Symantec Critical System Manuel D’Utilisation

Page de 122
16 Planning the installation
System requirements
along with a few agents, and become familiar with Symantec Critical System 
Protection operations. When you are ready to roll out policies to your 
production environment, you can roll out different policies that are based on 
computing needs, and prevention and detection levels.
Areas where computing needs and prevention and detection levels might differ 
include the following:
Local workstations
Remote annex workstations
Computers that run production databases
Computers that are located in demilitarized zones (DMZ) such as Web 
servers, mail proxy servers, public DNS servers
Prevention policies pushed to local and remote workstations would most likely 
be less restrictive than prevention policies pushed to production databases and 
DMZ servers.
Detection policies pushed to local workstations, production databases, and DMZ 
servers would also differ. Detection policies pushed to production databases and 
DMZ servers are more likely to offer more signatures than policies pushed to 
workstations. 
You can distribute different policies to different computers by creating agent 
groups with the management console and then associating the agents with one 
or more groups during agent installation. You first create the groups using the 
management console, set the different policies for the groups, and then 
associate the agents with the groups during installation. It is not necessary, 
however, to associate an agent with a group during installation. You can 
perform this operation after installation.
See the Symantec Critical System Protection Administration Guide for details on 
how to create agent groups.
System requirements
System requirements fall into the following categories:
Operating system requirements
Hardware requirements