Symantec Endpoint Protection v12.1 Guide
Symantec Endpoint Protection v12.1 Guide
Introduction
This document describes the installation procedure and setting guide for Symantec
Endpoint Protection v12.1 (server & client). The Symantec Endpoint Protection Manager is
the server that is used for deploying the client software and management of client machines.
The clients may be installed with Yokogawa products like CENTUM VP, CENTUM CS 3000,
PRM, ProSafe-RS, or VTSPortal.
The installation and setting of the Symantec Endpoint Protection Manager on 32-bit and 64-
bit Windows operating systems are covered in this document.
Please refer to “R2-2011-8171 Exclusion folder for antivirus software (Internal Use Only)”
for the applicable system product revisions and the exclusion folders. Also for the
exclusion folders, please also refer to “7 Exclusion Folder” in this document.
Table of Contents
Introduction ........................................................................................................................... 1
1 Installation Procedure .................................................................................................... 2
2 Before Installation .......................................................................................................... 3
2.1 Software Requirement............................................................................................ 3
2.2 Preparation on Client Machine ............................................................................... 3
2.3 Preparation for Client Machine in Different Subnet................................................. 7
2.4 Preparation for Server Machine (Symantec Endpoint Protection Manager) ........... 9
3 Installing Symantec Endpoint Protection Manager ...................................................... 11
4 Configuring Symantec Endpoint Protection Manager .................................................. 19
4.1 Create Group for Symantec Endpoint Protection Clients...................................... 19
4.2 Configuring Update Policy for Clients ................................................................... 23
4.3 Create new Client Install Feature Set ................................................................... 25
4.4 Activate Symantec Endpoint Protection License .................................................. 26
5 Deploying Client Software ........................................................................................... 30
6 Virus Definition Update ................................................................................................ 39
6.1 Download Definition Update File .......................................................................... 39
6.2 Verify Successful Update on Symantec Endpoint Protection Manager ................ 40
6.3 Verify Successful Update on Symantec Endpoint Protection Clients.................... 43
7 Exclusion Folder .......................................................................................................... 46
7.1 Setup User-defined Exceptions ............................................................................ 46
Preparation for
Server Machine
(Chapter: 2,
Section: 2.4)
Install Symantec
Endpoint Protection
Manager
(Chapter: 3)
Configure Symantec
Endpoint Protection
Manager
(Chapter: 4)
Deploy Client
Software
(Chapter: 5)
Manual Virus
Definition Update
(Chapter: 6)
Installation of
Yokogawa Product Configure Exceptions
such as CENTUMVP, (Chapter: 7)
CS3000, PRM,
ProSafe-RS, VTSPortal
Note: It’s recommended to install Symantec Endpoint Protection v12.1 first before
installing Yokogawa products such as CENTUM VP, CENTUM CS 3000, PRM,
ProSafe-RS, or VTSPortal. Installation of Yokogawa Products will not be covered by
this document.
- Internet Explorer 7, 8, or 9.
The computers on which you deploy the Symantec Endpoint Protection client software
should meet the following software requirements:
2. Enable Network Discovery and File Sharing (Windows Vista and Windows Server 2008).
a. From the Control Panel, double click “Network and Sharing Center”.
b. Under “Sharing and Discovery”, click “Network Discovery” (See Figure 2-3).
c. Select “Turn on Network Discovery” and then click the [Apply] button.
d. Similarly, expand the “File sharing” option. Select “Turn on File sharing” and
then click the [Apply] button.
c. In the next window, click the [Change settings] button. Next, place a check
mark for “File and Printer Sharing” and “Network Discovery” respectively for the
current network profile (e.g. Public) that is used on the computer and then click
the [OK] button (Figure 2-5).
Figure 2-5: Allow File and Printer Sharing & Network Discovery
5. Enable the built-in Administrator account (Windows Vista and Windows 7).
a. Click [Start] -> [Settings] -> [Control Panel] -> [Administrative Tools] ->
[Computer Management].
b. In the Computer Management window, click and expand “Local Users and
Groups”.
c. Click [Users] folder.
d. In the right pane, right-click [Administrator], and then select [Set Password...].
e. In the Warning prompt, click [Proceed] button to continue (Figure 2-7).
f. In the Set Password for Administrator dialog box, type the same password in
the password boxes, and then click the [OK] button (Figure 2-8).
5. Verify if you can remote access remote administrative share such as “C$”.
a. Click [Start] -> [Run].
b. Type “\\<target client computer name>\C$”.
Note: Remote access to administrative share such as “C$” is one way to test if your
current user, set to access client machine, can do remote client deployment /
installation.
