Symantec Administration Console Admin Guide
Symantec Administration Console Admin Guide
Symantec Administration Console Admin Guide
Symantec, and the Symantec logo are U.S. registered trademarks of Symantec
Corporation. LiveUpdate, Symantec AntiVirus, Symantec Enterprise Security
Architecture, and Symantec Security Response are trademarks of Symantec Corporation.
Mac, Macintosh, Mac OS, eMac, Safari, and the Mac logo are trademarks of Apple
Computer, Inc. PowerMac, iMac, and Xserve are trademarks of Apple Computer, Inc.,
registered in the U.S. and other countries. MySQL is a registered trademark of MySQL AB
in Sweden and other countries. MySQL is a trademark in the United States and other
countries. Red Hat and all Red Hat-based trademarks and logos are trademarks or
registered trademarks of Red Hat, Inc. in the United States and other countries. Linux is a
registered trademark of Linus Torvalds. RSA is a registered trademark or trademark of
RSA Security Inc. in the United States and/or other countries. Netscape is a registered
trademark of Netscape Communications Corporation in the United States and other
countries. Windows and Internet Explorer are either registered trademarks or trademarks
of Microsoft Corporation. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014
http://www.symantec.com
Technical Support
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/ent/enterprise.html
Select your country or language under Global Support.
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade insurance and maintenance contracts
■ Information about Symantec Value License Program
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs or manuals
Symantec Early Warning These solutions provide early warning of cyber attacks,
Solutions comprehensive threat analysis, and countermeasures to
prevent attacks before they occur.
Managed Security Services These services remove the burden of managing and
monitoring security devices and events, ensuring rapid
response to real threats.
To access more information about Enterprise Services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
Symantec Corporation Software License Agreement
Symantec™ Administration Console for Macintosh®
SYMANTEC CORPORATION AND/OR ITS C. use the Software on a network, provided that You
SUBSIDIARIES (“SYMANTEC”) IS WILLING TO have a licensed copy of the Software for each computer
LICENSE THE SOFTWARE TO YOU AS AN that can access the Software over that network;
INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY D. use the Software in accordance with any written
THAT WILL BE UTILIZING THE SOFTWARE agreement between You and Symantec; and
(REFERENCED BELOW AS “YOU” OR “YOUR”) ONLY E. after written consent from Symantec, transfer the
ON THE CONDITION THAT YOU ACCEPT ALL OF THE Software on a permanent basis to another person or
TERMS OF THIS LICENSE AGREEMENT. READ THE entity, provided that You retain no copies of the
TERMS AND CONDITIONS OF THIS LICENSE Software and the transferee agrees in writing to the
AGREEMENT CAREFULLY BEFORE USING THE terms of this license.
SOFTWARE. THIS IS A LEGAL AND ENFORCEABLE
CONTRACT BETWEEN YOU AND THE LICENSOR. BY You may not:
OPENING THIS PACKAGE, BREAKING THE SEAL,
A. copy the printed documentation that accompanies
CLICKING THE “AGREE” OR “YES” BUTTON OR
the Software;
OTHERWISE INDICATING ASSENT
B. sublicense, rent, or lease any portion of the
ELECTRONICALLY, OR LOADING THE SOFTWARE,
Software; reverse engineer, decompile, disassemble,
YOU AGREE TO THE TERMS AND CONDITIONS OF
modify, translate, make any attempt to discover the
THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE
source code of the Software, or create derivative works
TERMS AND CONDITIONS, CLICK THE “I DO NOT
from the Software;
AGREE” OR “NO” BUTTON OR OTHERWISE INDICATE
C. use the Software as part of a facility management,
REFUSAL AND MAKE NO FURTHER USE OF THE
timesharing, service provider, or service bureau
SOFTWARE.
