ユーザーズマニュアル目次Symantec™ Critical System Protection Installation Guide1Technical Support3Contents7Introducing Symantec™ Critical System Protection11About Symantec Critical System Protection11Components of Symantec Critical System Protection12How Symantec Critical System Protection works13About the policy library13Where to get more information14Planning the installation15About planning the installation15About network architecture and policy distribution15System requirements16Operating system requirements17Hardware requirements20Disabling Windows XP firewalls21Disabling Internet Connection Firewall21Disabling Windows Firewall22About using firewalls with Symantec Critical System Protection22About name resolution23About IP routing24About intrusion prevention24About simple failover25How simple failover works25About the fail back interval26Specifying the management server list for an agent27About the Windows NT agent installation27About log files28What to do after installation29Installing Symantec Critical System Protection on Windows31About installing Symantec Critical System Protection on Windows32About port number mapping32Bypassing prerequisite checks33About installing a database to a SQL Server instance34About SQL Server installation requirements34About installing on computers that run Windows 200035Configuring the temp environment variable36Installing the management server36About installation types and settings36Installing evaluation installation that runs MSDE on the local system42Installing evaluation installation using existing MS SQL instance44Installing production installation with Tomcat and database schema45Installing Tomcat component only47Installing and configuring the management console48Installing the management console48Configuring the management console49Installing a Windows agent51About the SSL certificate file51About the installation settings and options51Installing the Windows agent software55Unattended agent installation59Displaying InstallShield commands59Microsoft Windows Installer commands60Installation properties61Installing the Windows NT policy64Uninstalling Symantec Critical System Protection65Uninstalling an agent using Add or Remove Programs66Unattended uninstallation of an agent66Uninstalling the management console67Uninstalling the management server and database67Temporarily disabling Windows agents68Temporarily disabling Windows 2000, Windows Server 2003, or Windows XP Professional agents68Temporarily disabling Windows NT agents69Reinstalling Windows agents71Installing UNIX agents73About installing UNIX agents73Bypassing prerequisite checks77Installing an agent in verbose mode78Installing an agent in silent mode79Uninstalling agents using package commands84Uninstalling agents manually85Uninstalling Solaris agents manually85Uninstalling Linux agents manually87Uninstalling HP-UX agents manually88Uninstalling AIX agents manually89Uninstalling Tru64 agents manually90Disabling and enabling UNIX agents91Disabling and enabling Solaris agents91Disabling and enabling Linux agents93Disabling and enabling HP-UX agents94Disabling and enabling AIX agents95Disabling and enabling Tru64 agents97Monitoring and restarting UNIX agents98Troubleshooting agent issues99Migrating to the latest version101Migrating legacy installations of Symantec Critical System Protection101Providing scspdba password during management server upgrade102Unattended Windows agent migration103Specifying the management server list for an agent103Migrating other legacy agent installations105Checklist for migrating from Symantec Intruder Alert106Checklist for migrating from Symantec Host IDS108Migrating legacy agent software109Preparing for detection policy migration109Installing the authoring environment and policy conversion utility110Copying files required for the policy conversion utility110Migrating legacy detection policy files111Converting legacy detection policy files111Importing the zip file113Creating a new policy113Validating your rules114Validating rule types and criteria115Configuring an option group116Compiling a policy116Applying policies created and compiled in the authoring environment117Index119サイズ: 1.3MBページ数: 122Language: Englishマニュアルを開く