Symantec Data Loss Prevention Installation Guide for Windows

Total Page:16

File Type:pdf, Size:1020Kb

Symantec Data Loss Prevention Installation Guide for Windows Symantec Data Loss Prevention Installation Guide for Windows Version 15.7 Last updated: September 15, 2021 Symantec Data Loss Prevention Installation Guide for Windows Table of Contents About this guide...................................................................................................................................7 About updates to the Symantec Data Loss Prevention Installation Guide for Windows......................................... 7 Planning the installation..................................................................................................................... 8 About installation tiers.................................................................................................................................................... 8 About single sign-on....................................................................................................................................................... 8 About hosted Network Prevent deployments............................................................................................................... 9 About Symantec Data Loss Prevention system requirements................................................................................... 9 Symantec Data Loss Prevention required items........................................................................................................10 Standard ASCII characters required for all installation parameters.........................................................................10 Performing a three-tier installation—high-level steps............................................................................................... 11 Performing a two-tier installation—high-level steps..................................................................................................12 Performing a single-tier installation—high-level steps..............................................................................................13 Symantec Data Loss Prevention preinstallation steps..............................................................................................14 Confirming the Oracle database user permissions................................................................................................... 16 About external storage for incident attachments.......................................................................................................16 Verifying that servers are ready for Symantec Data Loss Prevention installation................................................. 17 Installing an Enforce Server............................................................................................................. 19 Preparing for an Enforce Server installation.............................................................................................................. 19 Installing the Java Runtime Environment on the Enforce Server............................................................................ 19 Installing an Enforce Server......................................................................................................................................... 20 Verifying an Enforce Server installation......................................................................................................................25 Installing a new license file.......................................................................................................................................... 25 Importing a solution pack.................................................................................................................27 About Symantec Data Loss Prevention solution packs............................................................................................ 27 Importing a solution packImporting the solution pack............................................................................................. 28 Installing and registering detection servers................................................................................... 30 About detection servers................................................................................................................................................ 30 Preparing for a detection server installation.............................................................................................................. 31 About Microsoft Rights Management file and email monitoring...............................................................................31 Installing the Java Runtime Environment on a detection server............................................................................. 32 Installing a detection server......................................................................................................................................... 32 Enabling Microsoft Rights Management file monitoring........................................................................................... 36 Enabling RMS detection for Azure-managed RMS...........................................................................................36 Verifying a detection server installation......................................................................................................................37 Registering a detection server..................................................................................................................................... 37 Configuring certificates for secure server communications.........................................................39 2 Symantec Data Loss Prevention Installation Guide for Windows About the sslkeytool utility and server certificates................................................................................................... 39 About sslkeytool command line options................................................................................................................... 39 Using sslkeytool to generate new Enforce and detection server certificates........................................................... 41 Using sslkeytool to add new detection server certificates........................................................................................42 Verifying server certificate usage..............................................................................................................................43 About securing communications between the Enforce Server and the database..................................................44 About orapki command line options......................................................................................................................... 44 Using orapki to generate the server certificate on the Oracle database..................................................................45 Configuring communication on the Enforce Server..................................................................................................46 Configuring the server certificate on the Enforce Server......................................................................................... 48 Verifying the Enforce Server database certificate usage......................................................................................... 