are created and deleted.
You use the management console to manage agent policies, and customize how agents communicate with the management server. Agents report events to the management server for storage and are viewed in the management console. Agent log rules control the events that are logged for that agent. Logged data includes event date and time, event type, importance rating, and any prevention action performed. Symantec Critical System Protection includes queries and reports with charts, graphs, and tables that provide detailed and aggregated summary data about events, agents, and policies. You can also create your own queries and reports. Secure Sockets Layer X.509 certificate-based channel encryption secures communication between the management console and the management server, and between the agent and the management server.
14
Introducing Symantec Critical System Protection About Symantec Critical System Protection features
Day-zero protection: stop malicious exploitation of systems and applications; prevent introduction and spread of malicious code Hardened systems: lock down OS, applications, and databases; prevent unauthorized executables from being introduced or run Integrated firewall: blocks inbound and outbound TCP/UDP traffic; administrator can block traffic per port, per protocol, per IP address or range Maintain compliance by enforcing security policies on clients and servers Buffer overflow protection Real-time File Integrity Monitoring detection on AIX, Windows, and Linux.
Policies
Protection against buffer overflow and memory-based attacks Out-of-the-box operating system hardening External device protection Administrative privilege de-escalation
Log consolidation for easy search, archival, and retrieval Advanced event analysis and response capabilities File and registry protection and monitoring
Policies configured with easy enable or disable style options Includes application policies for Microsoft interactive applications
Management console
Central management console lets administrators create and deploy policies, manage users and roles, view alerts, and run reports. Features include the following: Configure agent properties to determine how agents communicate with the management server and which events agents send to the management server Customize policy options to increase or decrease restrictions enforced by a policy Import and export custom and third-party policies
Introducing Symantec Critical System Protection About policies, agents, events, and reports
15
Agent
Agents enforce policy on the endpoint. Features include the following: Control behavior by detecting and preventing specific actions that an application or user might take Configure polling interval, real-time notification, log consolidation, log rotation Apply policies to agents and groups agents
Management server
Provides secure communication to and from agents and the management console. Features include the following: Agents automatically register with the management server during installation Sends configuration changes to agents
Platform support
Symantec Critical System Protection offers broad platform support for the following operating systems:
Microsoft Windows Sun Solaris Red Hat Enterprise Linux SUSE Enterprise Linux IBM AIX Hewlett-Packard HP-UX Hewlett-Packard Tru64 UNIX
See the Symantec Critical System Protection Platform and Feature Matrix for more information on supported operating systems and agent features supported on each operating system. See System requirements on page 20.
16
You use the management console to manage agent policies and customize how agents communicate with the management server. Agents report events to the management server for storage and are viewed in the management console. Agent log rules control the events that are logged for that agent. Logged data includes event date and time, event type, importance rating, and any prevention action performed. Symantec Critical System Protection includes queries and reports with charts, graphs, and tables that provide detailed and aggregated summary data about events, agents, and policies. You can also create your own queries and reports.
Installation Guide Administration Guide Prevention Policy Reference Guide Detection Policy Reference Guide Agent Guide Release Notes Platform and Feature Matrix
Table 1-1 lists additional information that is available from the Symantec Web sites.
17
Public Knowledge http://www.symantec.com/business/support/ Base Releases and updates Manuals and other documentation Contact options Virus and other http://securityresponse.symantec.com threat information and updates Product news and http://www.symantec.com/business/critical-system-protection updates Business Critical Services Web access https://www-secure.symantec.com/platinum/
18
Chapter
About planning the installation About network architecture and policy distribution System requirements Disabling Windows XP firewalls About using firewalls with Symantec Critical System Protection About name resolution About IP routing About intrusion prevention About simple failover About log files What to do after installation
20
You can install a management server and management console, along with a few agents, and become familiar with Symantec Critical System Protection operations. When you are ready to roll out policies to your production environment, you can roll out different policies that are based on computing needs, and prevention and detection levels. Areas where computing needs and prevention and detection levels might differ include the following:
Local workstations Remote annex workstations Computers that run production databases Computers that are located in demilitarized zones (DMZ) such as Web servers, mail proxy servers, public DNS servers Virtualized environment
Prevention policies pushed to local and remote workstations would most likely be less restrictive than prevention policies pushed to production databases and DMZ servers. Detection policies pushed to local workstations, production databases, and DMZ servers would also differ. Detection policies pushed to production databases and DMZ servers are more likely to offer more signatures than policies pushed to workstations. You can distribute different policies to different computers by creating agent groups with the management console and then associating the agents with one or more groups during agent installation. You first create the groups using the management console, set the different policies for the groups, and then associate the agents with the groups during installation. It is not necessary, however, to associate an agent with a group during installation. You can perform this operation after installation.
System requirements
System requirements fall into the following categories:
21
.Net 2.0 Framework or later This is required for installing or upgrading the Symantec Critical System Protection manager and evaluation database on supported Windows operating systems. You can download .Net 2.0 Framework or later for 32- and 64-bit Windows operating system. Windows Installer 2.0 or higher This is required for installing or upgrading the Symantec Critical System Protection manager on supported Windows operating systems.
Solaris packages
The agent installation checks for the presence of Solaris system packages. The following core system packages are required for computers running Solaris 8.0, Solaris 9.0, and Solaris 10.0 operating systems:
SUNWcar Core Architecture, (Root) SUNWkvm Core Architecture, (Kvm) SUNWcsr Core Solaris, (Root) SUNWcsu Core Solaris, (Usr) SUNWcsd Core Solaris Devices SUNWcsl Core Solaris Libraries SUNWloc System Localization
The following extended system packages are required for computers running Solaris 10.0 operating systems:
SUNWxcu4, XCU4 Utilities Utilities conforming to XCU4 specifications (XPG4 utilities) SUNWesu Extended System Utilities
22
VMware support
Symantec Critical System Protection supports the following VMware software:
VMware Workstation v5.0.0 and v5.5.4 VMware ESX v3.0.1 and v3.0.2 VMWare ESX 3.5 Host VMWare ESX 4.1 Host
The following Symantec Critical System Protection agents are supported on VMware guest operating systems:
Windows NT Server Windows 2000 Professional/Server/Advanced Server Windows XP Professional Windows Server 2003 Standard/Enterprise 32-bit SUSE Enterprise Linux 8, 9, 10 Red Hat Enterprise Linux ES 3.0, 4.0 Solaris 10
Hardware support includes x86, EM64T, and AMD64. VMware must also support this hardware.
Hardware requirements
Table 2-1 lists the recommended hardware for the Symantec Critical System Protection components. Table 2-1 Component
Management console
23
AMD64
Agent
100 MB free disk space (all platforms) 256 MB RAM Pentium III 1.2 GHz Sun SPARC 450 MHz Sun SPARC32, SPARC64 Hewlett-Packard PA-RISC 450 MHz IBM PowerPC (CHRP) 450 MHz x86 Solaris 8, 9, 10 Solaris 10 HP-UX on PARISC
AIX Windows NT Server Windows Server 2003 32-bit Windows XP Professional Red Hat Enterprise Linux ES 3.0, 4.0 SUSE Linux Enterprise 8, 9, 10 Sun Solaris 10 (IDS only in non-global zone)
EM64T
Windows Server 2003 Standard/Enterprise x64 Red Hat Enterprise Linux ES 3.0, 4.0 SUSE Linux Enterprise 8, 9, 10 Sun Solaris 10 (IDS only in non-global zone)
24
IA32 IA64
SUSE Linux Enterprise 8 HP-UX on Itanium 2 Red Hat 4.0 (IDS only)
Alpha
Tru64 5.1B-3
See the Symantec Critical System Protection Platform and Feature Matrix to determine the specific operating system versions supported and the specific agent features for each operating system version.
1 2
On the Windows XP taskbar, click Start > Control Panel. In the Control Panel window, double-click Network Connections.
Planning the installation About using firewalls with Symantec Critical System Protection
25
3 4
In the Network Connections window, right-click the active connection, and then click Properties. On the Advanced tab, under Internet Connection Firewall, uncheck Protect my computer and network by limiting or preventing access to this computer from the Internet.
1 2 3 4 5
On the Windows XP taskbar, click Start > Control Panel. In Control Panel, double-click Network Connections. In the Network Connections window, right-click the active connection, and then click Properties. On the Advanced tab, under Internet Connection Firewall, click Settings. In the Windows Firewall window, on the General tab, uncheck On (recommended).
The management server uses UDP port 1434 to query the MS SQL Server system and find the port used by the Symantec Critical System Protection instance. Once the MS SQL Server system returns the port for the Symantec Critical System Protection instance, the management server then connects to the instance using that port. Thus, your firewall must allow traffic from the
26
management server to the MS SQL Server system on UDP port 1434 and on the TCP port used by the Symantec Critical System Protection instance. You can get more information about MS SQL Server's use of ports at http://support.microsoft.com/default.aspx?scid=kb;EN-US;823938.
