Symantec Data Loss Prevention Installation Guide for Windows Version 15.7 Last updated: September 15, 2021 Symantec Data Loss Prevention Installation Guide for Windows Table of Contents About this guide...................................................................................................................................7 About updates to the Symantec Data Loss Prevention Installation Guide for Windows......................................... 7 Planning the installation..................................................................................................................... 8 About installation tiers.................................................................................................................................................... 8 About single sign-on....................................................................................................................................................... 8 About hosted Network Prevent deployments............................................................................................................... 9 About Symantec Data Loss Prevention system requirements................................................................................... 9 Symantec Data Loss Prevention required items........................................................................................................10 Standard ASCII characters required for all installation parameters.........................................................................10 Performing a three-tier installation—high-level steps............................................................................................... 11 Performing a two-tier installation—high-level steps..................................................................................................12 Performing a single-tier installation—high-level steps..............................................................................................13 Symantec Data Loss Prevention preinstallation steps..............................................................................................14 Confirming the Oracle database user permissions................................................................................................... 16 About external storage for incident attachments.......................................................................................................16 Verifying that servers are ready for Symantec Data Loss Prevention installation................................................. 17 Installing an Enforce Server............................................................................................................. 19 Preparing for an Enforce Server installation.............................................................................................................. 19 Installing the Java Runtime Environment on the Enforce Server............................................................................ 19 Installing an Enforce Server......................................................................................................................................... 20 Verifying an Enforce Server installation......................................................................................................................25 Installing a new license file.......................................................................................................................................... 25 Importing a solution pack.................................................................................................................27 About Symantec Data Loss Prevention solution packs............................................................................................ 27 Importing a solution packImporting the solution pack............................................................................................. 28 Installing and registering detection servers................................................................................... 30 About detection servers................................................................................................................................................ 30 Preparing for a detection server installation.............................................................................................................. 31 About Microsoft Rights Management file and email monitoring...............................................................................31 Installing the Java Runtime Environment on a detection server............................................................................. 32 Installing a detection server......................................................................................................................................... 32 Enabling Microsoft Rights Management file monitoring........................................................................................... 36 Enabling RMS detection for Azure-managed RMS...........................................................................................36 Verifying a detection server installation......................................................................................................................37 Registering a detection server..................................................................................................................................... 37 Configuring certificates for secure server communications.........................................................39 2 Symantec Data Loss Prevention Installation Guide for Windows About the sslkeytool utility and server certificates................................................................................................... 39 About sslkeytool command line options................................................................................................................... 39 Using sslkeytool to generate new Enforce and detection server certificates........................................................... 41 Using sslkeytool to add new detection server certificates........................................................................................42 Verifying server certificate usage..............................................................................................................................43 About securing communications between the Enforce Server and the database..................................................44 About orapki command line options......................................................................................................................... 44 Using orapki to generate the server certificate on the Oracle database..................................................................45 Configuring communication on the Enforce Server..................................................................................................46 Configuring the server certificate on the Enforce Server......................................................................................... 48 Verifying the Enforce Server database certificate usage......................................................................................... 48 About securing communications between the Enforce Server and Amazon RDS for Oracle................................49 Configuring Oracle RDS Option Group with SSL.....................................................................................................49 Configuring the server certificate on the Enforce Server......................................................................................... 49 Setting up an SSL connection over JDBC............................................................................................................... 50 Verifying the Enforce Server-Oracle RDS database certificate usage..................................................................... 50 Installing the domain controller agent to identify users in incidents.......................................... 52 About the domain controller agent..............................................................................................................................52 Domain controller agent installation prerequisites....................................................................................................52 Installing the domain controller agent.........................................................................................................................53 Domain controller agent post-installation tasks........................................................................................................ 54 Exclude an IP address or IP range from event collection........................................................................................54 Updating configuration settings after installation...................................................................................................... 55 Troubleshooting the domain controller agent............................................................................................................ 55 Uninstalling the domain controller agent....................................................................................................................56 Performing a single-tier installation................................................................................................ 57 Preparing for a single-tier installation.........................................................................................................................57
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages120 Page
-
File Size-