48 About securing communications between the Enforce Server and Amazon RDS for Oracle................................49 Configuring Oracle RDS Option Group with SSL.....................................................................................................49 Configuring the server certificate on the Enforce Server......................................................................................... 49 Setting up an SSL connection over JDBC............................................................................................................... 50 Verifying the Enforce Server-Oracle RDS database certificate usage..................................................................... 50 Installing the domain controller agent to identify users in incidents.......................................... 52 About the domain controller agent..............................................................................................................................52 Domain controller agent installation prerequisites....................................................................................................52 Installing the domain controller agent.........................................................................................................................53 Domain controller agent post-installation tasks........................................................................................................ 54 Exclude an IP address or IP range from event collection........................................................................................54 Updating configuration settings after installation...................................................................................................... 55 Troubleshooting the domain controller agent............................................................................................................ 55 Uninstalling the domain controller agent....................................................................................................................56 Performing a single-tier installation................................................................................................ 57 Preparing for a single-tier installation.........................................................................................................................57
Recommended publications
  • Exceed® 2006
    Transforming Information into Intelligence™ > Data Sheet Exceed® 2006 Exceed is the most secure and popular PC X server in the market. It allows users to cost-effectively connect powerful Microsoft® Windows® desktops to a wide variety of X Window enabled servers, and access high-end X applications. Exceed is renowned for its performance, stability and user-friendliness. Integrated with a powerful terminal emulation package — HostExplorer,® and the optional security suite — Connectivity Secure Shell,™ Exceed is the most versatile Enterprise Connectivity software available. X Server User Exceed Exceed User > Support for X11R6.8 > Publishes X applications using Xweb Wizard > True Color Desktop sharing feature > Interactive support for password aging events Microsoft Windows Platform, Microsoft Windows Platform, Windows Server 2003/2003 x64 Windows Server 2003/2003 x64 > Local X support — X clients, Window Management, Edition, XP/2000/XP Prof x64 Edition, Edition, XP/2000/XP Prof x64 Edition, Font RGB, XRDB, Xtrace Microsoft Terminal Server Edition, Microsoft Terminal Server Edition, Citrix Presentaion Server for Windows Citrix Presentaion Server for Windows > Extensive Server Visual and multiple color depths Support > Support advanced input devices including SpaceBall 5000 > Support for local and remote Window Managers X connections over X connections over TCP/IP TCP/IP > Double Byte Character Set Support > Multiple monitors and screens support — Up to 8 screens > Remember session information for speedy restart Dial-up (LBX) LAN WAN Secure
    [Show full text]
  • Unit 10: Interoperability
    Unit 10: Interoperability 10.2. Windows 2000 in an UNIX Environment AP 9/01 Windows 2000 in an UNIX Environment • Windows/UNIX Interoperability Strategy • Services For UNIX 2.0 • SFU Future Planning • Microsoft Interix 2.2 AP 9/01 Windows/UNIX Interoperability Microsoft Interoperability Framework • Leverage Existing Network Resources • Simplify Account Management • Leverage Existing UNIX Expertise • Simplify Network Administration AP 9/01 Microsoft Windows Services for UNIX 2.0 (SFU) • Leverage Existing Network Resources – NFS Client, Server, Gateway, PCNFS Server • Simplify Account Management – NIS Migration Wizard, Server, Password Synch, User Name Mapping • Leverage Existing UNIX Knowledge – Core set of utilities based on UNIX • Simplify Network Administration – Telnet Client/Server, ActiveState Win32 PERL, Windows Technology AP 9/01 NFS Support (Leverage Existing Network Resources) UNIX NFS Servers SFU NFS Servers SFU NFS SFU NFS Clients Gateway UNIX NFS Clients AP 9/01 Client for NFS • Seamless access to NFS servers – Access NFS servers using Windows credentials – Maps Windows name to UNIX UID • Integration of NFS with Windows UI – Browsing NFS network, servers and shares • Windows semantics – case sensitivity, 8.3 naming, share locks, access to NFS via DFS, UNC naming, ‘net’ commands AP 9/01 Server for NFS • Allow UNIX clients to access files on Windows servers • File access using UNIX UID/GID – Map UID to a domain users – File access privileges according to mapped user • NFS access with just UNIX sign-on • NFS semantics – Support
    [Show full text]
  • INTERIX: UNIX Application Portability to Windows NT Via an Alternative Environment Subsystem
    INTERIX: UNIX Application Portability to Windows NT via an Alternative Environment Subsystem Stephen R. Walli Softway Systems, Inc. 185 Berry Street, Suite 5514, San Francisco, CA 94107 [email protected] 0. Introduction today. It does this in a price competitive manner with respect to the hardware platforms on which This paper was originally written for and it runs. The problem becomes protecting the presented at the USENIX Windows NT huge investment in applications development over Workshop, Seattle, Washington, August 1997. the past decade or more in UNIX applications. The original paper was presented under the How does one leverage and protect the existing OPENNT name. It has been updated to reflect application base while moving to Windows NT? the current architecture and experience with INTERIX. 2. Alternatives 1. The Problem There are several ways to move existing applications to Windows NT. These range from Walli’s First Law of Applications Portability: the expense of a complete re-write of the Every useful application outlives the platform on application to some form of application port. We which it was developed and deployed. will briefly look at the pros and cons of the following: Application source code portability is one of the • cornerstones of most open systems definitions. a complete re-write of the application to the The intention is that if an application is written to Win32 environment subsystem • a particular model of source-code portability, it the UNIX emulation library approach to can port relatively easily to any platform that porting the application supports the portability model. This model is • the common library strategy for porting often based on source code portability standards applications such as the ISO/IEEE family of POSIX • the Microsoft POSIX subsystem standards [1,2] and ISO/ANSI C[3], and • the INTERIX subsystem specifications that include these standards such as the Open Group's Single UNIX Specification[4].