arrangement;
D. use a previous version or copy of the Software after
1. License: You have received and installed a disk replacement set
The software and documentation that accompanies or an upgraded version. Upon upgrading the Software,
this license (collectively the “Software”) is the all copies of the prior version must be destroyed;
proprietary property of Symantec or its licensors and E. use a later version of the Software than is provided
is protected by copyright law. While Symantec herewith unless You have purchased corresponding
continues to own the Software, You will have certain maintenance and/or upgrade insurance or have
rights to use the Software after Your acceptance of this otherwise separately acquired the right to use such
license. This license governs any releases, revisions, or later version;
enhancements to the Software that the Licensor may F. use, if You received the software distributed on
furnish to You. Except as may be modified by an media containing multiple Symantec products, any
applicable Symantec license certificate, license Symantec software on the media for which You have
coupon, or license key (each a “License Module”) that not received permission in a License Module; nor
accompanies, precedes, or follows this license, and as G. use the Software in any manner not authorized by
may be further defined in the user documentation this license.
accompanying the Software, Your rights and
obligations with respect to the use of this Software are 2. Content Updates:
as follows.
Certain Software utilize content that is updated from
time to time (including but not limited to the following
You may: Software: antispam software utilize updated antispam
A. use the number of copies of the Software as have rules; antivirus software utilize updated virus
been licensed to You by Symantec under a License definitions; content filtering software utilize updated
Module. If the Software is part of a suite containing URL lists; some firewall software utilize updated
multiple Software titles, the total number of copies You firewall rules; policy compliance software utilize
may use, in any combination of Software titles, may updated policy compliance updates; and vulnerability
not exceed the total number of copies indicated in the assessment products utilize updated vulnerability
License Module. Your License Module shall constitute signatures; these updates are collectively referred to as
proof of Your right to make such copies. If no License “Content Updates”). You shall have the right to obtain
Module accompanies, precedes, or follows this license, Content Updates for any period for which You have
You may make one copy of the Software You are purchased maintenance, except for those Content
authorized to use on a single computer; Updates that Symantec elects to make available by
B. make one copy of the Software for archival separate paid subscription, or for any period for which
purposes, or copy the Software onto the hard disk of You have otherwise separately acquired the right to
Your computer and retain the original for archival obtain Content Updates. Symantec reserves the right
purposes; to designate specified Content Updates as requiring
purchase of a separate subscription at any time and IN NO CASE SHALL SYMANTEC'S LIABILITY EXCEED
without notice to You; provided, however, that if You THE PURCHASE PRICE FOR THE SOFTWARE. The
purchase maintenance hereunder that includes disclaimers and limitations set forth above will apply
particular Content Updates on the date of purchase, regardless of whether or not You accept the Software.
You will not have to pay an additional fee to continue
receiving such Content Updates through the term of 5. U.S. Government Restricted Rights:
such maintenance even if Symantec designates such
RESTRICTED RIGHTS LEGEND. All Symantec products
Content Updates as requiring separate purchase. This
and documentation are commercial in nature. The
License does not otherwise permit the licensee to
software and software documentation are
obtain and use Content Updates.
“Commercial Items,” as that term is defined in 48
C.F.R. section 2.101, consisting of “Commercial
3. Limited Warranty: Computer Software” and “Commercial Computer
Symantec warrants that the media on which the Software Documentation,” as such terms are defined in
Software is distributed will be free from defects for a 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R.
period of thirty (30) days from the date of delivery of section 252.227-7014(a)(1), and used in 48 C.F.R.
the Software to You. Your sole remedy in the event of a section 12.212 and 48 C.F.R. section 227.7202, as
breach of this warranty will be that Symantec will, at applicable. Consistent with 48 C.F.R. section 12.212, 48
its option, replace any defective media returned to C.F.R. section 252.227-7015, 48 C.F.R. section 227.7202
Symantec within the warranty period or refund the through 227.7202-4, 48 C.F.R. section 52.227-14, and
money You paid for the Software. Symantec does not other relevant sections of the Code of Federal
warrant that the Software will meet Your requirements Regulations, as applicable, Symantec's computer
or that operation of the Software will be uninterrupted software and computer software documentation are
or that the Software will be error-free. licensed to United States Government end users with
only those rights as granted to all other end users,
TO THE MAXIMUM EXTENT PERMITTED BY according to the terms and conditions contained in this
APPLICABLE LAW, THE ABOVE WARRANTY IS license agreement. Manufacturer is Symantec
EXCLUSIVE AND IN LIEU OF ALL OTHER Corporation, 20330 Stevens Creek Blvd., Cupertino, CA
WARRANTIES, WHETHER EXPRESS OR IMPLIED, 95014, United States of America.
INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR 6. Export Regulation:
PURPOSE, AND NONINFRINGEMENT OF
Certain Symantec products are subject to export
INTELLECTUAL PROPERTY RIGHTS. THIS
controls by the U.S. Department of Commerce (DOC),
WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS.
under the Export Administration Regulations (EAR)
YOU MAY HAVE OTHER RIGHTS, WHICH VARY
(see www.bxa.doc.gov). Violation of U.S. law is strictly
FROM STATE TO STATE AND COUNTRY TO
prohibited. Licensee agrees to comply with the
COUNTRY.
requirements of the EAR and all applicable
international, national, state, regional and local laws,
4. Disclaimer of Damages: and regulations, including any applicable import and
SOME STATES AND COUNTRIES, INCLUDING use restrictions. Symantec products are currently
MEMBER COUNTRIES OF THE EUROPEAN prohibited for export or re-export to Cuba, North
ECONOMIC AREA, DO NOT ALLOW THE LIMITATION Korea, Iran, Iraq, Libya, Syria and Sudan or to any
OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR country subject to applicable trade sanctions. Licensee
CONSEQUENTIAL DAMAGES, SO THE BELOW agrees not to export, or re-export, directly or
LIMITATION OR EXCLUSION MAY NOT APPLY TO indirectly, any product to any country outlined in the
YOU. EAR, nor to any person or entity on the DOC Denied
TO THE MAXIMUM EXTENT PERMITTED BY Persons, Entities and Unverified Lists, the U.S.
APPLICABLE LAW AND REGARDLESS OF WHETHER Department of State's Debarred List, or on the U.S.
ANY REMEDY SET FORTH HEREIN FAILS OF ITS Department of Treasury's lists of Specially Designated
ESSENTIAL PURPOSE, IN NO EVENT WILL Nationals, Specially Designated Narcotics Traffickers,
SYMANTEC BE LIABLE TO YOU FOR ANY SPECIAL, or Specially Designated Terrorists. Furthermore,
CONSEQUENTIAL, INDIRECT, OR SIMILAR Licensee agrees not to export, or re-export, Symantec
DAMAGES, INCLUDING ANY LOST PROFITS OR LOST products to any military entity not approved under the
DATA ARISING OUT OF THE USE OR INABILITY TO EAR, or to any other entity for any military purpose,
USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN nor will it sell any Symantec product for use in
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. connection with chemical, biological, or nuclear
weapons or missiles capable of delivering such
weapons.
7. General: C. If the Software You have licensed is Symantec Client
Security, this Software utilizes the Standard Template
If You are located in North America or Latin America,
Library, a C++ library of container classes, algorithms,
this Agreement will be governed by the laws of the
and iterators. Copyright (c) 1996-1999. Silicon
State of California, United States of America.
Graphics Computer Systems, Inc. Copyright (c) 1994.
Otherwise, this Agreement will be governed by the
Hewlett-Packard Company.
laws of England and Wales. This Agreement and any
related License Module is the entire agreement
between You and Symantec relating to the Software
and: (i) supersedes all prior or contemporaneous oral
or written communications, proposals, and
representations with respect to its subject matter; and
(ii) prevails over any conflicting or additional terms of
any quote, order, acknowledgment, or similar
communications between the parties. This Agreement
shall terminate upon Your breach of any term
contained herein and You shall cease use of and
destroy all copies of the Software. The disclaimers of
warranties and damages and limitations on liability
shall survive termination. Software and
documentation is delivered Ex Works California, U.S.A.
or Dublin, Ireland respectively (ICC INCOTERMS 2000).
This Agreement may only be modified by a License
Module that accompanies this license or by a written
document that has been signed by both You and
Symantec. Should You have any questions concerning
this Agreement, or if You desire to contact Symantec
for any reason, please write to: (i) Symantec Customer
Service, 555 International Way, Springfield, OR 97477,
U.S.A., (ii) Symantec Customer Service Center, PO BOX
5689, Dublin 15, Ireland, or (iii) Symantec Customer
Service, 1 Julius Ave, North Ryde, NSW 2113,
Australia.