The bulk log transfer feature of the Symantec Critical System Protection agent is implemented by the bulklogger.exe. If you have a host-based firewall that allows specific programs to access the Internet, you must allow bulklogger.exe as well as SISPISService.exe to access the Internet. The bulklogger.exe program uses the same ports as SISIPSService.exe. If you do not use the bulk log transfer feature, bulklogger.exe will not run.
Table 2-2 lists the services that you can permit to send and receive traffic through your firewalls. Table 2-2 Component
Management console
Traffic
Communicates with the management server using remote TCP ports 4443, 8006, and 8081. Communicates with the management console using local TCP ports 4443, 8006, and 8081. Communicates with the agents using local TCP port 443. Communicates with remote production SQL servers using the remote TCP port that the SQL server uses for the server instance.
Management server
SISManager.exe
Agent
SISIPSService.exe sisipsdaemonbulklogger.exe
Communicates with the management server using local TCP port 2222, and remote TCP port 443.
27
About IP routing
As bastion hosts, firewalls traditionally incorporate some form of network address translation (NAT) between the two networks that the firewall bridges. For example, the management server may be on an internal network while the Agents are in a DMZ network, with a firewall between the two networks. Typically, the internal network IP addresses are hidden from the DMZ network, and are not routable from the DMZ network. To allow the agents in the DMZ network to communicate with the management server on the internal network, use a DMZ IP address to represent the management server. Then, configure the firewall or router to forward requests for this IP address and port to the real, internal IP address of the management server. Open the agent port only if the agents are in a DMZ. Finally, configure the name database on the DMZ network to return the DMZ IP address for the management server instead of the internal IP address.
28
Symantec Critical System Protection supports intrusion prevention on computers that run Windows, Solaris, AIX, and Linux operating systems.
When the IPS Service starts up, it uses the first server in the ordered list of management servers. The first server in the ordered list is considered the primary management server; the remaining servers are alternate servers. The IPS Service uses server #1 as long as communication with the server is successful. At startup, the IPS Service always uses the first server in the ordered list of management servers, regardless of which server was in use when the IPS Service was shut down. When the ordered list of management servers changes, the IPS Service immediately attempts to connect to the first server in the new list. When communication with a server fails, the IPS Service uses the next server in the ordered list of management servers. When communication with the last server fails, the IPS Service uses the first server in the list. The IPS Service loops through the ordered list of management servers indefinitely. When the IPS Service switches to a new management server, it logs the action. Once the IPS Service fails away from the first server in the ordered list, it periodically checks if server #1 is back, based on the fail back interval. See About the fail back interval on page 29. When the fail back interval expires, the IPS Service checks if server #1 is available. If server #1 is available, the IPS Service starts using it immediately.
29
If server #1 is not available, the IPS Service continues to use the current alternate server; the IPS Service does not traverse the entire ordered list of management servers. Simple failover with static load balancing works as described in the following example:
Suppose you have two Tomcat servers pointing to a single database, and two agents. You initially configure Agent1 with a management server list of Tomcat1, Tomcat2. You initially configure Agent2 with a management server list of Tomcat2, Tomcat1. After installation completes, Agent1 should be talking to Tomcat1, and Agent2 should be talking to Tomcat2. Take Tomcat1 off the network. Agent1 should fail talking to Tomcat1 and switch to Tomcat2. Now both agents are talking to Tomcat2. Put Tomcat1 back on the network. Wait longer than the fail back interval. Agent1 should fail back to Tomcat1. Agent2 continues to use Tomcat2. Everything is back to the initial state; both agents should be communicating successfully with their original Tomcat servers.
30
If you are installing Symantec Critical System Protection for the first time, you can provide the list of primary and alternate management servers during agent installation. If you are upgrading to Symantec Critical System Protection 5.1.1 or higher, you provide the list of primary and alternate management servers using the CSP_Agent_Diagnostics detection policy or the agent config tool. To use simple failover, you must upgrade the management server, management console, and agent to version 5.1.1 or higher. See Migrating legacy installations of Symantec Critical System Protection on page 101.
The primary and alternate management server host names or IP addresses configured for a single agent must be Tomcat servers that talk to a single Symantec Critical System Protection database. Using multiple databases can result in unexpected agent behavior. The primary and alternate management servers must use the same server certificate and agent port.
Default location
Windows:Program Files\Symantec\Critical System Protection\Agent\scsplog\ UNIX:/var/log/scsplog/
Applying policies and configuration settings Communication with the management server
31
SISIDSEvents*.csv This log file contains all events Windows:Program recorded by the Symantec Critical Files\Symantec\Critical System System Protection agent. Protection\Agent\scsplog\ The asterisk in the file name represents a version number. UNIX:/var/log/scsplog/
Table 2-4 lists the management server log files. Table 2-4 File name
sis-agent.*.log
Default location
Windows:Program Files\Symantec\Critical System Protection\Server\Tomcat\logs
sis-alert.*.log
This log file is used for alert activity. The asterisk in the file name represents a version number.
sis-console.*.log
This log file is used for console activity. The asterisk in the file name represents a version number.
sis-server.*.log
This log file is used for general server messages. The asterisk in the file name represents a version number.
32
Server Windows \SISManagerSetup.log Console \SISConsoleSetup.log Agent \SISAgentSetup.log /var/log/scsplog/ agent_install.log Unix
Chapter
About installing Symantec Critical System Protection on Windows About installing a database linked to a SQL Server instance Configuring the temp environment variable Installing the management server Installing and configuring the management console Installing a Windows agent Silent agent installation Downloading and importing policy source Uninstalling Symantec Critical System Protection Temporarily disabling Windows agents Reinstalling Windows agents
34
Installing Symantec Critical System Protection on Windows About installing Symantec Critical System Protection on Windows
You can install the management console and management server on the same computer or on separate computers. You can install agents on any computer. All computers must run a supported operating system. The management server and management console are supported on Windows operating systems. Note: The installation directory names for the management console and management server must contain printable ASCII characters only. Multi-byte, double-byte, hi-ASCII and non-printable ASCII characters are not supported.
Installing Symantec Critical System Protection on Windows About installing Symantec Critical System Protection on Windows
35
(Agent only) For silent installs, set the ENABLE_BYPASS_CHECKS variable to a nonzero value. For interactive installs, the presence of the file scsp-check-bypass.txt, either in the installer directory or %temp% folder will confirm the bypass enabling.
The Windows installation kit does not remove the scsp-check-bypass.txt file upon successful installation. You can bypass the following checks when installing the Symantec Critical System Protection agent:
Agent install disk space checks that are performed apart from Windows Installer (MSI) engine Service user account (allow domain users or local users even though the installer can not confirm the required rights and privileges) Existence of AppFire 4.5
You can bypass the following checks when installing the Symantec Critical System Protection management server:
Existence of AppFire 4.5 Disk space checks User privilege and rights check for service user account Microsoft Data Access (MDAC) version
36
Installing Symantec Critical System Protection on Windows About installing a database linked to a SQL Server instance
Do not accept the default instance name. Use SCSP (the default when you install Symantec Critical System Protection management server), or some other name. Type the same name when installing Symantec Critical System Protection management server. A database named scspdb, the default, will be created in this instance when you install Symantec Critical System Protection management server. Set authentication configuration to Mixed Mode (Windows authentication and SQL Server authentication). Set the sa password when you set Mixed Mode authentication. You will type this password when you install Symantec Critical System Protection management server.
After you install the instance of SQL Server, you must do the following:
Installing Symantec Critical System Protection on Windows About installing a database linked to a SQL Server instance
37
Select to authenticate using SQL Server credentials. Register the instance. Registering the instance also starts the instance.
When you register the instance of SQL Server, you must do the following:
Set the authentication mode to SQL Server authentication. Configure the connection option to log on automatically through SQL authentication with the sa account, and type the sa password. If registration fails due to authentication failure, display the properties available from the server messages dialog box, and type the sa password again.
Use the networking utility to verify that NamedPipes and TCP/IP are enabled protocols. If they are not enabled, enable them.
You are then ready to install Symantec Critical System Protection management server.
38
Installing Symantec Critical System Protection on Windows Configuring the temp environment variable
1 2 3 4
At a command prompt, type set, and then press Enter. Write down the value that appears for TEMP. Check the disk space for the volume that is specified for TEMP. If the volume does not contain enough disk space, in a command prompt, type the following command to change the volume and directory:
set temp=<volume>.\<directory path>
Press Enter.
Evaluation installation that runs SQL Server 2005 Express on the local system You can install an evaluation installation of SQL Server 2005 Express. The CD installs the server and database automatically.
