Symantec Critical System User Manual
Page 120
120 Index
L
Linux agents
disabling and enabling 93
kernel driver support 19
monitoring and restarting 98
uninstalling manually 87
log files
M
management console
configuring 49
configuring server 50
hardware requirements 20
installing 49
operating system requirements 17
setting up initial password 50
uninstalling 67
using encrypted communications 50
verifying server certificate 50
management server
alternate 74, 103
database 67
evaluation installation
hardware requirements 20
installation settings 38
installation type 38
installing 36
installing into database instance previously
used for Symantec Critical System
Protection 37
operating system requirements 17
primary 74, 103
production installation
Tomcat and database schema 45
Tomcat only 47
uninstalling 67
Web server administration port 39
Web server shutdown port 39
management server certificate 53
MDAC requirements 35
migration
applying policies to agents 117
compiling policies 116
configuring option group 116
conversion utility files 110
creating new policies 113
detection policies 109
legacy agent software 105, 109
legacy Symantec Critical System Protection
migrating detection policy files 111
policy conversion utility 111
providing scspdba password during
silent Windows agent migration 103
Symantec Host IDS 108
Symantec Intruder Alert 106
validating rule types and criteria 115
validating rules 114
installation commands 60
installation properties 61
N
name resolution 23
network architecture 15
notification port 52, 62, 82
P
policy files, converting legacy 111
policy override tool 66, 67, 70
polling interval 52, 83
port numbers 32
R
reinstallation
S
server.xml, editing 50
service user name 40
alternate account 55, 64
LocalSystem account 55, 64
Solaris agents
disabling and enabling 91
monitoring and restarting 98
required system packages 18
uninstalling manually 85