SlideShare ist ein Scribd-Unternehmen logo
1 von 34
MODULE 18: PERFORMING SERVER
AND DATABASE MANAGEMENT
1
MANAGING SEPM SERVERS
You can centrally manage all types of servers from the Admin page in
the Symantec Endpoint Protection Manager Console.
The Admin page, under View Servers, lists the following groupings:
■ Local Site

The console on the local site, databases, replication partners, such as
other consoles whose databases replicate, and optional Enforcers
■ Remote Sites
The console on any remote site, databases, replication partners, such
as other management servers whose databases replicate, and
optional Enforcers
2
MANAGING SEPM SERVERS
Starting and stopping the management server service
When you install Symantec Endpoint Protection Manager, the last step
of the Server Configuration Assistant includes a console check box
(selected by default).
If you leave the check box selected, the console automatically starts.
The management server runs as an automatic service.
If it did not start automatically, you can start it (and later stop it) by
using Services from the Administrative Tools from the Start menu.

3
MANAGING SEPM SERVERS
Deleting selected servers
You may have uninstalled multiple installations of Symantec Endpoint
Protection Manager.
However, they might still display in the management server Console.

In this situation, you must delete the connections.
The most common occurrence of this situation is when you use a
Microsoft SQL database with multiple management servers connected
to it.

If one management server is uninstalled, it still appears on the other
consoles. You need to manually delete the servers that are no longer
connected.
4
MANAGING SEPM SERVERS
Exporting and importing server settings
You may want to export or import settings for a Symantec Endpoint
Protection Manager. Settings are exported to a file in xml format.

5
MAINTAINING SERVER SECURITY
All of the servers for which you can establish a connection require you to
configure third-party passwords in the Symantec Endpoint Protection
Manager.
The third-party passwords are automatically saved in the database that
you created when you initially installed the management server.

You are typically prompted to provide the third-party password during
the configuration of the following types of servers:
■ Email servers
■ Directory servers
■ RSA servers
■ Proxy servers

6
MAINTAINING SERVER SECURITY
Granting or denying access to remote Symantec Endpoint
Protection Manager consoles
You can secure the main console by granting or denying access to
those computers on which a remote console is installed. By default, all
consoles are allowed access.
Administrators can log on to the main console locally or remotely from
any computer on the network.

7
MAINTAINING SERVER SECURITY
Digital certificates are the industry standard for authenticating and
encrypting sensitive data.
If you want to prevent the reading of information as it passes through
routers in the network, you need to encrypt the data.
Therefore you need a digital certificate that uses the HTTPS protocol.
As part of this secure procedure, the server identifies and
authenticates itself with a server certificate.

8
MAINTAINING SERVER SECURITY
Symantec uses the HTTPS protocol for the communication between all
the servers, clients, and optional Enforcers in a network.
You must also enable encryption on Symantec Endpoint Protection
Manager so that the server identifies and authenticates itself with a
server certificate.
If you do not enable this option, then the installation of a digital
certificate is not effective.

9
MAINTAINING SERVER SECURITY
The management server supports the following types of certificate:
■ JKS keystore file (.jks)
A Java tool that is called keytool.exe generates the keystore file. Symantec
supports only the Java Key Standard (JKS) format. The Java Cryptography
Extension (JCEKS) format requires a specific version of the Java Runtime
Environment (JRE). The management server supports only a JCEKS keystore file
that is generated with the same version as the Java Development Kit (JDK) on the
management server.
The keystore must contain both a certificate and a private key. The keystore
password must be the same as the key password. It is usually exported from
Internet Information Services (IIS).
■ PKCS12 keystore file (.pfx and .p12)

■ Certificate and private key file (DER and PEM format)
Symantec supports unencrypted certificates and private keys in the DER or the
PEM format. PKCS8-encrypted private key files are not supported.
10
COMMUNICATING WITH OTHER SERVERS
Establishing communication between Symantec Endpoint
Protection Manager and email servers
If you want to use email notification, you need to configure the email
server on Symantec Endpoint Protection Manager.

