Symantec Data Loss Prevention Installation Guide for Windows

Symantec Data Loss Prevention Installation Guide for Windows

Symantec Data Loss Prevention Installation Guide for Windows Version 15.7 Last updated: September 15, 2021 Symantec Data Loss Prevention Installation Guide for Windows Table of Contents About this guide...................................................................................................................................7 About updates to the Symantec Data Loss Prevention Installation Guide for Windows......................................... 7 Planning the installation..................................................................................................................... 8 About installation tiers.................................................................................................................................................... 8 About single sign-on....................................................................................................................................................... 8 About hosted Network Prevent deployments............................................................................................................... 9 About Symantec Data Loss Prevention system requirements................................................................................... 9 Symantec Data Loss Prevention required items........................................................................................................10 Standard ASCII characters required for all installation parameters.........................................................................10 Performing a three-tier installation—high-level steps............................................................................................... 11 Performing a two-tier installation—high-level steps..................................................................................................12 Performing a single-tier installation—high-level steps..............................................................................................13 Symantec Data Loss Prevention preinstallation steps..............................................................................................14 Confirming the Oracle database user permissions................................................................................................... 16 About external storage for incident attachments.......................................................................................................16 Verifying that servers are ready for Symantec Data Loss Prevention installation................................................. 17 Installing an Enforce Server............................................................................................................. 19 Preparing for an Enforce Server installation.............................................................................................................. 19 Installing the Java Runtime Environment on the Enforce Server............................................................................ 19 Installing an Enforce Server......................................................................................................................................... 20 Verifying an Enforce Server installation......................................................................................................................25 Installing a new license file.......................................................................................................................................... 25 Importing a solution pack.................................................................................................................27 About Symantec Data Loss Prevention solution packs............................................................................................ 27 Importing a solution packImporting the solution pack............................................................................................. 28 Installing and registering detection servers................................................................................... 30 About detection servers................................................................................................................................................ 30 Preparing for a detection server installation.............................................................................................................. 31 About Microsoft Rights Management file and email monitoring...............................................................................31 Installing the Java Runtime Environment on a detection server............................................................................. 32 Installing a detection server......................................................................................................................................... 32 Enabling Microsoft Rights Management file monitoring........................................................................................... 36 Enabling RMS detection for Azure-managed RMS...........................................................................................36 Verifying a detection server installation......................................................................................................................37 Registering a detection server..................................................................................................................................... 37 Configuring certificates for secure server communications.........................................................39 2 Symantec Data Loss Prevention Installation Guide for Windows About the sslkeytool utility and server certificates................................................................................................... 39 About sslkeytool command line options................................................................................................................... 39 Using sslkeytool to generate new Enforce and detection server certificates........................................................... 41 Using sslkeytool to add new detection server certificates........................................................................................42 Verifying server certificate usage..............................................................................................................................43 About securing communications between the Enforce Server and the database..................................................44 About orapki command line options......................................................................................................................... 44 Using orapki to generate the server certificate on the Oracle database..................................................................45 Configuring communication on the Enforce Server..................................................................................................46 Configuring the server certificate on the Enforce Server......................................................................................... 48 Verifying the Enforce Server database certificate usage......................................................................................... 48 About securing communications between the Enforce Server and Amazon RDS for Oracle................................49 Configuring Oracle RDS Option Group with SSL.....................................................................................................49 Configuring the server certificate on the Enforce Server......................................................................................... 49 Setting up an SSL connection over JDBC............................................................................................................... 50 Verifying the Enforce Server-Oracle RDS database certificate usage..................................................................... 50 Installing the domain controller agent to identify users in incidents.......................................... 52 About the domain controller agent..............................................................................................................................52 Domain controller agent installation prerequisites....................................................................................................52 Installing the domain controller agent.........................................................................................................................53 Domain controller agent post-installation tasks........................................................................................................ 54 Exclude an IP address or IP range from event collection........................................................................................54 Updating configuration settings after installation...................................................................................................... 55 Troubleshooting the domain controller agent............................................................................................................ 55 Uninstalling the domain controller agent....................................................................................................................56 Performing a single-tier installation................................................................................................ 57 Preparing for a single-tier installation.........................................................................................................................57

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    120 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us