Installing Symantec Critical System Protection on Windows Installing the management server
39
Evaluation installation that uses existing MS SQL instance You can install an evaluation installation on SQL Server. The SQL Server instance must exist and be running before you perform the installation. The SQL Server can be local or remote. Production installation with Tomcat and database schema You can install a production installation that installs Tomcat and creates the database schema. This option installs on SQL Server. The SQL Server instance must exist and be running before you perform the installation. The SQL Server can be local or remote. Tomcat component only You can install a production installation that only installs the Tomcat component, and points to a remote database. This option requires that you provide the file paths to a server.xml file and a server-cert.ssl file from an installed management server.
Warning: The management server installation makes network connections to populate both the evaluation and production databases. For local installations, these connections are internal. Quite often, host-based firewalls either block these connections or display messages that prompt you to decide whether to allow the connections. In both situations, the connections time out and the database is not set up correctly. Before starting the management server installation, do one of the following:
Permit all programs to initiate connections on port 1433 or your site-specific SQL Server port. Several programs connect to the database during the installation process. Disable all host-based firewalls on the management server computer and on the database server if it is on a remote computer. You can enable the firewalls after installation completes.
40
Installing Symantec Critical System Protection on Windows Installing the management server
Description
Select the type of installation. If you install a database on SQL Server, the instance must be running. The Install Tomcat Component Only option requires that you provide the file path to the following files from an installed management server:
Production installation: Install Tomcat and create the database schema Install Tomcat Component ONLY
server.xml server-cert.ssl
The port that is used to communicate with the agent. If you install on a computer that runs a Web server, you must either stop the Web server from running permanently, or enter a different port number. This number maps to the Agent Port number that is used when installing the agent. See See About the installation settings and options on page 54. See See About port mapping on page 34.
Installing Symantec Critical System Protection on Windows Installing the management server
41
Description
The port that is used to communicate with the management console. This number maps to the Port number that is used when configuring the management console. See See Configuring the management console on page 50. See See About port mapping on page 34.
8006
The port that is used to shut down the management server. The port that is used to administer the management server. This number maps to the Admin Port number that is used when configuring the management console. See See Configuring the management console on page 50. See See About port mapping on page 34.
8081
The directory in which to install the SQL Server 2005 Express server.
SQL Eval: NA SQL Prod: NA The directory in which to install the SQL Server 2005 Express database.
SQL Server 2005 C:\Program Express Data Path Files\Symantec\Critical System Protection\Server You have the following options:
42
Installing Symantec Critical System Protection on Windows Installing the management server
Host name
The name of the SQL Server instance. The instance must be running.
sa Username
The user name for the SQL Server built-in sa account. You can accept the default and proceed with the normal installation, or you can specify the password for a privileged user account. The password that is associated with the database sa account. The password must be 8 to 19 characters long, not begin with _ and contain at least two two-letter characters. The password must contain only letters, numbers, #, @, and _. The password cannot contain =. If you install a SQL database, you must type the same sa password that is used on the SQL Server.
sa password
none You have the following options: SQL Eval: Must match existing password SQL Prod: Must match existing password
Installing Symantec Critical System Protection on Windows Installing the management server
43
Description
The name of the SQL Server instance. If you install to a production database, the instance name must exist. This option is used by production installation, install Tomcat and create the database schema. The option is for use with international operating systems.
enabled
The name of the account that is used to administer the database. The installation creates this account and password.
none
The password that is associated with the database owner user You have the following options: account, which is used for SQL Eval: hard-coded to the sa installations and upgrades. password that you type The password must be 8 to 19 SQL Prod: variable characters long, not begin with _ and contain at least two two-letter characters. The password must contain only letters, numbers, #, @, and _. The password cannot contain =. scspdba You have the following options:
The name of the account that is used to access the database with read-only guest privileges.
44
Installing Symantec Critical System Protection on Windows Installing the management server
Description
The password that is associated with the database guest user account. The password must be 8 to 19 characters long, not begin with _ and contain at least two two-letter characters. Also, the password must contain only letters, numbers, #, @, and _. The password cannot contain =.
Installing evaluation installation that runs SQL Server 2005 Express on the local system
This evaluation installation option installs a management server that runs a local SQL Server 2005 Express evaluation database. Before performing the installation, you should note the following:
The management server installation installs the server and database automatically. During the management server installation, you must create and enter a password that will be associated with the database sa account.
To install evaluation installation that runs SQL Server 2005 Express on the local system
1 2 3 4 5
Insert and display the installation CD, and then double-click server.exe. In the Welcome panel, click Next. In the License Agreement panel, select I accept the terms in the license agreement, and then click Next. In the Installation Type panel, click Evaluation Installation, click Install SQL Server 2005 Express on the Local System, and then click Next. In the Destination Folder panel, change the folder if necessary, and then click Next. The directory name must contain printable ASCII characters only. Multi-byte, double-byte, hi-ASCII, and non-printable ASCII characters are not supported.
Installing Symantec Critical System Protection on Windows Installing the management server
45
In the Server Configuration panel, accept or type new port values, and then click Next. If you enter port numbers that are in use, error messages appear until you enter port numbers that are not in use.
In the Database Selection panel, change the default server and database directory locations if necessary. The directory name must contain printable ASCII characters only. Multi-byte, double-byte, hi-ASCII, and non-printable ASCII characters are not supported.
In the Database Selection panel, in the Password and Confirm Password boxes, type the password that will be associated with the database sa account, type the password again to confirm, and then click Next. In the Ready to Install the Program panel, click Install.
Your SQL Server instance must exist and be running before you start the installation. The sa account must already exist and you must provide the accurate password for the sa account during the management server installation.
1 2 3 4 5
Insert and display the installation CD, and then double-click server.exe. In the Welcome panel, click Next. In the License Agreement panel, select I accept the terms in the license agreement, and then click Next. In the Installation Type panel, click Evaluation Installation, then click Use an Existing MS SQL Instance, and then click Next. In the Destination Folder panel, change the folder if necessary, and then click Next. The directory name must contain printable ASCII characters only. Multi-byte, double-byte, hi-ASCII, and non-printable ASCII characters are not supported.
46
Installing Symantec Critical System Protection on Windows Installing the management server
In the Server Configuration panel, accept or type new port values, and then click Next. If you enter port numbers that are in use, error messages appear until you enter port numbers that are not in use.
In the Database Selection panel, specify the database parameters, and then click Next.
Host Name Type the IP address or fully qualified domain name of the SQL Server.
Database Instance Type the name of the existing SQL Server instance on which you want to install the database. sa Privileged User Accept or change the sa user name. Password Confirm Password Type the same password that is used on the SQL Server, type the password again to confirm.
8 9
In the Ready to Install the Program panel, click Install. When the InstallShield Wizard Completed panel appears, click Finish.
Your SQL Server instance must exist and be running before you start the installation. The sa account must already exist and you must provide the accurate password for the sa account during the management server installation. All other accounts (owner, guest, and internal accounts) must not exist in the instance. The management server installation creates these accounts and aborts if it cannot create them. The database name that you enter into the management server installation must not exist in the instance. The management server installation creates these accounts and aborts if it cannot create them.
Installing Symantec Critical System Protection on Windows Installing the management server
47
1 2 3 4 5
Insert and display the installation CD, and then double-click server.exe. In the Welcome panel, click Next. In the License Agreement panel, select I accept the terms in the license agreement, and then click Next. In the Installation Type panel, click Production Installation, click Install Tomcat and create the database schema, and then click Next. In the Destination Folder panel, change the folder if necessary, and then click Next. The directory name must contain printable ASCII characters only. Multi-byte, double-byte, hi-ASCII, and non-printable ASCII characters are not supported.
In the Server Configuration panel, accept or type new port values, and then click Next. If you enter port numbers that are in use, error messages appear until you enter port numbers that are not in use.
In the Service User Configuration panel, do one of the following: Click Use Local System Account, and then click Next. Click Use an alternate Account, type a user name in the Username box using <domain>\<username> format, type the same password in the Password and Confirm Password boxes, and then click Next.
In the Database Selection panel, specify the database parameters, and then click Next.
Host Name Type the IP address or fully qualified domain name of the SQL Server.
Database Instance Type the name of the existing SQL Server instance on which you want to install the database. sa Privileged User Accept or change the sa user name. Password Confirm Password Type the same password that is used on the SQL Server, type the password again to confirm.
In the Database Configuration panel, specify the database parameters, and then click Next.
Database Name Type the name of the database to install.
48
Installing Symantec Critical System Protection on Windows Installing the management server
Under SCSP Database Owner, do the following: In the User name box, type the name of the SCSP Database Owner. In the Password and Confirm Password boxes, type the password that is associated with the SCSP Database Owner, and then type the password again to confirm.
To create an SCSP database guest user, do the following under SCSP Database Guest User:
Select Create a Guest User. In the User name box, type the guest User name. In the Password and Confirm Password boxes, type the password that is associated with the SCSP Database Guest User, and then type the password again to confirm.