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • Windows Kernel Internals Overview
    Windows Kernel Internals Overview David B. Probert, Ph.D. Windows Kernel Development Microsoft Corporation © Microsoft Corporation 1 Contributors Neill Clift Landy Wang Adrian Marinescu David Solomon Nar Ganapathy Ben Leis Jake Oshins Brian Andrew Andrew Ritz Jason Zions Jonathan Schwartz Gerardo Bermudez Mark Lucovsky Dragos Sambotin Samer Arafeh Arun Kishan Dan Lovinger Adrian Oney © Microsoft Corporation 2 Windows History • Team formed in November 1988 • Less than 20 people • Build from the ground up – Advanced Operating System – Designed for desktops and servers – Secure, scalable SMP design – All new code • Rigorous discipline – developers wrote very detailed design docs, reviewed/discussed each others docs and wrote unit tests © Microsoft Corporation 3 Goals of the NT System • Reliability – Nothing should be able to crash the OS. Anything that crashes the OS is a bug and we won’t ship until it is fixed • Security – Built into the design from day one • Portability – Support more than one processor, avoid assembler, abstract HW dependencies. • Extensibility – Ability to extend the OS over time • Compatibility – Apps must run • Performance – All of the above are more important than raw speed! © Microsoft Corporation 4 Windows Server 2003 Architecture System Processes Applications Environment Service Services Subsystems Controller Alerter Interix WinLogon RPC User Session Application User Event Manager Win32 Mode Logger Subsystem DLLs System NTDLL.DLL Threads Kernel Executive API Mode I/O Manager PnP/Power Processes Virtual Cache Security
    [Show full text]
  • Systemy Operacyjne
    SystemSystem operacyjnyoperacyjny WindowsWindows XPXP • Perspektywa historyczna • Podstawy projektu • Elementy systemu Jądro Egzekutor • Podsystemy środowiskowe • System plików • Interfejs programowy Wiesław Płaczek Systemy Operacyjne: Wykład 13 1 PerspektywaPerspektywa historycznahistoryczna • Sierpień 1981: firma Microsoft wypuściła system operacyjny DOS 1.0 (4000 linii kodu asemblera, 8 KB pamięci) dla pierwszego komputera osobistego (PC) IBM, z mikroprocesorem Intel 8086. • Przez kolejne lata DOS, pomimo pojawiania się kolejnych, ulepszonych wersji, pozostawał w tyle za rozwojem technologicznym sprzętu; np. kolejne procesory Intela: 80286, 80386, 80486, pomimo wielu istotnych jakościowo zmian, były traktowane przez DOS jedynie jako „szybki 8086”. •We wczesnych latach 1980-tych Microsoft rozpoczął prace na graficznym interfejsem użytkownika (graphical user interface – GUI) dla systemu DOS, który mógłby rywalizować z systemem Macintosh – rezultatem tego był GUI o nazwie Windows 3.0 (przed 1990), dalsze wcielenia to Windows 95/98/Me. •W połowie lat 1980-tych Microsoft i IBM rozpoczęły pracę nad wielozadaniowym systemem nowej generacji, o nazwie OS/2, który mógłby w pełni wykorzystać możliwości oferowane przez procesor Intel 80286. • W roku 1988 Microsoft wycofał się z projektu OS/2 i rozpoczął pracę nad własnym systemem, wynajmując do tego Dave’a Cutlera, konstruktora systemu operacyjnego VMS dla komputerów VAX firmy DEC. • Pierwsza wersja nowego systemu o nazwie Windows NT („new technology”) z numerem 3.1 została wypuszczona w roku 1993 (używała GUI Windows 3.1). • Dalszym rozwinięciem systemu Windows NT był Windows 2000 (rok 2000). • Windows XP jest uaktualnieniem Windows 2000 oraz zastępuje Windows 95/98. Wiesław Płaczek Systemy Operacyjne: Wykład 13 2 PodstawyPodstawy projektuprojektu • Windows XP jest wielozadaniowym systemem operacyjnym z wywłaszczaniem, ma organizację 32- lub 64-bitową i jest przeznaczony dla procesorów Intel IA32/IA64, AMD K6/K7 i późniejszych.