3) On Windows XP or Windows Server 2003 R2 clients (if Windows Firewall is turned on).
a. Click [Start] -> [Control Panel] -> [Administrative Tools] -> [Windows Firewall]
b. Select “File and Printer Sharing” and click the [Edit] button.
c. In the Edit a Service dialog, select “TCP 139” and click the [Change scope…]
button (Figure 2-12).
d. Next, select the option “Any computer (including those on the Internet)” in the
Change Scope dialog and click the [OK] button (Figure 2-13).
e. Repeat the procedures to change the scope for “TCP 445” as well.
1. Enable Network Discovery and File and Printer Sharing (Windows 7 and Windows
2. Enable exception for File and Printer Sharing (if Windows Firewall is turned on for
Windows XP or Windows Server 2003 R2).
a. Please refer to the procedures provided in Section 2.2, point 4.
1. Insert the installation disc to the optical drive of the computer. The Symantec Endpoint
Protection Installation Program window will appear. Click on [Install Symantec
Endpoint Protection] to continue (Figure 3-1).
2. In the next panel, click [Install Symantec Endpoint Protection Manager] (Figure 3-2).
3. In the Symantec Endpoint Protection Manager window, click [Next] button to continue
(Figure 3-3).
4. In the License Agreement panel, select “I accept the terms in the license agreement”
and click the [Next] button to continue (Figure 3-4)..
5. In the Destination Folder panel, accept or change the installation directory, and then
click the [Next] button to continue (Figure 3-5).
6. In the Ready to Install the Program panel, click the [Install] button to start the
installation (Figure 3-6).
7. The installation of the Symantec Endpoint Protection Manager should start and the
progress is shown in the panel (Figure 3-7).
8. When the installation of the management server and console is completed, click the
[Next] button to start the configuration of the management server (Figure 3-8). The
Management Server Configuration Wizard will be loaded after this (Figure 3-9).
10. In the next panel, fill in all the required fields to create a system administrator account
and click the [Next] button to continue (Figure 3-11).
11. In the next panel, leave the settings at default and click the [Next] button to continue
(Figure 3-12).
12. When the Send Test Email dialog appears, click the [No] button to continue (Figure 3-
13).
13. In the Data Collection panel, uncheck the option to allow submitting anonymous
system and usage information to Symantec and click the [Next] button to continue
(Figure 3-14).
14. In the next panel, review all the settings to be configured for the management server
and click the [Next] button to continue (Figure 3-15).
15. The creation and initialization of the Symantec Endpoint Protection database will begin
shortly (Figure 3-16).
16. When the configuration of the management server is completed, click the [Finish]
button to complete the installation of the Symantec Endpoint Protection Manager
(Figure 3-17).
2. When the Windows Security Alert dialog appears to warn about blocking of the
Desktop Integration Components binary program, click the [Allow access] button (for
Windows 7) to add an exception for this program to the Windows Firewall (Figure 4-2).
For the case of Windows XP or Windows Server 2003 R2, click the [Unblock] button
(Figure 4-3).
3. If the operating system is Windows Server 2003 R2 or Windows Server 2008 R2, a
dialog from Internet Explorer may appear to notify that some content from the local
website (created by Symantec Endpoint Protection Manager during installation) is
being blocked by Internet Explorer Enhanced Security Configuration. In this case, click
the [Add…] button to continue (Figure 4-4). In the Trusted sites dialog, click the [Add]
button to add the website to the list of trusted sites and then click the [Close] button to
continue (Figure 4-5).
4. When the Welcome page appears, click the [Close] button to close this page (Figure 4-
6)
5. In the Symantec Endpoint Protection Manager window, click on [Clients] in the left
pane. Next, click on the [My Company] folder under Clients and then select [Tasks] ->
[Add a group] (Figure 4-7)
2. In the Edit Policy dialog, click the [Create Non-shared Policy From Copy] button
(Figure 4-10).
3. In the LiveUpdate Policy window, select [Windows Settings] -> [Server Settings].
Uncheck the option [Use a LiveUpdate server]. Next, place a check mark beside the
option [Enable third party content management] (Figure 4-11).
1. In the Symantec Endpoint Protection Manager window, click on [Admin] in the left pane
and select [Install Packages]. In the Install Packages panel, click on [Client Install
Feature Set] and then select [Tasks] -> [Add Client Install Feature Set] (Figure 4-12).
2. In the Add Client Install Feature Set dialog, enter the details for Name and Description
and select the features to be installed on the clients as shown in the figure below.
Click the [Ok] button to create the new Feature Set (Figure 4-13).
1. In the Symantec Endpoint Protection Manager window, click on [Admin] in the left pane
and select [Licenses]. In the Licenses panel, click on [Trial] and then select [Tasks] ->
[Activate license] (Figure 4-14)
2. In the License Activation Wizard window, select the option “I have a Symantec License
file (.slf)” and click the [Next] button to continue (Figure 4-15).
3. Select the appropriate .slf file and it will be uploaded to the License Activation Wizard.
Click the [Next] button to continue (Figure 4-16).