10 In the Ready to Install the Program panel, click Install. 11 When the InstallShield Wizard Completed panel appears, click Finish.
These files are located in the default management server installation directory: You should do the following changes in the server.xml as mentioned below:
If the primary server is installed on 32-bit operating system and the secondary server is installed on 64-bit operating system or vice-versa, then you should modify the keystoreFile path for server-cert.ssl file in server.xml on Tomcat-only server. On 32-bit operating system, the keystoreFile path is C:\Program Files\Symantec\Critical System Protection\Server\server-cert.ssl and on 64-bit
Installing Symantec Critical System Protection on Windows Installing and configuring the management console
49
The URL for resources Database-Console and Database-Agent cannot contain localhost or 127.0.0.1 in the server.xml file on Tomcat-only server. You must use the IP address or the host name of the primary server.
C:\Program Files\Symantec\Critical System Protection\Server Note: If the management server database is on a Tomcat system instead of a dedicated system, you must specify the real IP (not localhost) for the initial installation. To install Tomcat component only
1 2 3 4 5 6
Insert and display the installation CD, and then double-click server.exe. In the Welcome panel, click Next. In the License Agreement panel, select I accept the terms in the license agreement, and then click Next. In the Installation Type panel, click Production Installation, click Install Tomcat component ONLY. In the Installation Type panel, specify the file paths to server.xml and server-cert.ssl from an installed management server, and then click Next. In the Destination Folder panel, change the folder if necessary, and then click Next. The directory name must contain printable ASCII characters only. Multi-byte, double-byte, hi-ASCII, and non-printable ASCII characters are not supported.
In the Service User Configuration panel, do one of the following: Click Use Local System Account, and then click Next. Click Use an alternate Account, type a user name in the Username box using <domain>\<username> format, type the same password in the Password boxes, and then click Next.
8 9
In the Ready to Install the Program panel, click Install. When the InstallShield Wizard Completed panel appears, click Finish.
50
Installing Symantec Critical System Protection on Windows Installing and configuring the management console
1 2 3 4
On the installation CD, double-click console.exe. In the Initial installation panel, click Next. In the License Agreement panel, select I accept the terms in the license agreement, and then click Next. In the Destination Folder panel, change the folder if necessary, and then click Next. The installation directory name must contain printable ASCII characters only. Multi-byte, double-byte, hi-ASCII, and non-printable ASCII characters are not supported.
5 6
In the Ready to Install the Program panel, click Install. When the InstallShield Wizard Completed panel appears, click Finish.
Installing Symantec Critical System Protection on Windows Installing and configuring the management console
51
Description
The name of the management server that you want to manage from the management console. This value is used for user interface identification purposes only, and appears on the Login window. The name can be any value.
Host
local host
The IP address or fully qualified host name of the management server computer that you want to manage from the management console. The Console Port number that was used during management server installation. See See Management server installation settings and options on page 39. See See About port mapping on page 34.
Port
4443
Admin port
8081
The Web server Administration Port number that was used during management server installation. See See Management server installation settings and options on page 39. See See About port mapping on page 34.
52
Installing Symantec Critical System Protection on Windows Installing and configuring the management console
Description
Check Use encrypted communications to use Secure Sockets Layer (SSL) X.509 certificate-based channel encryption for Symantec Critical System Protection. SSL X.509 certificate-based channel encryption secures communication between the management console and the management server, and between the agent and the management server. If you feel that your system provides adequate firewall security and you do not want to use SSL X.509 certificate-based channel encryption for Symantec Critical System Protection, uncheck Use encrypted communications. After you uncheck Use encrypted communications, you must edit the server.xml file, found on the management server, in the <Server_Install_Root>\tomcat\conf directory. See the Symantec Critical System Protection Administration Guide for instructions on editing server.xml.
Password
none
The password that is associated with the symadmin user name, which you create the first time you start the management console.
53
1 2 3 4 5 6 7
Click Start > Programs > Symantec Critical System Protection > Management Console. In the Login window, click the green plus sign icon. In the New Server Configuration panel, replace New Server with the name that you want to use to identify your server. In the New Server Configuration panel, specify the server configuration parameters, and then click OK. In the Login window, type symadmin in the User name box, select the new server that you added, and then click Login. In the Verify Server Certificate panel, select Always accept this certificate, and then click OK. In the Set Password panel, in the Password and Confirm Password boxes, type the password to associate with the symadmin user name, type the password again to confirm.
On the management server that will be used to manage the agent, locate the server installation directory and copy Agent-cert.ssl to removable media.
54
Optionally, you can copy the file from mapped network drives or network shares.
On the computer on which the agent will be installed, create a directory and then copy Agent-cert.ssl into the directory. The directory path name cannot contain spaces.
Description
The installation directory for the agent.
The installation directory prefix for the <prefix dir>/scsplogs subdirectory. The installation creates an scsplog folder under the folder that you specify.
Agent Name
Host name of agent computer The agent name. After installation, you can change the agent name using the management console.
Polling Interval
300 seconds
The interval that the agent uses to poll the management server for policy and configuration updates.
55
56
Notification port
2222
The port that is used to receive real-time notifications from the management server. You can change this port after installation using the management console to change the agent properties.
The IP address or fully qualified host name of the management server that will manage the agent.
57
Description
The Agent Port number that was used during management server installation. See See Management server installation settings and options on page 39. See See About port mapping on page 34.
none
An ordered list of optional alternate management servers used for failover. For each alternate management server, specify the IP address or fully qualified host name. Specify the servers in a comma-separated list. See About simple failover on page 28.
none
The directory location of the SSL certificate file, Agent-cert.ssl. The installation requires access to a copy of the SSL certificate file that was created during management server installation. The file is located in the management server installation directory. All primary and alternate management servers must use the same certificate file. See About the SSL certificate file on page 53.
58
Description
The name of an existing common configuration group for this agent to join. An agent is placed in the default common configuration group (named Common Configuration), unless you specify another configuration group that already exists in the management console. After installation, you can change the group assignment using the management console.
none
The name of an existing prevention configuration group for this agent to join. An agent is placed in the default prevention configuration group (named Configuration), unless you specify another configuration group that already exists in the management console. After installation, you can change the group assignment using the management console.
59
Description
The name of an existing prevention policy group for this agent to join. An agent is placed in the default prevention policy group (named Policy), unless you specify another policy group that already exists in the management console. After installation, you can change the group assignment using the management console.
none
The name of an existing detection configuration group for this agent to join. An agent is placed in the default detection configuration group (named Configuration), unless you specify another configuration group that already exists in the management console. After installation, you can change the group assignment using the management console.
60
Description
The name of an existing detection policy group for this agent to join. You can specify multiple groups using commas between the group names. You may optionally include the name of an existing detection policy domain in the group path/name. You may include the domain name with or without the group name. An agent is placed in the default Policy/Windows detection policy group, unless you specify another policy group that already exists in the management console. After installation, you can change the group assignment using the management console.
61
Description
The service user name account that registers services for the agent. Do one of the following: Select Use LocalSystem account to accept the default LocalSystem account. Select Use an alternate account to select a different account. In the Username box, type the user name for the alternate account. In the Password boxes, type the password twice. The alternate account must have Administrator privileges. If the account does not exist, it will be created. If a domain account is specified, type the user name in the format <domain>/<username>.
62
1 2 3 4 5
On the installation CD, double-click agent.exe. In the Welcome panel, click Next. In the License Agreement panel, select I accept the terms in the license agreement, and then click Next. In the Destination Folder panel, change the folders if necessary, and then click Next. In the Agent Configuration panel, accept or change the default settings, and then click Next. Ensure that Enable Intrusion Prevention is checked.
In the Management Server Configuration panel, in the Primary Management Server box, type the fully qualified host name or IP address of the primary server that is used to manage this agent. If you changed the Agent Port setting during management server installation, in the Agent Port box, type a port number that matches.
(Optional) In the Management Server Configuration panel, in the Alternate Management Servers box, type the fully qualified host name or IP address of the alternate servers that are used for failover for this agent. Type the servers in a comma-separated list.
In the Management Server Configuration panel, accept the directory for the SSL certificate Agent-cert.ssl, or click Browse to browse to and locate Agent-cert.ssl. Access to a copy of the SSL certificate Agent-cert.ssl is required to connect to the management server. All primary and alternate management servers must use the same certificate.
In the Management Server Configuration panel, click Next. the group names that you created with the management console. You may add multiple detection policy group names separated with commas. You may include the name of an existing detection policy domain in the group path/name.
10 (Optional) In the Agent Group Configuration panel, in the group boxes, type
11 In the Agent Group Configuration panel, click Next. 12 In the Service User Configuration panel, accept the default LocalSystem
account or specify an alternate account, and then click Next.
63
Note: Copying and pasting command lines into the command window can result in silent installation failure. If you copy and paste command lines into the command window, make sure that there are no line breaks or spaces in between command lines.
