11.3.1 Symantec Endpoint Encryption Installation …
Symantec Endpoint Encryption Installation Guide Version 11.3.1
Symantec Endpoint Encryption Installation Guide Version 11.3.1
Table of Contents
Prerequisites for InstallingSymantec Endpoint Encryption............................................................ 4
Symantec Endpoint Encryption system requirements................................................................................................ 4 Symantec Endpoint Encryption protocols and ports.................................................................................................. 4 Accounts required by Symantec Endpoint Encryption............................................................................................... 5 Setting up the rights for the database access account.............................................................................................. 7 About Symantec's Community Quality Program..........................................................................................................7 Best practices for Microsoft SQL Server database logons.........................................................................................8 Roles required by Symantec Endpoint Encryption......................................................................................................8 About the Management Password................................................................................................................................. 9 Symantec Endpoint Encryption Microsoft SQL Server software download requirements.................................... 10 Enabling and installing prerequisites for the Management Console....................................................................... 10
Windows server installations: Enabling roles, features, and tools for the Symantec Endpoint Encryption Management Server..................................................................................................................................................10 Windows client installations: Installing Remote Server Administration Tools for the Management Console............ 13
Installing and Upgrading the server................................................................................................ 15
About configuring TLS/SSL communications for Symantec Endpoint Encryption................................................ 15 Installing the Server.......................................................................................................................................................16 Configuring the server...................................................................................................................................................21 Preparing the environment for Kerberos authentication...........................................................................................24 Installing a Management Console...............................................................................................................................27 Adding or removing the Symantec Endpoint Encryption snap-ins..........................................................................29 Installing the Windows Password Reset snap-in (optional)......................................................................................29 Completing the installation........................................................................................................................................... 30
Creating installers for the Symantec Endpoint Encryption clients.............................................. 32
About client installers....................................................................................................................................................32 About the installation settings wizards....................................................................................................................... 32 Creating a Symantec Endpoint Encryption Client installation package.................................................................. 33
Configuring the Management Agent installation settings......................................................................................... 34 Configuring the Drive Encryption installation settings.............................................................................................. 37 Configuring the Symantec Endpoint Encryption for BitLocker installation settings.................................................. 43 Configuring the Removable Media Encryption installation settings..........................................................................44 About enabling features in the Symantec Endpoint Encryption Client installation package................................ 48 Creating a Symantec Endpoint Encryption for FileVault installation package........................................................49 Creating a Windows Password Reset Utility installation package........................................................................... 50 About Autologon............................................................................................................................................................ 51
Deploying new clients....................................................................................................................... 53
2
Symantec Endpoint Encryption Installation Guide Version 11.3.1
Deploying client packages using a third-party tool................................................................................................... 53 Deploying new clients using Group Policy Objects.................................................................................................. 53 Installing the client software manually........................................................................................................................54 Installing the client with support for Windows 10 feature update through Windows updates.............................. 55 Installing the Windows Password Reset Utility on a client computer..................................................................... 57 Deploying client installers using the command line..................................................................................................57 Where to find more information about deploying clients..........................................................................................58
Using the Symantec Endpoint Encryption Management Server Configuration Manager........... 59
About using the Symantec Endpoint Encryption Management Server Configuration Manager............................59 Database Configuration page....................................................................................................................................... 59 Web Server Configuration page................................................................................................................................... 60 Active Directory Configuration page........................................................................................................................... 63 Active Directory Synchronization Service page......................................................................................................... 63 Community Quality Program page...............................................................................................................................65 About Administrative Server Roles..............................................................................................................................66 Configuring Server Roles.............................................................................................................................................. 68 Editing configured Server Roles.................................................................................................................................. 70 Disabling Server Roles.................................................................................................................................................. 71 Server Roles Configuration page................................................................................................................................. 72 Symantec Encryption Management Server page (optional)...................................................................................... 73
Certificates and Token Software Settings.......................................................................................74
Using Symantec Endpoint Encryption authentication certificates........................................................................... 74 Using Removable Media Encryption certificates........................................................................................................74 Recommended token software configuration............................................................................................................. 75
Uninstalling Symantec Endpoint Encryption.................................................................................. 76
Uninstalling the Symantec Endpoint Encryption Suite..............................................................................................76 About repairing or modifying the Symantec Endpoint Encryption Suite installation.............................................76 Uninstalling the Symantec Endpoint Encryption client............................................................................................. 76 About uninstalling the Symantec Endpoint Encryption client with a third-party tool............................................ 77 About uninstalling the Symantec Endpoint Encryption client software using Group Policy Objects...................78 Uninstalling the Symantec Endpoint Encryption Client installation package using Group Policy Objects..........79 Deploying uninstallation scripts using Group Policy Objects..................................................................................79 Uninstalling the Symantec Endpoint Encryption client software using the Control Panel.................................... 80 Uninstalling the Symantec Endpoint Encryption client software using the command line................................... 81 Uninstalling Symantec Endpoint Encryption for FileVault........................................................................................ 82
3
Symantec Endpoint Encryption Installation Guide Version 11.3.1
Prerequisites for InstallingSymantec Endpoint Encryption
Symantec Endpoint Encryption system requirements
Review the Symantec Endpoint Encryption system requirements before you perform an installation or upgrade.