4. Next, the details of the selected license file will be shown in the License Activation
Wizard. Confirm the information is correct and click the [Next] button to continue
(Figure 4-17)
5. If the license is activated correctly, the result will be shown in the License Activation
Wizard (Figure 4-18).
1. In the Symantec Endpoint Protection Manager window, click on [Clients] in the left
pane. Next, click on the folder of the group where you want to assign the clients (e.g.
VTP) and then select [Tasks] -> [Add a client] (Figure 5-1).
2. The Client Deployment Wizard window will appear. In the Select Deployment Type
panel, select “New Package Deployment” as the deployment type and click the [Next]
button to continue (Figure 5-2).
3. In the Select Group and Install Feature Sets panel, make the selections as shown in
Figure 5-3 (install the client software on the Symantec Endpoint Protection Manager
computer itself) or Figure 5-4 (for computers where Yokogawa products will be
installed).
4. In the Installation Method panel, leave the selection at default (Remote Push) and click
the [Next] button to continue (Figure 5-5).
6. In the Find Computers dialog, select either “IP address range” and enter a beginning
and ending IP address or “Computer name” and enter the name of the client computer.
Click the [OK] button to start searching for the computers (Figure 5-7).
7. If the computers can be found successfully, they will be listed under Available
Computers. Next, select the computers where you want to install the client software
and click the [>>>] button (Figure 5-8).
8. The Login Credentials dialog will appear. Enter the required information and then click
the [OK] button to continue (Figure 5-9).
NOTE:
a) For clients in a Domain environment, use the logon credentials of the domain
administrator. Enter the name of the domain which the computer belongs in “Domain
or Workgroup”.
b) For clients in a Workgroup environment, use the logon credentials of the local
administrator of the computer. Enter the name of the workgroup which the computer
belongs in “Domain or Workgroup”.
9. Once all the required computers are added to the list of installation targets, click on the
[Next] button in the Computer Selection panel (Figure 5-10).
10. In the next panel, a list of computers to be installed with the client software will be
displayed. After confirming, click the [Send] button to start the deployment (Figure 5-
11).
12. Once the deployment is completed, the deployment status of each computer is shown
in the deployment summary in the next panel. Click the [Next] button after reviewing
the summary (Figure 5-13).
14. All the clients managed by the Symantec Endpoint Protection Manager under the
selected group will be displayed after a short while when the installation of the client
software is completed (Figure 5-15).
15. On the client computer, the client software installation should be successful and the
Symantec Endpoint Protection icon with a yellow exclamatory mark will be seen in the
notification area (Figure 5-16). After approximately 10 to 15 minutes (depending on the
network), the communication between the Symantec Endpoint Protection Manager and
client computer will be established and the mark will be changed to a green dot in the
icon (Figure 5-17).
2. Select the 32-bit or 64-bit version for the Symantec Endpoint Protection Manager
(Figure 6-1)
3. Download and save the file on the desktop or other locations on the Symantec
Endpoint Protection Manager computer.
4. After the download is completed, rename the file extension to .jdb from .zip.
6. Within 30 seconds to a minute, the *.jdb file will be processed and a new folder will be
created automatically at the same location (Note: All the files and folders are removed
from the incoming folder upon completion of processing).
2. In the Symantec Endpoint Protection Manager window, click on [Monitors] in the left
pane and select the [Logs] tab. Select Log type: System and Log content: Server
Activity and then click the [View Log] button (Figure 6-4). If the Virus & Spyware
definition on the Symantec Endpoint Protection Manager is “downloaded” (updated)
correctly, 3 associated events will be generated in the system logs accordingly (Figure
6-5).
3. The new Virus & Spyware definition will then be automatically applied to the client
computers.
2. On the client computer, click [Start] -> [All Programs] -> [Symantec Endpoint
Protection]. In the Symantec Endpoint Protection window, check the status, date and
revision of the Virus and Spyware protection definition (Figure 6-7).
3. In the Symantec Endpoint Protection window, select View Logs from the left pane and
then click the [View Logs] button for Virus and Spyware Protection. In the context
menu that appears, select System Log (Figure 6-8). In the Virus and Spyware
Protection Logs window, a Definition File Loaded event should be recorded when the
definition is updated. Check the version of the definition file (Figure 6-9).
3. In the Exception window, click on the [Add] button. Next, select [Security Risk
Exception] -> [Folder] from the context menu (Figure 7-2).
Note: Please refer to the following document for the list of exclusion folders of
Yokogawa products for antivirus software: “R2-2011-8171 Exclusion folder for
antivirus software (Internal Use Only).”
5. After adding the folder(s), confirm the setting(s) in the Exceptions window. If
everything is correct, click the [Close] button to apply the setting(s) and exit (Figure 7-
4).