    [Show full text]
  • 7600021981Pricing Sept2010 Pricing
    FF0000State and Local Select 01+000 FF0000Agreement 01S62995 FF0000September 2010 Pricelist 01+000 Microsoft Complete Product Description ERP Dealer Cost Cost (+) Plus or Net (NYS) SLG Cost (+) Model/Part Cost (-) Minus % Select Price Plus or Number Cost (-) Minus % 077-06158 Access 2010 Sngl MVL $ 148.00 $ 121.32 -3.07% $ 117.60 077-02521 Access SNGL LicSAPk MVL $ 234.00 $ 191.64 -3.07% $ 185.76 077-02567 Access Sngl SA MVL $ 86.00 $ 70.32 -3.07% $ 68.16 689-01091 AutoRouteEuro 2010 SNGL MVL $ 25.00 $ 19.92 -3.07% $ 19.31 689-00491 AutoRouteEuro Win32 SNGL LicSAPk MVL $ 40.00 $ 31.44 -3.07% $ 30.47 689-00497 AutoRouteEuro Win32 SNGL SA MVL $ 14.00 $ 11.52 -3.07% $ 11.17 LQD-00017 BingMapsDsktpwECP SNGL SubsVL MVL $ 344.00 $ 282.62 -3.07% $ 273.94 Q56-00348 Entourage 2008 SNGL MVL $ 54.00 $ 43.92 -3.07% $ 42.57 Q56-00342 Entourage SNGL LicSAPk MVL $ 86.00 $ 69.36 -3.07% $ 67.23 Q56-00339 Entourage SNGL SA MVL $ 31.00 $ 25.44 -3.07% $ 24.66 065-07338 Excel 2010 Sngl MVL $ 144.00 $ 118.44 -3.07% $ 114.80 065-03452 Excel SNGL LicSAPk MVL $ 228.00 $ 187.08 -3.07% $ 181.34 065-03516 Excel Sngl SA MVL $ 84.00 $ 68.64 -3.07% $ 66.53 D46-00735 ExcelMac 2008 SNGL MVL $ 167.00 $ 136.80 -3.07% $ 132.60 D46-00225 ExcelMac SNGL LicSAPk MVL $ 264.00 $ 216.24 -3.07% $ 209.60 D46-00255 ExcelMac SNGL SA MVL $ 97.00 $ 79.44 -3.07% $ 77.00 47F-00234 ExprssnEncdrPro 4.0 SNGL MVL $ 38.00 $ 30.60 -3.07% $ 29.66 47F-00232 ExprssnEncdrPro SNGL LicSAPk MVL $ 60.00 $ 48.36 -3.07% $ 46.88 47F-00233 ExprssnEncdrPro SNGL SA MVL $ 22.00 $ 17.76 -3.07% $ 17.21 NKF-00333
    [Show full text]
  • A Records, 244–245, 279 -A Switch in Nbtstat, 190 in Netstat, 186 AAS Deployment Package, 710 .Aas Extension, 712 Abstract
    22_InsideWin_Index 13/3/03 9:50 AM Page 1269 Index A A records, 244–245, 279 ACEs (Access Control Entries) -a switch access masks in, 568–570 in Nbtstat, 190 command-line tools for, 572–576 in Netstat, 186 for cumulative permissions, 577 AAS deployment package, 710 for deny permissions, 578 .aas extension, 712 inheritance in, 579–580, 725–728 Abstract classes, 299–300 object ownership in, 572 Accelerated Graphics Port (AGP) adapters, 164 viewing and modifying, 570–571 Access Control Entries. See ACEs (Access ACKs in DHCP, 101–102 Control Entries) ACL Editor, 570, 723 Access control lists (ACLs) Advanced view in Active Directory security, 732–734 for inheritance, 578, 581 objects in, 339 for ownership, 572 in security descriptors, 559 for special permissions, 723–724 Access Control Settings window, 728 Edit view, 725–726 Access masks for permissions inheritance, 578 in ACEs, 568–570 blocking, 579 in DSOs, 733 settings for, 581 Access requests in Kerberos, 621 