Table 1: Symantec Endpoint Encryption system requirements
System requirements Symantec Endpoint Encryption Management Server system requirements
Symantec Endpoint Encryption Management Console system requirements Symantec Endpoint Encryption Client system requirements
Article URL
System Requirements for Symantec Endpoint Encryption 11.3.x Management Server
Note: Support for TLS 1.2 requires changes to the SQLDB driver. The SQLOLEDB operating system has changed to MSOLEDBSQL. This change affects the supported operating systems and SQL servers. Be sure to verify these new system requirements.
System Requirements for Symantec Endpoint Encryption 11.3.x Management Console
System Requirements for Symantec Endpoint Encryption 11.3.x Client
Symantec Endpoint Encryption protocols and ports
The following table identifies each protocol and port that is used by Symantec Endpoint Encryption.
Table 2: Symantec Endpoint Encryption protocols and ports
Application layer protocol
Group Policy Core Protocols
Communication protocol
TCP/IP
SOAP over Hypertext Transport Protocol (HTTP)
TCP/IP
JSON over Hypertext Transport Protocol (HTTP)
TCP/IP
Lightweight Directory
TCP/IP
Access Protocol (LDAP)
Purpose
Used by
Port
Deliver and consume Group Policy Objects (GPOs)
Symantec Endpoint Encryption Client Computers
Management Console Computers
Communicate between Symantec Endpoint the clients and the server Encryption Client
Computers
Symantec Endpoint Encryption Management Server
Web-based Help Desk Recovery
Symantec Endpoint Encryption Management Server
Web browser
Query Active Directory Symantec Endpoint and eDirectory directories Encryption Management
Server
445, 389
configurable
Configurable. Ensure that you specify the same port number as JSON over HTTP. 389, 3268, or configurable
4
Symantec Endpoint Encryption Installation Guide Version 11.3.1
Application layer protocol
Tabular Data Stream (TDS)
Communication protocol
TCP/IP
Transport Layer Security TCP/IP (TLS) and/or Secure Sockets Layer (SSL)
Purpose
Used by
Port
Communicate between the server and the database
Optionally encrypt communications by layering these protocols on top of TDS, LDAP, and/or HTTP
Symantec Endpoint Encryption Management Server Symantec Endpoint Encryption database Management Console Computers
Symantec Endpoint Encryption Management Server Symantec Endpoint Encryption database Management Console Computers Symantec Endpoint Encryption Client Computers
1433, dynamically allocated, or configurable
636, 3269, or configurable
About configuring TLS/SSL communications for Symantec Endpoint Encryption
Accounts required by Symantec Endpoint Encryption
Symantec Endpoint Encryption requires the following accounts:
5
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- department of the army tradoc regulation 1 11
- a few notes on the design of reinforced concrete tanks
- new jersey administrative code title 11
- information supplement requirement 11 3
- symantec endpoint encryption upgrade guide
- 11 3 1 symantec endpoint encryption installation
- title 11 insurance chapter 3 automobile insurance
- 11 3 1 symantec endpoint encryption installation guide version
- department of the army tradoc regulation 1 11 headquarters
- new jersey administrative code title 11 department of