Technical Support
Chapter 1 Introducing the Symantec Administration Console
for Macintosh
About the Symantec Administration Console for Macintosh .......................13
About the client/server model ...........................................................................14
About the client ....................................................................................................15
Index
12 Contents
Chapter 1
Introducing the Symantec
Administration Console for
Macintosh
This chapter includes the following topics:
■ About the Symantec Administration Console for Macintosh
■ About the client/server model
■ About the client
Component Description
Administration console Web-based user interface for viewing client status and
managing client computers.
Component Description
MySQL relational database Database used by the Symantec Administration Console for
management system Macintosh database components.
Apache HTTP server Serves administration console Web pages (user interface).
Also, receives status and event updates from clients.
Introducing the Symantec Administration Console for Macintosh 15
About the client
A command that you issue from the administration console passes through to
the Apache HTTP Web server. The server stores information about the new
command in the appropriate database tables and instructs the command server
to issue the command to the UDP multicast address that was set when Symantec
Administration Console for Macintosh was installed. The command broadcasts
through one or more routers to individual clients and client groups registered
with the UDP address.
Clients can complete commands successfully, or fail or skip commands. In each
case, a client reports the result of the command to the Apache HTTP Web server.
In turn, the server updates the MySQL database tables and updates the
administration console displays with the software, event, or command status.
Components Description
Symantec Administration Receives and runs commands from the server and sends
Console for Macintosh back status to the server.
client software (daemon
This software is required for a client to be able to receive
process) and run commands from the Symantec Administration
Console for Macintosh server.
Symantec AntiVirus 10 for Software installed on the client and used by Symantec
Macintosh Administration Console for Macintosh to remotely perform
antivirus tasks on the client.
Preference Set Name The name that identifies your saved preference settings.
Host Name The LiveUpdate server’s FTP or HTTP address from which
clients can download LiveUpdate files.
Set Login and Check this option to set the Login Name and Password.
Password
Login and Password The authentication information that the client requires to
access the LiveUpdate server and download current files.
Select the file information to Select what you want to include in the scan
include in the scan report report that will be generated on the client.
Note: The SafeZone and Mount Scan features are new to Symantec AntiVirus 10
for Macintosh. Clients running Norton AntiVirus 9 ignore the preference
settings you send that pertain to these two features.
Guarding your network 21
Sending preferences to clients
Preference Set Name The name that identifies your saved preferences settings.
SafeZone settings Specify which areas of the client’s system to scan and
which areas to ignore.
Mount Scan settings Specify whether to scan disks when they are mounted,
whether to show a progress bar when scanning mounted
disks, and whether to eject infected disks. Also specify
which kinds of disks should be scanned when mounted and
which should be ignored.
Command Label The name that you assign to your command. The name appears
in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
Preference Set Type the name of the preference set that you configured.
6 Click Command.
Updating clients
One common reason that virus protection fails is that virus definitions are not
current. New threats to your network and many viruses arise on a continual
basis.
Running LiveUpdate connects you to the Symantec™ Security Response Web
site to determine if your virus definitions need updating. If so, LiveUpdate
downloads the files onto your network and installs them to the proper locations.
LiveUpdate also checks for program patches and downloads them as necessary.
The only prerequisite for running LiveUpdate is an Internet connection. To
enforce the antivirus policy for your enterprise, you may want to set preferences
for the LiveUpdate commands.
Guarding your network 23
Updating clients
Command Label The name that you assign to your command. The name appears
in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
6 Click Command.
24 Guarding your network
Initiating scans
Initiating scans
Virus scans inspect selected disks and folders on targeted client computers.
Scans initiated by the Virus Scan command automatically repair or quarantine
infected files, and scan compressed files. You may want to initiate a scan if you
suspect that a virus has been introduced on a client or group of clients. You can
initiate a virus scan at any time.
Command Label The name that you assign to your command. The name appears
in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
Scan target On the Scan target pop-up menu, you can select to scan the
following:
■ All mounted disks: Includes all local devices, all devices
attached to the client computer, and mounted network
volumes.
■ All mounted local disks: Includes all local devices and all
devices attached to the client computer.
■ Applications folder: The client’s boot volume’s
Applications folder.