64
1 2 3
Insert the installation CD into your computer. Display a command prompt, and navigate to the agent installation directory. Type and run one of the following commands:
agent.exe ?
Description
Install silently Log all events except for the v argument (*), create a verbose log file (v), append to the existing log file (+), flush each line to the log (!), to a file named <log filename> that either exists or is created. If the path includes spaces, use quotation marks.
INSTALLDIR=<path> C:\Program Designate a custom path on the target computer where Files\Symantec\Critical <path> is the specified target directory. System If the path includes spaces, use quotation marks. Escape Protection\Agent the internal quotation marks, as in the following example: agent.exe /s /v"INSTALLDIR= \"E:\Program Files\....Symantec \System Critical Protection\Agent\ " -l*v+! c:\agent-install.log /qn"
65
Description
Whether or not to restart a computer after installation, where <val> is a valid argument. If REBOOT=<val> is not specified in the command line, the computer will not reboot. Valid arguments are as follows:
Force (prompts for restart) Suppress (prevents most restarts) ReallySuppress (prevents all restarts as part of the installation process)
Installation properties
Table 3-6 describes the Windows agent installation settings and options. Table 3-6 Setting
MANAGEMENT_ SERVER=<val>
Description
The IP address or fully qualified host name of th management server that will manage the agent. Required
none
An ordered list of alternate management servers f For each alternate management server, specify address or fully qualified host name. Specify the a comma-separated list. Optional See About simple failover on page 28.
PROTOCOL=<val> SSL_CERT_FILE=<val>
https none
The directory location of the SSL certificate file Agent-cert.ssl. Example: C:\Agent\Agent-cert.ssl See About the SSL certificate file on page 53. Optional
66
Description
ENABLE_BYPASS_CHECKS
Indicates whether to enable the bypass prerequisite c feature. To enable, set the variable to a nonzero valu Optional
NOTIFICATION_ENABLE =<val>
True
Indicates whether to enable notification, where <val> valid argument (True, False). Optional
AGENT_NAME=<name>
After installation, you can modify the agent name usin management console. Optional
AGENT_PORT=<val>
443
The Agent Port number that was used during manage server installation.
See See Management server installation settings an options on page 39. See See About port mapping on page 34. Optional LOG_DIR=<val> C:\Program The installation directory prefix for the <prefix Files\Symantec\Critical dir>/scsplogs subdirectory. System Optional Protection\Agent 300 seconds
POLLING_INTERVAL=<val>
The interval that the agent uses to poll the managem server for policy and configuration updates. Optional
67
Description
IPS_ENABLE=<val>
The switch for enabling or disabling intrusion p where <val> is a valid argument (True, False). Optional
When enabled, the prevention features of Syman System Protection are enabled for the agent. The are loaded on the agent computer, and the agen prevention policies from the management conso
If you disable intrusion prevention and want to e the future, you must run the sisipsconfig.exe to \Agent\IPS\bin directory with the -i option, and computer. The -i option toggles the intrusion pr service on and off.
The port that is used to receive broadcast alerts management server, where <val> is a valid port
This property is only used when NOTIFICATION is True. Optional COMMON_CONFIG_ GROUP=<val> Common Configuration
An agent is placed in the default common config group, unless you specify another configuration already exists in the management console.
After installation, you can change the group ass using the management console. Optional IPS_CONFIG_GROUP=<val> Configuration
An agent is placed in the default prevention con group, unless you specify another configuration already exists in the management console.
After installation, you can change the group ass using the management console. Optional
68
Description
The name of an existing prevention policy group for agent to join.
IPS_POLICY_GROUP=<val>
An agent is placed in the default prevention policy gr unless you specify another policy group that already in the management console.
After installation, you can change the group assignm using the management console. Optional IDS_CONFIG_GROUP=<val> Configuration
An agent is placed in the default detection configura group, unless you specify another configuration grou already exists in the management console.
After installation, you can change the group assignm using the management console. Optional IDS_POLICY_GROUP=<val> Windows
The name of an existing detection policy group for this to join. You can specify multiple groups using comma between the group names.
You can optionally include the name of an existing dete policy domain in the group path/name. You can includ domain name with or without the group name.
An agent is placed in the default Windows detection p group in the default Policy domain, unless you specif another domain/policy group that already exists in t management console.
After installation, you can change the group assignm using the management console. Optional
Installing Symantec Critical System Protection on Windows Downloading and importing policy source
69
Description
SERVICE_USER is the account that registers ser the agent. If you change the default of LocalSyste format <domain>\<user name>.
1 2 3 4
On the computer that runs the Symantec Critical System Protection management console, click Policies. Click LiveUpdate icon on the toolbar. In the LiveUpdate dialog box, click Check to check for source policy packs. In the LiveUpdate dialog box, select the source policy packs that you want to download and import into the management server database, and then click Install. In the LiveUpdate dialog box, click Finish.
70
Installing Symantec Critical System Protection on Windows Uninstalling Symantec Critical System Protection
Start the management console, and set the policy for the target agent to the Null prevention policy (sym_win_null_sbp). If the policy on the computer that runs the agent is not Null and permits policy override, use the policy override tool to disable policy prevention. See the Symantec Critical System Protection Policy Override Guide.
To uninstall an agent
1 2 3 4 5
Disable policy prevention on the agent computer. On the computer that runs the agent, click Start > Settings > Control Panel > Add/Remove Programs. Click Symantec Critical System Protection Agent, and then click Remove. Follow and complete the prompts until uninstallation completes. Restart the agent computer.
Installing Symantec Critical System Protection on Windows Uninstalling Symantec Critical System Protection
71
Browse the list of IDs. Locate the Symantec Critical System Protection agent application by looking at the properties in the right pane. Note the UinstallString string, and copy and modify it. For example: MsiExec.exe /X{3D24482F-98BD-48DD-AA62-8B24BFDE7329} /qn /l*v!+ C:\SISAgentUninstall.log The system restart is suppressed after the uninstallation. See Silent agent installation on page 63.
Start the management console, and set the policy for the target agent to the Null prevention policy (sym_win_null_sbp). If the policy on the computer that runs the agent is not Null and permits policy override, use the policy override tool to disable policy prevention. See the Symantec Critical System Protection Policy Override Guide.
1 2 3 4
Disable policy prevention on the agent computer. Click Start > Settings > Control Panel > Add/Remove Programs. Click Symantec Critical System Protection Management Console, and then click Remove. Follow and complete the prompts until uninstallation completes.
Start the management console, and set the policy for the target agent to the Null prevention policy (sym_win_null_sbp).
72
Installing Symantec Critical System Protection on Windows Temporarily disabling Windows agents
If the policy on the computer that runs the agent is not Null and permits policy override, use the policy override tool to disable policy prevention. See the Symantec Critical System Protection Policy Override Guide.
1 2 3 4 5
Disable policy prevention on the agent computer. Click Start > Settings > Control Panel > Add/Remove Programs. Click Symantec Critical System Protection Management Server, and then click Remove. Follow and complete the prompts until uninstallation completes. (Optional) Do one of the following: If you installed the evaluation database, click Microsoft SQL Server 2005 Express, and then click Remove. If you installed the evaluation or production database on SQL Server, drop the database that you created during installation, which is scspdb by default.
6 7 8 9
Follow and complete the prompts until uninstallation completes. Delete the C:\Program Files\Symantec\Critical System Protection\Server directory. Delete the file in C:\Program Files\Common Files\Symantec Shared\SCSP directory. Restart the computer.
Temporarily disabling Windows 2000, Windows Server 2003, or Windows XP Professional agents
To temporarily disable agents that run on Windows 2000, Windows Server 2003, or Windows XP Professional, you must boot the agent computer in safe mode and then reset the prevention policy to the built-in Null policy. Warning: You should perform these procedures only in emergency situations.
Installing Symantec Critical System Protection on Windows Temporarily disabling Windows agents
73
Boot the agent computer in safe mode. Refer to your Microsoft Windows documentation for instructions on booting in safe mode.
1 2
On the agent computer, open a command prompt. At a command prompt, type the following command, and then press Enter:
sisipsconfig -r -----------------------------------------------Agent Configuration Tool version 5.0.0.240 -----------------------------------------------The agent will now use the built-in policy c:\>
Reboot the agent computer, and then start the management console. In the management console, on the Assets page, the agent is marked with an exclamation point (!) to indicate a policy error. When you select the agent, the following message appears in the Details pane, on the Policies tab: ! Policy Errors: ** Policy error has occurred at 17-Nov-2005 05:55:56 EST Driver is using the built-in policy and not the assigned policy.
In the management console, apply the desired policy to the agent, and then give appropriate permissions to the desired programs.
74
or
agent-windows-nt.exe /s /v"/qn /l*v!+ %temp%\SISAgentSetup.log"
See Silent agent installation on page 63. See Unattended Windows agent migration on page 102.