11
COMMUNICATING WITH OTHER SERVERS
Setting up a connection between an HTTP proxy server and
Symantec Endpoint Protection Manager
If you support an HTTP proxy server in the corporate network, you
need to connect the HTTP proxy server to Symantec Endpoint
Protection Manager.
You can use the HTTP proxy server to automatically download
LiveUpdate contents.

12
COMMUNICATING WITH OTHER SERVERS
Configuring Symantec Endpoint Protection Manager to use RSA
SecurID Authentication
If your corporate network includes an RSA server, you need to install
the software for an RSA ACE Agent on the computer on which you
installed Symantec Endpoint Protection Manager and configure it as a
SecurID Authentication client.

13
MANAGING ADMINISTRATORS
You can use administrator accounts to manage Symantec Endpoint
Protection Manager.
Administrators log on to the Symantec Endpoint Protection Manager
console to change policy settings, manage groups, run reports, and
install client software, as well as other management tasks.
The default account is a system administrator account, which provides
access to all features.
You can also add a more limited administrator account, for
administrators who need to perform a subset of tasks.

14
MANAGING ADMINISTRATORS
When you install the Symantec Endpoint Protection Manager, a
default system administrator account is created, called admin.
The system administrator account gives an administrator access to all
the features in Symantec Endpoint Protection Manager.
To help you manage security, you can add additional system
administrator accounts, domain administrator accounts, and limited
administrator accounts.
Domain administrators and limited administrators have access to a
subset of Symantec Endpoint Protection Manager features.

15
MANAGING ADMINISTRATORS
You choose which accounts you need based on the types of roles and
access rights you need in your company.
For example, a large company may use the following types of roles:

16
MANAGING ADMINISTRATORS
1.
An administrator who installs the management server and the
client installation packages. After the product is installed, an
administrator in charge of operations takes over. These administrators
are most likely system administrators.
2.
An operations administrator maintains the servers, databases,
and installs patches. If you have a single domain, the operations
administrator could be a domain administrator who is fully authorized
to manage sites.

17
MANAGING ADMINISTRATORS
3.
An antivirus administrator, who creates and maintains the Virus
and Spyware policies and LiveUpdate policies on the clients. This
administrator is most likely to be a limited administrator.
4.
A desktop administrator, who is in charge of security and
creates and maintains the Firewall policies and Intrusion Prevention
policies for the clients. This administrator is most likely to be a domain
administrator.

18
MANAGING ADMINISTRATORS
5.
A help desk administrator, who creates reports and has readonly access to the policies. The antivirus administrator and desktop
administrator read the reports that the help desk administrator sends.
The help desk administrator is most likely to be a limited administrator
who is granted reporting rights and policy rights.

19
MANAGING ADMINISTRATORS
Adding an administrator account
As a system administrator, you can add another system administrator,
administrator, or limited administrator.
As an administrator within a domain, you can add other administrators
with access rights equal to or less restrictive

20
MANAGING ADMINISTRATORS
Configuring the access rights for a limited administrator
If you add an account for a limited administrator, you must also
specify the administrator's access rights.
Limited administrator accounts that are not granted any access rights
are created in a disabled state and the limited administrator will not
be able to log on to the management server.

21
MANAGING ADMINISTRATORS
Changing the authentication method for administrator accounts
After you add an administrator account, the user name and password
are stored in the Symantec Endpoint Protection Manager database.
When the administrator logs on to the management server, the
management server verifies with the database that the user name and
password are correct.
However, if your company uses a third-party server to authenticate
existing user names and passwords, you can configure Symantec
Endpoint Protection Manager to authenticate with the server.

22
MANAGING ADMINISTRATORS
Changing the password for an administrator account
For security purposes, you may need to change the password for
another administrator's account.
The following rules apply to changing passwords:

■ System administrators can change the password for all
administrators.
■ Domain administrators can change the password for other domain
administrators and limited administrators within the same domain.
■ Limited administrators can change their own passwords only.