■ Library folder: The client’s boot volume’s Library folder.
6 Click Command.
26 Guarding your network
Initiating scans
Chapter 3
Managing accounts,
clients, and groups
This chapter includes the following topics:
■ Managing clients
■ Managing groups
Note: See the Symantec AntiVirus 10 for Macintosh Installation Guide for more
information.
Note: You may want to have a new administrator use a specific Key ID so that his
or her commands can be tracked.
New Password A password for the new administrator account. You can
type an administrator password that is between one and
thirty-two characters.
User can create key pairs Grant or refuse rights to create key pairs.
New Password A password for the new administrator account. You can type
an administrator password that is between one and thirty-
two characters.
Managing clients
The administration console manages consistent and up-to-date antivirus
coverage across the enterprise, and reduces the need for users to independently
configure and manage their antivirus software. You can perform the following
tasks using the administration console:
■ Configure a client package.
■ Set client preferences.
■ Ping clients.
■ Edit the client list.
■ Remove clients.
Client Package Key ID The public key that is embedded into the client package
(Symantec Administration Client.pkg). By default, one key
appears on the pop-up menu. This is the key that the
administration console installation process generates.
You can create additional keys on the Create Public Key
page. If you do so, more keys will appear on the Client
Package Key ID pop-up menu.
Note: If your network includes more than 2000 computers, you should increase
the time between status updates to reduce network traffic.
2 Under Send Command Options, select Send command to all clients or Send
command to clients or groups checked above.
3 On the Command pop-up menu, click Ping.
4 Click Specify Parameters.
5 On the Ping page, specify the following:
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
6 Click Command.
Note: If you have a large number of computers for which you need to make
changes, it may be easier to make those changes directly in the database.
See “Tables in the database” on page 57.
Managing groups
You can use the administration console to simultaneously manage a collection
of clients by assigning clients to a group. You can create as many groups as you
like, and you can name and order them according to various classifications.
A client can belong to more than one group. For example, your network might
consist of the following groups:
■ Subnet1
■ Subnet2
■ Administrators
■ Non-administrators
Each client can belong to two of those groups because they are categorized in
different ways. However, you must be careful with certain group operations
such as setting preferences, because the options for one group can override
those set earlier for a different group.
Another advantage of managing clients in groups is that you can consistently
assign preferences and commands to a collection of clients. For example, you
can specify that Subnet1 members download from the Symantec LiveUpdate
server while Subnet2 members download from a local server.
34 Managing accounts, clients, and groups
Managing groups
Creating groups
Consider how you want to organize and classify your groups before beginning to
create them to avoid having to continuously reorganize them.
Note: You can also create groups using the Add to Group command.
See “Adding clients to a group” on page 34.
To create a group
1 On the Maintenance page, click Manage Groups.
2 On the Create Group page, next to Group Name, type a name for the new
group.
If other groups were created, they appear in the Groups table on the Create
Group page.
3 Click Create Group.
Deleting groups
Many scenarios exist in which you might need to delete a group. For instance,
you may decide to do so after merging the members of one group into another
because the network is being restructured. A group can be deleted only after all
of its members have been removed from the group.
To delete a group
1 On the Maintenance page, click Manage Groups.
2 Under Groups, click Remove Group next to the group that you would like to
remove.
3 You are asked if you are sure that you want to remove the selected group.
Click Yes, Remove to remove the group.
2 Under Send Command Options, select Send command to all clients or Send
command to clients or groups checked above.
3 On the Command pop-up menu, click Add to Group.
4 Click Specify Parameters.
5 On the Add to Group page, specify the following:
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
6 If you are creating a new group, click Create a new group and type a unique
name for the group.
7 Click Command.
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
6 Click Command.
Chapter 4
Managing commands
This chapter includes the following topics:
Re-enter Password Retype the password for the new key pair.
Public Key to Replace If you selected to overwrite an existing key, select the
administrative key to replace.
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID This is an integer by which the public key is identified at both
the server and the client.
This is the pre-existing key installed on the client and is used
to authenticate the command.
5 Click Command.
Note: If you are replacing a public key, use the Create Public Key command.
See “Creating a public key” on page 39.