Chapter
About installing UNIX agents Installing an agent in verbose mode Installing an agent in silent mode Uninstalling agents using package commands Disabling and enabling UNIX agents Monitoring and restarting UNIX agents Troubleshooting agent issues
UNIX agents do not support IP aliases. If your network card is bound to more than one IP address, the agent uses the first IP address on the network card. You must install UNIX agents as root. UNIX agents require root privileges to run. Directory path names cannot contain spaces. If you transfer UNIX agent installation .bin files from a Windows computer to a UNIX computer using FTP or some other file transport method, you must use binary transfer mode. Otherwise the installation files will be corrupted. If you are installing a Solaris, Linux, HP-UX, AIX, or Tru64 agent on a system that supports non-English character sets, the destination directory that you
76
choose for the agent must contain only ASCII characters. If you include any non-ASCII characters in the path, the installation will fail. Table 4-1 describes the agent installation settings. Table 4-1 Setting
Installation Directory
Description
The Installation directory prefix for the <prefix dir>/scspagent subdirectory. The directory path name cannot contain spaces.
Enable Real-time File Integrity Monitoring Protocol Primary Management Server Alternate Management Servers
https 127.0.0.1
Select https or http communications. The IP address or fully qualified host name of the primary management server that will manage the agent.
none
A comma-separated list of alternate management servers. For each alternate management server, specify the IP address or fully qualified host name. Optional See About simple failover on page 28.
/tmp/agent-cert.ssl The directory location of the SSL certificate file, agent-cert.ssl, obtained from the Symantec Critical System Protection management server installation directory. You must copy this file from the management server to the specified location before starting the installation. The directory path name cannot contain spaces. All primary and alternate management servers must use the same certificate file. Required
Agent Name
Host name of The name of the agent computer. agent computer After installation, you can change the agent name through the management console.
77
Description
Symantec Critical System Protection agent locale setting. The Agent Port number that was used during management server installation. See See Management server installation settings and options on page 39.
Agent Port
443
300 seconds
The interval that the agent uses to poll the management server for policy and configuration updates. The port that is used to receive alerts from the management server. You can also change this port after installation by using the management console to change the properties of the agent.
2222
Agent Notifications
Enable
When enabled, the agent listens on the Notification port to alerts from the management server. The alerts instruct the agent to immediately update to a new policy or configuration. This feature requires an unblocked notification port.
2323
This installation setting supports the policy override tool for Solaris and Linux. You use the policy override tool to override prevention policy enforcement. You can change this value during installation. When enabled, prevention is enabled on the agent. The name of an existing common configuration group for this agent to join. You use common configuration groups to apply communication and event logging parameters to agents. An agent is placed in the default common configuration group, unless you specify another configuration group that already exists in the management console. After installation, you can change the group assignment using the management console.
78
none
The name of an existing prevention policy group for this agent to join. You use prevention policy groups to apply prevention policies to agents. An agent is placed in the default prevention policy group, unless you specify another policy group that already exists in the management console.After installation, you can change the group assignment using the management console.
none
The name of an existing detection configuration group for this agent to join. You use detection configuration groups to apply detection parameters and log rules to agents. An agent is placed in the default detection configuration group, unless you specify another configuration group that already exists in the management console. After installation, you can change the group assignment using the management console.
79
Description
The name of an existing detection policy group for this agent to join. You can specify multiple groups by using commas between the group names. You can optionally include the name of an existing detection policy domain in the group path/name. You can include the domain name with or without the group name. An agent is placed in one of the default OS-specific detection policy groups in the default Policy domain, unless you specify another domain/policy group that already exists in the management console. After installation, you can change the group assignment using the management console.
You can use the bypass prerequisite checks feature to bypass the following prerequisite checks:
Verify that the installation kit is being run by the root user Perform OS platform and version checks Perform package dependencies checks Perform file system/disk space usage checks
When the bypass prerequisite checks feature is used, the installation kit displays all errors and warnings about prerequisite check failures. However, instead of terminating the installation, you may choose to continue. When you run the installation kit in interactive mode, you are asked if you want to continue. When you run the installation kit in silent mode, the prerequisite failure is logged and the installation continues.
80
The installation kit removes the /etc/scsp-check-bypass file upon a successful installation. Thus, creating the file enables the feature for one installation only. Warning: Use of the bypass prerequisite checks feature does not guarantee that the installation will be successful if a non-recoverable error is bypassed. Please use this feature with caution.
On the management server that will be used to manage the agent, locate the file named agent-cert.ssl in the \Server directory. On the computer on which the agent will be installed, create a directory and then copy the file agent-cert.ssl into the directory using FTP in binary mode or some other protocol.
The directory path name cannot contain spaces. To install an agent in verbose mode
1 2 3
Open a Terminal window and become superuser. Insert the installation CD and if necessary, mount the volume. Type and run the following command:
cd /mnt/cdrom
81
./agent-solaris10-sparc.bin
./agent-solaris10-x86.bin
agent-solaris11-sparc.bin
agent-solaris11-x86.bin
./agent-linux-rhel3.bin
./agent-linux-rhel4.bin
./agent64-linux-rhel4.bin
./agent-linux-rhel4-ia64.bin
Red Hat Enterprise Linux 5.1/5.2 (32-bit) ./agent-linux-rhel5.bin Red Hat Enterprise Linux 5.1/5.2 (64-bit) ./agent64-linux-rhel5.bin SUSE Enterprise Linux 8 SUSE Enterprise Linux 9 SUSE Enterprise Linux 10 (32-bit) SUSE Enterprise Linux 10 (64-bit) HP-UX on PA-RISC HP-UX on Itanium AIX
./agent-linux-sles8.bin
./agent-linux-sles9.bin
./agent-linux-sles10.bin
./agent64-linux-sles10.bin
./agent-hpux-hppa.bin
./agent-hpux-ia64.bin
./agent-aix.bin
82
Tru64 UNIX
./agent-tru64.bin
5 6 7
Please indicate whether you agree to the license agreement. Follow the prompts until the installation completes. On Solaris, AIX, or Linux, restart the computer if prevention was enabled.
Description
You can run the installer with the help switch to get a list of all the switches. Install Real-time File Integrity Monitoring.
-rtfim
-version
none
Displays the installation package version information. Installation does not occur. Installs silently without user prompts. Uses default settings if they are not set by installation options. Required
-silent
Interactive
-allowreboot
No reboot
Initiates an automatic restart after installation completes, if intrusion prevention is enabled after installation. Applies to IPS agents.
83
Description
Used with Solaris Jumpstart. In a Jumpstart environment, the system where the install takes place is booted from a temporary OS instance. The alternate root is necessary to ensure that files get installed in the correct place, relative to real OS instance, and not the temporarily booted instance.
-server=<addr>
127.0.0.1
-altservers=<server1,server2,...> none
A comma-separated list of alternate management servers. For each alternate management server, specify the IP address or fully qualified host name. Optional See About simple failover on page 28.
-prefix=<dir>
/opt/Symantec
The installation directory prefix for the <prefix dir>/scspagent subdirectory. The directory path name cannot contain spaces.
-logdir=<dir>
/var/log/scsplog
The installation directory prefix for the <prefix dir>/scsplog subdirectory. If the directory does not exist, it is created. Select https or http communications.
-protocol=<protocol>
https
84
Description
The directory location of the SSL certificate file, agent-cert.ssl, obtained from the Symantec Critical System Protection management server installation directory. You must copy this file from the management server to the specified location before starting the installation. The directory path name cannot contain spaces. All primary and alternate management servers must use the same certificate file. Required
-agentname=<name>
Host name of agent computer The name of the agent computer. After installation, you can change the agent name through the management console.
-locale=<locale setting>
POSIX
Symantec Critical System Protection agent locale setting. The name of an existing common configuration group for this agent to join. The group must exist and appear in the management console.
-comCfgGrp=<group>
none
85
Description
The name of an existing prevention configuration group for this agent to join. The group must exist and appear in the management console.Applies to IPS agents.
-ipsCfgGrp=<group>
-ipsPolGrp=<group>
none
The name of an existing prevention policy group for this agent to join. The group must exist and appear in the management console. Applies to IPS agents.
-idsCfgGrp=<group>
none
The name of an existing detection configuration group for this agent to join. The group must exist and appear in the management console.
86
Description
-idsPolGrp=<group>
The name of an existing The OS-specific group is one detection policy group for this agent to join. You can of the following: specify multiple groups by AIX using commas between the HP-UX group names. Linux You can optionally include Solaris the name of an existing Tru64 detection policy domain in the group path/name . You Windows can include the domain name with or without the group name. An agent is placed in one of the default OS-specific detection policy groups in the default Policy domain, unless you specify another domain/policy group that already exists in the management console. After installation, you can change the group assignment using the management console.