23
MANAGING THE DATABASE
Symantec Endpoint Protection supports both an embedded database
and the Microsoft SQL Server database.
If you have more than 5,000 clients, you should use a Microsoft SQL
Server database.
Symantec Endpoint Protection Manager automatically installs an
embedded database. The database contains information about
security policies, configuration settings, attack data, logs, and reports.

24
MANAGING THE DATABASE
After you install Symantec Endpoint Protection Manager, the
management server may start to slow down after a few weeks or a
few months.
To improve the management server performance, you may need to
reduce the database storage space and schedule various database
maintenance tasks.

25
MANAGING THE DATABASE
Scheduling automatic database backups
You can schedule database backups to occur at a time when fewer
users are logged on to the network.
You can also back up the database at any time.

26
MANAGING THE DATABASE
Scheduling automatic database maintenance tasks
After you install the management server, the space in the database grows
continually. The management server slows down after a few weeks or
months.
To reduce the database size and to improve the response time with the
database, the management server performs the following database
maintenance tasks:
■ Truncates the transaction log.
The transaction log records almost every change that takes place within
the database. The management server removes unused data from the
transaction log.

■ Rebuilds the index.
The management server defragments the database table indexes to
improve the time it takes to sort and search the database.
27
MANAGING THE DATABASE
Increasing the Microsoft SQL Server database file size
If you use the Microsoft SQL Server database, periodically check the
database size to make sure that the database does not reach its
maximum size. If you can, increase the maximum size that the
Microsoft SQL Server database holds.

28
MANAGING THE DATABASE
Exporting data to a Syslog server
To increase the space in the database, you can configure the
management server to send the log data to a Syslog server.
When you export log data to a Syslog server, you must configure the
Syslog server to receive the logs.

29
MANAGING THE DATABASE
Specifying how long to keep log entries in the database
To help control hard disk space, you can decrease the number of log
entries that the database keeps. You can also configure the number of
days the entries are kept.

30
MANAGING THE DATABASE
Clearing log data from the database manually
You can perform a manual log sweep after backing up the database,
if you prefer to use this method as part of routine database
maintenance.
If you allow an automatic sweep to occur, you may lose some log data
if your database backups do not occur frequently enough.
If you regularly perform a manual log sweep after you have
performed a database backup, it ensures that you retain all your log
data.
This procedure is very useful if you must retain your logs for a
relatively long period of time, such as a year. You can manually clear
the logs, but this procedure is optional and you do not have to do it.
31
DISASTER RECOVERY TECHNIQUES
Reinstalling or reconfiguring Symantec Endpoint Protection
Manager
If you need to reinstall or reconfigure the management server, you can
import all your settings by using a disaster recovery file.
You can reinstall the software on the same computer, in the same
installation directory.
You can also use this procedure to install an additional site for
replication.
The Symantec Endpoint Protection Manager creates a recovery file
during installation. The recovery file is selected by default during the
reinstallation process.
32
DISASTER RECOVERY TECHNIQUES
Generating a new server certificate
If you reinstall Symantec Endpoint Protection Manager on a different
computer, you must generate a new server certificate.
If the original computer is corrupted or you upgrade the management
server from a previous version, you must reinstall Symantec Endpoint
Protection Manager on a different computer.
To reinstall Symantec Endpoint Protection Manager on a different
computer, you install the management server as if for the first time,
rather than with the recovery file.

33
DISASTER RECOVERY TECHNIQUES
Restoring the database
If the database gets corrupted or you need to perform disaster
recovery, you can restore the database.
To restore the database, you must first have backed it up.

You must restore the database using the same version of Symantec
Endpoint Protection Manager that you used to back up the database.
You can restore the database on the same computer on which it was
installed originally or on a different computer.

The database restore might take several minutes to complete.

34

Weitere ähnliche Inhalte

Was ist angesagt?