Managing commands 41
Interrupting commands and processes
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
5 Click Command.
Terminating a command
When you terminate a command that you have issued to one or more clients or
groups, all processes associated with the command immediately halt. For
example, if you mistakenly issued an incorrect client package command, or
initiated a virus scan for all mounted disks instead of just the Applications
folder, this command could be useful.
To terminate a command
1 On the Send Commands page, if necessary, select one or more clients or
groups to receive the command.
2 Under Send Command Options, select Send command to all clients or Send
command to clients or groups checked above.
3 On the Command pop-up menu, click Terminate Command.
4 Click Specify Parameters.
5 On the Terminate Command page, specify the following:
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
6 Click Command.
Resetting a client
Reset a client to clear out any queued commands on that client. For example, a
client may appear to be stuck if it is failing to receive any commands. Resetting
the client clears any commands that have not been executed, and the client then
retrieves the unexecuted commands from the server’s queue of commands and
attempts to execute them.
To reset a client
1 On the Send Commands page, if necessary, select one or more clients or
groups to receive the command.
Managing commands 43
Interrupting commands and processes
2 Under Send Command Options, select Send command to all clients or Send
command to clients or groups checked above.
3 On the Command pop-up menu, click Reset Client.
4 Click Specify Parameters.
5 On the Reset Client page, specify the following:
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
6 Click Command.
Rebooting a client
To reboot a client means to issue a command to halt all client processes, shut
down, and then restart the computer. Even after resetting a client, problems can
persist and you may decide that rebooting the client is a possible solution.
Another reason to reboot is if you have issued a LiveUpdate command that
downloads an update that requires a restart.
When the client receives the reboot command, an alert appears informing users
that their computer will reboot, and asking them to save their work and click
Restart. You can provide an alternative message if you want.
Note: If the alert remains on the desktop for more than twelve hours, the client
computer will automatically reboot.
To reboot a client
1 On the Send Commands page, if necessary, select one or more clients or
groups to receive the command.
2 Under Send Command Options, select Send command to all clients or Send
command to clients or groups checked above.
3 On the Command pop-up menu, click Reboot Client.
4 Click Specify Parameters.
44 Managing commands
Interrupting commands and processes
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
Optional message to Type an informational message that will appear on the client
user computer. This setting is optional.
6 Click Command.
Chapter 5
Managing software
installation
This chapter includes the following topics:
■ Installing software
Installing software
The administration console provides the following commands to install, update,
and customize software installations across the enterprise:
■ Install Software
■ Download Script
■ Run Custom Script
The Install Software command causes clients to download, from a URL or
alternative server, the package that contains the software. The client then
decrypts and installs the software.
Like the Install Software command, the Download Script command directs
clients to download, decrypt, and install specific software, update packages, and
scripts. In addition, you can modify the script to specify incremental updates
and full installations.
46 Managing software installation
Installing software
Creating a package
Before running the Install Software command, you must use the command line
command, SymInstallPackage, to create the package that will contain the
software and additional files.
Note: For information about creating a package, see the man page entry for
SymInstallPackage.
When you use the command line script to create a package, contents typically
include the following:
■ An encrypted key, associated with the package and used to verify that the
package originated from the server
■ One or more scripts that tell the client what to do with the package
■ A tar file that contains the software installer package
The location of the tar file that contains the installer package is used as the URL
in the Install Software command.
You do not have to limit the files that you include in the package to installation
files. However, if you do include another kind of file, you must also include a
script telling the client what to do with it. If the file is a .pkg file, that script is
provided automatically.
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
Install Package URL An FTP or HTTP address from which the client downloads the
desired script.
Note: For information about creating a package, see the man page entry for
SymInstallPackage.
The Download Script command is useful if you need to run a particular script on
multiple occasions. You can refer to the script’s location on the server, and only
the command’s parameters need be entered before you download the script.
You can issue the Download Script command at any time.
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
Script Package URL An FTP or HTTP address from which the client downloads the
installer package for the desired script.
Command Label The name that you assign to your command. The name
appears in the Command log after you issue the command.
Command Expires The time period in which the command is active. Enter a
number, and then specify the period in days, weeks, or
months.
Command Key ID The integer by which the public key is identified at both the
server and the client.