-agentport=<port>
443
The Agent Port number that was used during management server installation. See See Management server installation settings and options on page 39.
87
Description
The notification port that is used to receive broadcast alerts from the management server. You can also change this port after installation by using the management console to change the properties of the agent.
-notifyport=<port>
-notify=<0|1>
1 (Enable)
Indicates whether to enable notification. When enabled, the agent listens on the notification port to broadcast alerts from the management server. The broadcast alerts instruct the agent to immediately update to a new policy. This feature requires an unblocked notification port.
-poll=<sec>
300
The polling interval, in seconds, that the agent uses to poll the management server for policy updates. This installation setting supports the policy override tool for Solaris and Linux agents. The policy override tool overrides prevention policy enforcement. Use this switch to change the port value during silent install.
-svcport=<port>
2323
88
Description
Indicates whether to enable intrusion prevention for Solaris or Linux agents. When enabled, the prevention features of Symantec Critical System Protection are enabled for the agent. The IPS drivers are loaded on the agent computer, and the agent accepts prevention policies from the management console. To disable intrusion prevention, include the -disableIps installation option in the command string. If you disable intrusion prevention and want to enable it in the future, you must run the sisipsconfig.sh tool in the /scspagent/IPS directory with the -i option, and restart the computer. The -i option toggles the intrusion prevention service on and off. Symantec strongly recommends that you enable intrusion prevention.
Use the -silent option and other options to perform a silent installation. The following command string shows an example of a silent installation:
./agent-aix.bin -silent -prefix=/opt/Symantec -server=192.168.1.1 -cert=/var/tmp/agent-cert.ssl -agentport=443
89
Follow the procedures and steps that are used to install an agent in verbose mode, up to and including mounting the installation CD drive. See Installing an agent in verbose mode on page 80.
Type and run the following command after replacing <os> with agent-solaris-sparc.bin, agent-solaris10-sparc.bin, agent-solaris10-x86.bin, agent-solaris11-sparc.bin, agent-solaris11-x86.bin, agent-linux-rhel3.bin, agent-linux-rhel4.bin, agent64-linux-rhel4.bin, agent-linux-rhel4-ia64.bin, agent-linux-rhel5.bin, agent64-linux-rhel5.bin, agent-linux-sles8.bin, agent-linux-sles9.bin, agent-linux-sles10.bin, agent64-linux-sles10.bin, agent-hpux-hppa.bin, agent-hpux-ia64.bin, agent-aix.bin, and agent-tru64.bin :
./agent-<os>.bin -silent <additional options>
If you did not specify the -allowreboot option, restart the computer if intrusion prevention is enabled on Solaris, AIX, or Linux. If the agent fails to install correctly, review the /var/log/scsplog/agent_install.log file.
(Solaris/Linux) Start the management console, and set the policy for the agent to uninstall to the Null policy. The agent prevents you from installing and removing agent-related files if it is enforcing a restrictive prevention policy. If the Solaris or Linux agent is not communicating with the management console, disable the agent, and then continue with the uninstall. See Disabling and enabling Solaris agents on page 91. See Disabling and enabling Linux agents on page 93.
Open a Terminal window on the computer that runs the agent to uninstall, and become superuser.
90
On AIX, if the installation completes successfully, run the following command to restart the computer:
shutdown -Fr now
(Solaris, and Linux) If the uninstall completes successfully, run the following command to restart the computer:
init 6
On AIX, iIf the uninstall completes successfully, run the following command to restart the computer:
shutdown -Fr
Computers running HP-UX does not require restart. If you have enabled IPS or File Integrity Monitoring (FIM), you must restart the system.
91
1 2
Interrupt the boot cycle with a Stop-a or break sequence. At the ok prompt, type and run the following command:
boot -as
You must include the s switch in the boot command to boot into single-user mode. If you omit the s switch, then once the system boots into multi-user mode, it will enable the Symantec Critical System Protection driver.
When the boot sequence asks for the location of your /etc/system file, type one of the following:
/etc/system-pre-sisips /dev/null
92
1 2
Open a Terminal window and become superuser. Type and run the following commands:
/etc/init.d/sisipsagent stop /etc/init.d/sisidsagent stop
Type and run the following commands to rename the agent scripts, which temporarily break any symbolic links in the rc#.d startup scripts:
mv /etc/init.d/sisipsagent /etc/init.d/sisipsagentOFF mv /etc/init.d/sisidsagent /etc/init.d/sisidsagentOFF
1 2
Open a Terminal window and become superuser. Type and run the following commands, which rename the sisipsgent scripts:
mv /etc/init.d/sisipsagentOFF /etc/init.d/sisipsagent mv /etc/init.d/sisidsagentOFF /etc/init.d/sisidsagent
93
During the boot cycle, add the string SISIPSNULL to the boot options. The agent and kernel mode driver do not load, and the policy is not enforced.
94
1 2
Open a Terminal window and become superuser. Type and run the following commands:
/etc/init.d/sisipsagent stop /etc/init.d/sisidsagent stop
Type and run the following commands to rename the agent scripts, which temporarily break any symbolic links in the rc#.d startup scripts:
mv /etc/init.d/sisipsagent /etc/init.d/sisipsagentOFF mv /etc/init.d/sisidsagent /etc/init.d/sisidsagentOFF
1 2
Open a Terminal window and become superuser. Type and run the following commands, which rename the sisipsgent scripts:
mv /etc/init.d/sisipsagentOFF /etc/init.d/sisipsagent mv /etc/init.d/sisidsagentOFF /etc/init.d/sisidsagent
95
1 2
Open a Terminal window and become superuser. Type and run the following commands:
/sbin/init.d/sisipsagent stop /sbin/init.d/sisidsagent stop
1 2
Open a Terminal window and become superuser. Type and run the following commands:
/sbin/init.d/sisipsagent stop /sbin/init.d/sisidsagent stop
Type and run the following commands to rename the agent scripts, which temporarily break any symbolic links in the rc#.d startup scripts:
mv /sbin/init.d/sisipsagent /sbin/init.d/sisipsagentOFF mv /sbin/init.d/sisidsagent /sbin/init.d/sisidsagentOFF
96
1 2
Open a Terminal window and become superuser. Type and run the following commands, which rename the sisipsgent scripts:
mv /sbin/init.d/sisipsagentOFF /sbin/init.d/sisipsagent mv /sbin/init.d/sisidsagentOFF /sbin/init.d/sisidsagent
1 2
Open a Terminal window and become superuser. Type and run the following commands:
/etc/rc.sisipsagent stop /etc/rc.sisidsagent stop
97
1 2
Open a Terminal window and become superuser. Type and run the following commands:
/etc/rc.sisipsagent stop /etc/rc.sisidsagent stop
Comment the agent startup commands from the /etc/inittab file by adding a colon (:) at the front of the rcsisipsagent and rcsisidsagent lines. This causes the agents to not start at the next reboot.
1 2
Open a Terminal window and become superuser. Uncomment the agent startup commands from the /etc/inittab file by removing the colon (:) at the front of the rcsisipsagent and rcsisidsagent lines. This causes the agents to start at the next reboot. The lines should look like the following:
98
1 2
Open a Terminal window and become superuser. Type and run the following commands:
/sbin/init.d/sisipsagent stop /sbin/init.d/sisidsagent stop
1 2
Open a Terminal window and become superuser. Type and run the following commands:
/sbin/init.d/sisipsagent stop /sbin/init.d/sisidsagent stop
Type and run the following commands to rename the agent scripts, which temporarily break any symbolic links in the rc#.d startup scripts: If the machine is a member of a TruCluster, and the agent is installed on multiple cluster members (with a shared physical disk), perform the following actions to disable the agent on a single cluster:
cd /cluster/members/\{memb\}/sbin/init.d/ mv sisipsagent sisipsagentOFF mv sisidsagent sisidsagentOFF
If the machine not is a member of a TruCluster, is configured as a single member cluster, or if you want to disable the agent on all clusters, perform the following actions:
mv /sbin/init.d/sisipsagent /sbin/init.d/sisipsagentOFF mv /sbin/init.d/sisidsagent /sbin/init.d/sisidsagentOFF
99
1 2
Open a Terminal window and become superuser. Type and run the following commands, which rename the sisipsgent scripts: If the machine is a member of a TruCluster, and the agent is installed on multiple cluster members (with a shared physical disk), perform the following actions to re-enable the agent on a single cluster:
cd /cluster/members/\{memb\}/sbin/init.d/ mv sisipsagentOFF sisipsagent mv sisidsagentOFF sisidsagent
If the machine is a member of a TruCluster, is configured as a single member cluster, or if you want to re-enable the agent on all clusters, perform the following actions:
mv /sbin/init.d/sisipsagentOFF /sbin/init.d/sisipsagent mv /sbin/init.d/sisidsagentOFF /sbin/init.d/sisidsagent
100
AIX Crontab: /var/spool/cron/cronttabs/root Scripts: /etc/rc.sisidsagent, /etc/rc.sisipsagent HP-UX Crontab: /var/spool/cron/crontab.root Scripts: /sbin/init.d/sisidsagent, /sbin/init.d/sisipsagent Linux Crontab: /var/spool/cron/tabs/root Scripts: /etc/init.d/sisidsagent, /etc/init.d/sisipsagent, /etc/init.d/sisipsutil Solaris Crontab: /var/spool/cron/crontabs/root Scripts: /etc/init.d/sisidsagent, /etc/init.d/sisipsagent, /etc/init.d/sisipsutil Tru64 Crontab: /var/spool/cron/crontabs/root Scripts: /sbin/init.d/sisidsagent, /sbin/init.d/sisipsagent
Note: The scripts keep the last five core files generated in the agent's respective home directory (/opt/Symantec/scspagent/IDS/bin and /opt/Symantec/scspagent/IPS). To change this setting, modify the MAX_CORES=5 value in the scripts.