Veeam Backup and Replication: Overview
Veeam  Backup and Replication: OverviewVeeam  Backup and Replication: Overview
Veeam Backup and Replication: Overview
Dudley Smith
 
FireWall
FireWallFireWall
FireWall
rubal_9
 

Was ist angesagt? (20)

Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Veeam Backup and Replication: Overview
Veeam  Backup and Replication: OverviewVeeam  Backup and Replication: Overview
Veeam Backup and Replication: Overview
 
Event management by using cloud computing
Event management by using cloud computingEvent management by using cloud computing
Event management by using cloud computing
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
Understanding the Event Log
Understanding the Event LogUnderstanding the Event Log
Understanding the Event Log
 
Cloud computing architectures
Cloud computing architecturesCloud computing architectures
Cloud computing architectures
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Program security
Program securityProgram security
Program security
 
Network Security Architecture
Network Security Architecture Network Security Architecture
Network Security Architecture
 
Secure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message SecuritySecure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message Security
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
FireWall
FireWallFireWall
FireWall
 
Cloud Application Development – The Future is now
Cloud Application Development – The Future is nowCloud Application Development – The Future is now
Cloud Application Development – The Future is now
 

Andere mochten auch

CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 
Computer services
Computer servicesComputer services
Computer services
Arz Sy
 
Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheet
aromal4frnz
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 course
Kenan Spahi
 

Andere mochten auch (16)

Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
Computer services
Computer servicesComputer services
Computer services
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 
Ccna cheat sheet
Ccna cheat sheetCcna cheat sheet
Ccna cheat sheet
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Packet Tracer 101 course
Packet Tracer 101 coursePacket Tracer 101 course
Packet Tracer 101 course
 

Ähnlich wie SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management

SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
Yaakub Idris
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
Hitachi ID Systems, Inc.
 
CHAPTER 26 WINDOWS SECURITY 26.1 FUNDAMENTAL
CHAPTER 26  WINDOWS SECURITY  26.1  FUNDAMENTAL CHAPTER 26  WINDOWS SECURITY  26.1  FUNDAMENTAL
CHAPTER 26 WINDOWS SECURITY 26.1 FUNDAMENTAL
EstelaJeffery653
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 
Administrators manual
Administrators manualAdministrators manual
Administrators manual
ScrumDesk
 
System Client Details
System Client DetailsSystem Client Details
System Client Details
SyAM Software
 

Ähnlich wie SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management (20)

Locking down a Hitachi ID Management Suite server
Locking down a Hitachi ID Management Suite serverLocking down a Hitachi ID Management Suite server
Locking down a Hitachi ID Management Suite server
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
 
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System Configuration
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System ConfigurationSolution Manager 7.2 SAP Monitoring - Part 3 - Managed System Configuration
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System Configuration
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
CHAPTER 26 WINDOWS SECURITY 26.1 FUNDAMENTAL
CHAPTER 26  WINDOWS SECURITY  26.1  FUNDAMENTAL CHAPTER 26  WINDOWS SECURITY  26.1  FUNDAMENTAL
CHAPTER 26 WINDOWS SECURITY 26.1 FUNDAMENTAL
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Installation Guide for ESM 6.8c
Installation Guide for ESM 6.8cInstallation Guide for ESM 6.8c
Installation Guide for ESM 6.8c
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Administrators manual
Administrators manualAdministrators manual
Administrators manual
 
Administrators manual
Administrators manualAdministrators manual
Administrators manual
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
 
Actor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active DirectoryActor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active Directory
 
How to install Microsoft Dynamics CRM 2011
How to install Microsoft Dynamics CRM 2011How to install Microsoft Dynamics CRM 2011
How to install Microsoft Dynamics CRM 2011
 
System Client Details
System Client DetailsSystem Client Details
System Client Details
 
dfasdfsdf
dfasdfsdfdfasdfsdf
dfasdfsdf
 

Mehr von Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
Dsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
Dsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
Dsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
Dsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
Dsunte Wilson
 

Mehr von Dsunte Wilson (20)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management