viewings, 582 Access rights. See also Permissions ACLs (access control lists) in Active Directory security in Active Directory security, 732–734 delegation, 729–732 objects in, 339 types of, 724–725 in security descriptors, 559 for group policies, 682 ACPI (Advanced Configuration and Power Access tokens Interface) contents of, 560–561 compatibility of, 23–28, 148–149 local, 559 kernel version for, 135 SIDs in, 559, 561, 581 for PnP,17, 147–149 ACCM (Asynchronous-Control- ACPIEnable option, 149 Character-Map), 1124 Activation Account domain upgrades, 496–498 in IA64, 130 BDC, 494–496 in installation, 49–50 PDC, 490–493 unattended setup scripts for, 95 Account lockout policies Active Directory, 238 in domain design, 429 bulk imports and exports in, 353–356 in password security, 593–594 DNS deployment in, 242–243 Account logons, auditing, 647 DNS integration in, 238–239 Account management, auditing, 511, 648 dynamic updates, 244–245 Accounts in domain migration.
    [Show full text]
  • Open Source at Microsoft
    Open Source at Microsoft Subsystem for UNIX-Based Applications: Providing More Choices or decades, large companies have faced the Microsoft integrates Interix, develops SUA F complexities of working in mixed IT environments. The costs, time, and headaches In 1999, Microsoft acquired the Interix associated with porting applications from one technology from Softway Systems. Instead of operating system to another cannot be shelving the technology, as some Interix users overstated. And as legacy systems age, these feared, Microsoft put it to use. They began challenges show no sign of abating. offering Microsoft Interix 2.2 and later incorporated Interix into in version 3.0 and 3.5 To address the specific problems of porting of Microsoft Windows Services for UNIX, a UNIX-based applications to the Windows® software package that provides parts of the operating system, a company called Softway UNIX environment on Microsoft Windows NT. Systems developed Interix in the early 1990s. Interix, a subsystem for UNIX that runs atop the In 2005, in an effort to advance the Interix Win32 kernel, provided POSIX-compliant APIs technology, a team at Microsoft created a re- that enabled applications built on UNIX architected POSIX-compliant subsystem called platforms to be recompiled on Windows. Subsystem for UNIX-based Applications (SUA). While the core technology is similar to Interix, Solving the problem of rewriting applications SUA provides better operating system integration. It supports mixed-mode and 64-bit Before Interix was developed, a company compatibility, and it enables UNIX-based wanting to run a UNIX-based application on applications to be linked with Windows Windows would have to rewrite the program libraries.