Chapter
Symantec Critical System Protection 5.0.0 (server, console, agent) Symantec Critical System Protection 5.0.1 (server, console, agent) Symantec Critical System Protection 5.0.5 (server, console, agent) Symantec Critical System Protection 5.1.0 (server, console, agent)
When migrating legacy installations for Symantec Critical System Protection, you should note the following:
If you upgrade the management server, then you must also upgrade the management console to the same version, and vice versa. The management server and management console must be the same version. Upgrading the agent is optional; you can use agent 5.0.0, agent 5.0.1, agent 5.0.5, or agent 5.1 with the latest version of the management server and management console. However, if you upgrade the agent to the latest version, then you must also upgrade the management server and management console. To use simple failover, you must upgrade the management server, management console, and agent to version 5.1.1 or higher.
102
Migrating to the latest version Migrating legacy installations of Symantec Critical System Protection
After upgrading, you use the CSP_Agent_Diagnostics detection policy or the agent config tool to specify the alternate management servers for the agent. See Specifying the management server list for an agent on page 103.
You cannot upgrade Symantec Critical System Protection 4.5. You must uninstall the Symantec Critical System Protection 4.5 software (server, console, and agent) and then install the latest version.
See Unattended Windows agent migration on page 102. Software migration is straightforward. When you install the Symantec Critical System Protection software (server, console, and agent), the installation kit automatically detects legacy installations and migrates the Symantec Critical System Protection software to the latest version.
or
Migrating to the latest version Migrating legacy installations of Symantec Critical System Protection
103
1 2 3 4
Log on to the management console as an administrator. In the management console, on the Policies page, in the Symantec folder, edit the CSP_Agent_Diagnostics policy. Enable Modify the management server list used by the agent, and then click Specify a comma-separated list of servers. In the Value box, type the primary management server, followed by any optional alternate management servers. You must specify the primary management server as the first server, followed by any optional alternate servers. Specify the IP address or fully qualified host name of each server in the list. All the servers in the list must use the same server certificate and agent port.
5 6
Click OK to save the policy changes. Apply the policy to the agent. The policy modifies the management server list immediately after being applied to the agent.
104
Migrating to the latest version Migrating legacy installations of Symantec Critical System Protection
7 8
In the management console, monitor the events on the Monitors page to determine if the management server list was modified. Clear the policy from the agent.
After upgrading to Symantec Critical System Protection agent 5.1.1 or higher, add alternate management servers to an agent's configuration Change the primary or alternate management servers used by an agent Change the fail back interval used by an agent Display the current management server list and fail back interval used by an agent Test the connection information for a management server
The agent config tool is located in the following directories on an agent computer:
On Windows, sisipsconfig.exe is located in the agent/ips/bin directory. On UNIX-based operating systems, the sisipsconfig tool is named sisipsconfig.sh. It is located in the agent/ips directory.
Table 5-1 lists the management server-related agent config tool commands:
Migrating to the latest version Migrating legacy installations of Symantec Critical System Protection
105
Windows: sisipsconfig -host Set the IP address or fully primary[,alternate1,alternate2,...] qualified host name of the primary management server and optional UNIX: sisipsconfig.sh host alternate management servers primary[,alternate1,alternate2,...] used by the agent. The list of management servers must comprise the primary management server, which is always the first server in the list. The remaining optional servers in the list are considered alternate servers. You may specify any number of optional alternate management servers. The management server list that you specify will replace the current management server list used by the agent. You cannot reorder or edit an existing management server list. The management server host names or IP addresses configured for a single agent must be Tomcat servers that talk to a single Symantec Critical System Protection database. Using multiple databases can result in unexpected agent behavior. The management servers must use the same server certificate and agent port.
106
Migrating to the latest version Migrating legacy installations of Symantec Critical System Protection
Description
Set the fail back interval, in minutes, for the agent to try to communicate with the primary management server. Once an agent fails away from the first (primary) server in the management server list, the agent periodically checks if the first server is back. The agent uses a fail back interval to determine when to perform this server check. Display all values that are configurable through the agent config tool. The configurable values include the management server list and fail back interval.
-view
-test
To test first server in list (default): Test the connection information for a server in the management Windows: sisipsconfig -t server list. UNIX: sisipsconfig.sh -t To test nth server in list:
1 2
At a command prompt, locate the folder that contains the agent config tool, and then navigate to that directory. At a command prompt, type sisipsconfig -host (Windows) or sisipsconfig.sh -host (UNIX), followed by a comma-separated list of server host names or IP addresses, and then press Enter.
Index
A
agent alternate management servers 29, 103104 fail back interval 29 failover 28, 79 groups common configuration 61, 69, 79, 88 detection configuration 61, 69, 79, 88 detection policy 61, 69, 79, 88 prevention configuration 61, 69, 79, 88 prevention policy 61, 69, 79, 88 hardware requirements 23 name of 61 primary management server 29, 103104 UNIX bypassing prerequisite checks 79 disabling and enabling 91 installing 75 uninstalling 89 Windows bypassing prerequisite checks 35 disabling 72 installing 54 reinstalling 74 unattended installation 63 uninstalling 70 agent config tool 104 AIX agents disabling and enabling 96 monitoring and restarting 99
H
HP-UX agents disabling and enabling 94 monitoring and restarting 99
I
installation components agent 12 management console 12 management server 12 MSI properties 65 planning 19 policy source 69 UNIX agent 75 Windows agent 54, 63 first install 34 Installer commands 64 management console 50 management server 38 MDAC requirements 37 removing Symantec Critical System Protection 69 SQL server 36 TEMP environment variable 38 InstallShield commands 63 intrusion prevention enabling for Linux agents 88 enabling for Solaris agents 88 enabling for Windows agents 61, 69 IP routing 27
C
CSP_Agent_Diagnostics policy 103
D
domain, detection policy 6162, 79, 88
F
fail back interval 29, 103, 106 failover 28, 79, 103
L
Linux agents disabling and enabling 93
108
Index
Linux agents (continued) monitoring and restarting 99 log files agent 30 management server 30
P
policy override tool 7071 policy source, downloading 69 polling interval 61, 88 port map 34 product overview agent software 14 computer security 14 management console 14 management server 15 platform support 15 policies 14
M
management console configuring 50 configuring server 53 hardware requirements 22 installing 50 setting up initial password 53 uninstalling 71 using encrypted communications 52 verifying server certificate 53 management server alternate 79, 103 database 71 evaluation installation 44 SQL 45 hardware requirements 23 installation settings 39 installation type 44 installing 38 primary 79, 103 production installation Tomcat and database schema 46 Tomcat only 48 uninstalling 71 Web server administration port 44 Web server shutdown port 44 management server certificate 61 MDAC requirements 37 migration legacy Symantec Critical System Protection software 101 providing scspdba password during management server upgrade 102 silent Windows agent migration 102 MSI installation commands 64 installation properties 65
R
reinstallation Windows agents 74
S
server.xml, editing 52 service user name 44 alternate account 61, 69 LocalSystem account 61, 69 Solaris agents disabling and enabling 91 monitoring and restarting 99 required system packages 21 SQL server evaluation installation 45 installation requirements 36 installing to existing 36 MDAC requirements 37 production database installation 46 SSL certificate 53, 61, 69, 88 SSL channel encryption 13 system requirements hardware agent 23 management console 22 management server 23
T
TEMP environment variable 38 Tru64 agents disabling and enabling 97
N
name resolution 26 network architecture 20 notification port 61, 69, 88
Index
109
U
uninstallation management console 71 management server 71 UNIX agents using package commands 89 Windows agents 70 UNIX agent installation 80 unattended installation options 82 upgrade Symantec Critical System Protection 101
V
VMWare support 22
W
Windows Installer, commands 64 Windows XP firewalls disabling 24 Internet connection firewall 24 Windows firewall 25