beautypg.com

System requirements – Symantec Critical System User Manual

Page 16

background image

16 Planning the installation

System requirements

along with a few agents, and become familiar with Symantec Critical System
Protection operations. When you are ready to roll out policies to your
production environment, you can roll out different policies that are based on
computing needs, and prevention and detection levels.

Areas where computing needs and prevention and detection levels might differ
include the following:

Local workstations

Remote annex workstations

Computers that run production databases

Computers that are located in demilitarized zones (DMZ) such as Web
servers, mail proxy servers, public DNS servers

Prevention policies pushed to local and remote workstations would most likely
be less restrictive than prevention policies pushed to production databases and
DMZ servers.

Detection policies pushed to local workstations, production databases, and DMZ
servers would also differ. Detection policies pushed to production databases and
DMZ servers are more likely to offer more signatures than policies pushed to
workstations.

You can distribute different policies to different computers by creating agent
groups with the management console and then associating the agents with one
or more groups during agent installation. You first create the groups using the
management console, set the different policies for the groups, and then
associate the agents with the groups during installation. It is not necessary,
however, to associate an agent with a group during installation. You can
perform this operation after installation.

See the Symantec Critical System Protection Administration Guide for details on
how to create agent groups.

System requirements

System requirements fall into the following categories:

Operating system requirements

Hardware requirements