  • 1. MODULE 18: PERFORMING SERVER AND DATABASE MANAGEMENT 1
  • 2. MANAGING SEPM SERVERS You can centrally manage all types of servers from the Admin page in the Symantec Endpoint Protection Manager Console. The Admin page, under View Servers, lists the following groupings: ■ Local Site The console on the local site, databases, replication partners, such as other consoles whose databases replicate, and optional Enforcers ■ Remote Sites The console on any remote site, databases, replication partners, such as other management servers whose databases replicate, and optional Enforcers 2
  • 3. MANAGING SEPM SERVERS Starting and stopping the management server service When you install Symantec Endpoint Protection Manager, the last step of the Server Configuration Assistant includes a console check box (selected by default). If you leave the check box selected, the console automatically starts. The management server runs as an automatic service. If it did not start automatically, you can start it (and later stop it) by using Services from the Administrative Tools from the Start menu. 3
  • 4. MANAGING SEPM SERVERS Deleting selected servers You may have uninstalled multiple installations of Symantec Endpoint Protection Manager. However, they might still display in the management server Console. In this situation, you must delete the connections. The most common occurrence of this situation is when you use a Microsoft SQL database with multiple management servers connected to it. If one management server is uninstalled, it still appears on the other consoles. You need to manually delete the servers that are no longer connected. 4
  • 5. MANAGING SEPM SERVERS Exporting and importing server settings You may want to export or import settings for a Symantec Endpoint Protection Manager. Settings are exported to a file in xml format. 5
  • 6. MAINTAINING SERVER SECURITY All of the servers for which you can establish a connection require you to configure third-party passwords in the Symantec Endpoint Protection Manager. The third-party passwords are automatically saved in the database that you created when you initially installed the management server. You are typically prompted to provide the third-party password during the configuration of the following types of servers: ■ Email servers ■ Directory servers ■ RSA servers ■ Proxy servers 6
  • 7. MAINTAINING SERVER SECURITY Granting or denying access to remote Symantec Endpoint Protection Manager consoles You can secure the main console by granting or denying access to those computers on which a remote console is installed. By default, all consoles are allowed access. Administrators can log on to the main console locally or remotely from any computer on the network. 7
  • 8. MAINTAINING SERVER SECURITY Digital certificates are the industry standard for authenticating and encrypting sensitive data. If you want to prevent the reading of information as it passes through routers in the network, you need to encrypt the data. Therefore you need a digital certificate that uses the HTTPS protocol. As part of this secure procedure, the server identifies and authenticates itself with a server certificate. 8
  • 9. MAINTAINING SERVER SECURITY Symantec uses the HTTPS protocol for the communication between all the servers, clients, and optional Enforcers in a network. You must also enable encryption on Symantec Endpoint Protection Manager so that the server identifies and authenticates itself with a server certificate. If you do not enable this option, then the installation of a digital certificate is not effective. 9
  • 10. MAINTAINING SERVER SECURITY The management server supports the following types of certificate: ■ JKS keystore file (.jks) A Java tool that is called keytool.exe generates the keystore file. Symantec supports only the Java Key Standard (JKS) format. The Java Cryptography Extension (JCEKS) format requires a specific version of the Java Runtime Environment (JRE). The management server supports only a JCEKS keystore file that is generated with the same version as the Java Development Kit (JDK) on the management server. The keystore must contain both a certificate and a private key. The keystore password must be the same as the key password. It is usually exported from Internet Information Services (IIS). ■ PKCS12 keystore file (.pfx and .p12) ■ Certificate and private key file (DER and PEM format) Symantec supports unencrypted certificates and private keys in the DER or the PEM format. PKCS8-encrypted private key files are not supported. 10
  • 11. COMMUNICATING WITH OTHER SERVERS Establishing communication between Symantec Endpoint Protection Manager and email servers If you want to use email notification, you need to configure the email server on Symantec Endpoint Protection Manager. 11
  • 12. COMMUNICATING WITH OTHER SERVERS Setting up a connection between an HTTP proxy server and Symantec Endpoint Protection Manager If you support an HTTP proxy server in the corporate network, you need to connect the HTTP proxy server to Symantec Endpoint Protection Manager. You can use the HTTP proxy server to automatically download LiveUpdate contents. 12