    [Show full text]
  • Windows Subsystem for Linux
    Windows Subsystem for Linux by Aaron Grothe OLUG - September 2016 What is Windows Subsystem for Linux? Simply put WSL lets you run certain Ubuntu Linux programs on Windows 10 How to Install WSL 1. Install Windows 10 Anniversary Edition - Windows 10 Upgrade Advisor 2. Set to Developer Mode 3. Turn on Windows Subsystem for Linux (beta) in the add features sections 4. (Optional) install Cygwin X11 or Xming How to run apps on a different O/S Five Major Approaches 1. Virtual Machine - KVM / Xen / VirtualBox / Vmware, etc 2. Recompile applications for host O/S - Cygwin, UWin 3. Dynamic recompliation of program for different platform 4. Application layer - Interix, WSL, Wine 5. Run the kernel/os alongside the other - colinux, interex History of WSL (assumed) Years ago there was a product called Lxrun by SCO Lxrun included a bunch of Linux source code and was able to run some Linux programs on Sco Unix Sun also released a version of Lxrun There were other systems like HP’s libhplx This has been updated / enhanced by Microsoft and appears to form the basis of WSL There was also a project (linux-abi) to run SCO Unix programs on Linux History of WSL (assumed, cont’d) Micorosft had a project named Astoria. The goal of this project was to run Android apps on Windows Phone O/S Needless to say they decided they really didn’t need this. See OS/2 3.0 a better Windows than Windows How does it work? (assumed) Windows NT had a Posix subsystem, also an OS/2 subsystem as well This continues on to its derivatives (XP, Vista, 7, 8, 10) WSL takes the Lxrun program
    [Show full text]
  • Systemverwaltung Sommersemester 2007
    Systemverwaltung Sommersemester 2008 am Fachbereich Mathematik und Informatik Automatisierung unter Windows Daniel Bößwetter [email protected] August 2008 Automatisierung unter Windows Inhalt Windows Historie (kurz) Windows-Automatisierung mit Unix-Tools -Cygwin -Interix Services for Unix -Perl, Python ... Windows-Automatisierung mit Windows-Tools -Batch-Files -Windows-Scripting (VBS, JS) – nur kurz und knapp -Powershell Fachbereich Mathematik und Informatik, Blockkurs Systemverwaltung 2 Windows Historie -16bit Windows: Automatisierung durch Batch-Dateien -Ab Windows 2000: Automatisierung durch Windows Scripting Host (WSH) -Ab Windows Vista: Automasitierung durch Monad/Powershell -(die jeweils älteren Mechanismen leben natürlich weiter!) -(Exkurs: Was bedeutet eigentlich 32bit?) (Bildquelle: Wikipedia) Fachbereich Mathematik und Informatik, Blockkurs Systemverwaltung 3 Windows-Automatisierung mit Unix-Tools Cygwin, Interix, Perl/Python ... Cygwin -„Cygwin is a Linux-like environment for Windows.“ (cygwin.com) -Ursprünglich „Minumum GNU for Windows“ (MinGW) entwickelt, um GCC unter Windows nutzen zu können. - Ehem. Cygnus, heute Redhat -Unix-API wird als Bibliothek (DLL) implementiert. -(Fast) alles, was unter Linux läuft, kann durch Re-Kompilieren unter Cygwin ausgeführt werden. -Viele Programmme verfügbar - Shells - Dateisystem-Tools - X11 - Compiler und Scriptsprachen -Frei verfügbar unter www.cygwin.com Fachbereich Mathematik und Informatik, Blockkurs Systemverwaltung 5 Interix Services for Unix (SFU 3.5) -Ähnlich wie Cygwin,
    [Show full text]
  • HP Proliant Storage Server Release Notes (November 2004)
    Release Notes HP ProLiant Storage Server Product Version: 1 First Edition (November 2004) Part Number: 378129-001 These release notes summarize important information regarding the HP ProLiant Storage Server not covered in other documents. For the latest version of these Release Notes and other storage server documentation, access the HP storage web site at: http://www.hp.com/country/us/eng/prodserv/storage.html. © Copyright 2004 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or translated into another language without the prior written consent of Hewlett-Packard. The information contained in this document is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated. Intel® and Celeron® are U.S. registered trademarks of Intel Corporation. Intel® and Itanium® are trademarks or registered trademarks of Intel Corporation in the U.S. and other countries and are used under license.
    [Show full text]