Symantec Critical System User Manual
Symantec Hardware
Table of contents
Document Outline
- Symantec™ Critical System Protection Installation Guide
- Technical Support
- Contents
- Introducing Symantec™ Critical System Protection
- Planning the installation
- About planning the installation
- About network architecture and policy distribution
- System requirements
- Disabling Windows XP firewalls
- About using firewalls with Symantec Critical System Protection
- About name resolution
- About IP routing
- About intrusion prevention
- About simple failover
- About the Windows NT agent installation
- About log files
- What to do after installation
- Installing Symantec Critical System Protection on Windows
- About installing Symantec Critical System Protection on Windows
- About installing a database to a SQL Server instance
- Configuring the temp environment variable
- Installing the management server
- Installing and configuring the management console
- Installing a Windows agent
- Unattended agent installation
- Installing the Windows NT policy
- Uninstalling Symantec Critical System Protection
- Temporarily disabling Windows agents
- Reinstalling Windows agents
- Installing UNIX agents
- Migrating to the latest version
- Migrating legacy installations of Symantec Critical System Protection
- Migrating other legacy agent installations
- Checklist for migrating from Symantec Intruder Alert
- Checklist for migrating from Symantec Host IDS
- Migrating legacy agent software
- Preparing for detection policy migration
- Migrating legacy detection policy files
- Index