  • 13. COMMUNICATING WITH OTHER SERVERS Configuring Symantec Endpoint Protection Manager to use RSA SecurID Authentication If your corporate network includes an RSA server, you need to install the software for an RSA ACE Agent on the computer on which you installed Symantec Endpoint Protection Manager and configure it as a SecurID Authentication client. 13
  • 14. MANAGING ADMINISTRATORS You can use administrator accounts to manage Symantec Endpoint Protection Manager. Administrators log on to the Symantec Endpoint Protection Manager console to change policy settings, manage groups, run reports, and install client software, as well as other management tasks. The default account is a system administrator account, which provides access to all features. You can also add a more limited administrator account, for administrators who need to perform a subset of tasks. 14
  • 15. MANAGING ADMINISTRATORS When you install the Symantec Endpoint Protection Manager, a default system administrator account is created, called admin. The system administrator account gives an administrator access to all the features in Symantec Endpoint Protection Manager. To help you manage security, you can add additional system administrator accounts, domain administrator accounts, and limited administrator accounts. Domain administrators and limited administrators have access to a subset of Symantec Endpoint Protection Manager features. 15
  • 16. MANAGING ADMINISTRATORS You choose which accounts you need based on the types of roles and access rights you need in your company. For example, a large company may use the following types of roles: 16
  • 17. MANAGING ADMINISTRATORS 1. An administrator who installs the management server and the client installation packages. After the product is installed, an administrator in charge of operations takes over. These administrators are most likely system administrators. 2. An operations administrator maintains the servers, databases, and installs patches. If you have a single domain, the operations administrator could be a domain administrator who is fully authorized to manage sites. 17
  • 18. MANAGING ADMINISTRATORS 3. An antivirus administrator, who creates and maintains the Virus and Spyware policies and LiveUpdate policies on the clients. This administrator is most likely to be a limited administrator. 4. A desktop administrator, who is in charge of security and creates and maintains the Firewall policies and Intrusion Prevention policies for the clients. This administrator is most likely to be a domain administrator. 18
  • 19. MANAGING ADMINISTRATORS 5. A help desk administrator, who creates reports and has readonly access to the policies. The antivirus administrator and desktop administrator read the reports that the help desk administrator sends. The help desk administrator is most likely to be a limited administrator who is granted reporting rights and policy rights. 19
  • 20. MANAGING ADMINISTRATORS Adding an administrator account As a system administrator, you can add another system administrator, administrator, or limited administrator. As an administrator within a domain, you can add other administrators with access rights equal to or less restrictive 20
  • 21. MANAGING ADMINISTRATORS Configuring the access rights for a limited administrator If you add an account for a limited administrator, you must also specify the administrator's access rights. Limited administrator accounts that are not granted any access rights are created in a disabled state and the limited administrator will not be able to log on to the management server. 21
  • 22. MANAGING ADMINISTRATORS Changing the authentication method for administrator accounts After you add an administrator account, the user name and password are stored in the Symantec Endpoint Protection Manager database. When the administrator logs on to the management server, the management server verifies with the database that the user name and password are correct. However, if your company uses a third-party server to authenticate existing user names and passwords, you can configure Symantec Endpoint Protection Manager to authenticate with the server. 22
  • 23. MANAGING ADMINISTRATORS Changing the password for an administrator account For security purposes, you may need to change the password for another administrator's account. The following rules apply to changing passwords: ■ System administrators can change the password for all administrators. ■ Domain administrators can change the password for other domain administrators and limited administrators within the same domain. ■ Limited administrators can change their own passwords only. 23
  • 24. MANAGING THE DATABASE Symantec Endpoint Protection supports both an embedded database and the Microsoft SQL Server database. If you have more than 5,000 clients, you should use a Microsoft SQL Server database. Symantec Endpoint Protection Manager automatically installs an embedded database. The database contains information about security policies, configuration settings, attack data, logs, and reports. 24
  • 25. MANAGING THE DATABASE After you install Symantec Endpoint Protection Manager, the management server may start to slow down after a few weeks or a few months. To improve the management server performance, you may need to reduce the database storage space and schedule various database maintenance tasks. 25
  • 26. MANAGING THE DATABASE Scheduling automatic database backups You can schedule database backups to occur at a time when fewer users are logged on to the network. You can also back up the database at any time. 26
  • 27. MANAGING THE DATABASE Scheduling automatic database maintenance tasks After you install the management server, the space in the database grows continually. The management server slows down after a few weeks or months. To reduce the database size and to improve the response time with the database, the management server performs the following database maintenance tasks: ■ Truncates the transaction log. The transaction log records almost every change that takes place within the database. The management server removes unused data from the transaction log. ■ Rebuilds the index. The management server defragments the database table indexes to improve the time it takes to sort and search the database. 27
  • 28. MANAGING THE DATABASE Increasing the Microsoft SQL Server database file size If you use the Microsoft SQL Server database, periodically check the database size to make sure that the database does not reach its maximum size. If you can, increase the maximum size that the Microsoft SQL Server database holds. 28
  • 29. MANAGING THE DATABASE Exporting data to a Syslog server To increase the space in the database, you can configure the management server to send the log data to a Syslog server. When you export log data to a Syslog server, you must configure the Syslog server to receive the logs. 29
  • 30. MANAGING THE DATABASE Specifying how long to keep log entries in the database To help control hard disk space, you can decrease the number of log entries that the database keeps. You can also configure the number of days the entries are kept. 30
  • 31. MANAGING THE DATABASE Clearing log data from the database manually You can perform a manual log sweep after backing up the database, if you prefer to use this method as part of routine database maintenance. If you allow an automatic sweep to occur, you may lose some log data if your database backups do not occur frequently enough. If you regularly perform a manual log sweep after you have performed a database backup, it ensures that you retain all your log data. This procedure is very useful if you must retain your logs for a relatively long period of time, such as a year. You can manually clear the logs, but this procedure is optional and you do not have to do it. 31
  • 32. DISASTER RECOVERY TECHNIQUES Reinstalling or reconfiguring Symantec Endpoint Protection Manager If you need to reinstall or reconfigure the management server, you can import all your settings by using a disaster recovery file. You can reinstall the software on the same computer, in the same installation directory. You can also use this procedure to install an additional site for replication. The Symantec Endpoint Protection Manager creates a recovery file during installation. The recovery file is selected by default during the reinstallation process. 32
  • 33. DISASTER RECOVERY TECHNIQUES Generating a new server certificate If you reinstall Symantec Endpoint Protection Manager on a different computer, you must generate a new server certificate. If the original computer is corrupted or you upgrade the management server from a previous version, you must reinstall Symantec Endpoint Protection Manager on a different computer. To reinstall Symantec Endpoint Protection Manager on a different computer, you install the management server as if for the first time, rather than with the recovery file. 33
  • 34. DISASTER RECOVERY TECHNIQUES Restoring the database If the database gets corrupted or you need to perform disaster recovery, you can restore the database. To restore the database, you must first have backed it up. You must restore the database using the same version of Symantec Endpoint Protection Manager that you used to back up the database. You can restore the database on the same computer on which it was installed originally or on a different computer. The database restore might take several minutes to complete. 34

Hinweis der Redaktion

  1. By default, the management server performs these tasks on a schedule. You canperform the maintenance tasks immediately, or adjust the schedule so that itoccurs when users are not on their computers.
  2. You reinstall the database settings on a different computer by using the databasebackup and restore utility. However, the server certificate that the newmanagement server uses does not match the existing server certificate in therestored database. Because client-server communication uses the server certificate,you must generate a new server certificate.