6 Click Command.
50 Managing software installation
Running a custom script
Chapter 6
Reviewing network status
This chapter includes the following topics:
Viewing events
Events are actions initiated on the client, such as when Auto-Protect detects a
virus. Viruses detected during a scan initiated by the server appear as events;
however, viruses detected during a manual scan initiated on the client do not.
Events can be viewed in the following logs:
■ Events log
■ Client Events log
Auto-Protect Enabled Displays the number of clients running Auto-Protect and a link to
Clients the list of clients.
Auto-Protect Displays the number of clients with Auto-Protect turned off and a
Disabled Clients link to the list of clients.
Outdated Virus Displays the number of clients running Norton AntiVirus with
Definitions Summary virus definitions older than eight days and a link to the list of
clients.
Name Description
Prevalent Viruses Displays the most active viruses by name, showing the detection
total for each and when the detection occurred.
54 Reviewing network status
Viewing installed client software
Name Description
Virus Detections Displays the name of the last 15 viruses detected and when each
was last detected.
LiveUpdate Host Displays the client, its location, and the server address that the
client’s LiveUpdate is configured to use.
Auto-Protect Status Displays the client, its location, and whether Auto-Protect is on
or off on the client.
Virus Definitions Displays the client, its location, and the date of its virus
Date definitions file.
To sort a log
◆ At the top of a log or report, click an underlined column header.
To filter a log
1 At the top of a log or report, on the Filter by pop-up menu, select a column
heading.
2 In the adjacent box, type a value.
3 Click Filter.
56 Reviewing network status
Purging log data
To remove a filter
1 Remove the value from the box.
2 Click Filter.
■ Nodesoftware table
■ Nodetogroup table
■ Software table
■ Softwarestatus table
■ Softwarestatuskey table
■ Softwarevers table
■ Statuslog table
Adminuser table
The adminuser table stores all known administration users. Table A-1 provides a
list of the keys, data types, data type storage sizes, and a description of each
column for the adminuser table.
Cmdlib table
The cmdset table is related to the cmdlib table, linked by SetName, and
represents a one-to-one relationship. Both tables define the command library
for the administration console commands.
Table A-2 provides a list of the keys, data types, data type storage sizes, and a
description of each column for the cmdlib table.
Cmdset table
The cmdset table is related to the cmdlib table, linked by SetName, and
represents a one-to-one relationship. Like the cmdlib table, the cmdset defines
the command library for the administration console commands.
Table A-3 provides a list of the keys, data types, data type storage sizes, and a
description of each column for the cmdset table.
Cmdtemplate table
The cmdtemplate table stores information about command templates. Table A-4
provides a list of the keys, data types, data type storage sizes, and a description
of each column for the cmdtemplate table.
Command table
The command table stores commands that have been broadcast from the
administration console to the clients. Table A-5 provides a list of the keys, data
types, data type storage sizes, and a description of each column for the
command table.
Eventlog table
The eventlog table saves reports regarding client-generated events such as virus
detection. This table stores the event data immediately following the event.
Table A-6 provides a list of the keys, data types, data type storage sizes, and a
description of each column for the eventlog table.
Index Entered timestamp 14 When the event was stored in the log,
server local time.
About the Symantec Administration Console for Macintosh database 63
Tables in the database
EventCode tinytext
EventSubValue tinytext
Ngroup table
The ngroup table tracks defined groups. Table A-7 provides a list of the keys,
data types, data type storage sizes, and a description of each column for the
ngroup table.
Node table
The node table defines the individual clients (not groups) that are known to the
network. This table has a many-to-many relationship with ngroup.
Table A-8 provides a list of the keys, data types, data type storage sizes, and a
description of each column for the node table.
Nodesoftware table
The nodesoftware table links the softwarevers and software tables to the node
table so that all the software on a particular client is stored. Table A-9 provides a
list of the keys, data types, data type storage sizes, and a description of each
column for the nodesoftware table.
Nodetogroup table
The nodetogroup table establishes a many-to-many relationship between the
node and ngroup tables. Each record in the nodetogroup table defines the
relationship between one node and one group.
Table A-10 provides a list of the keys, data types, data type storage sizes, and a
description of each column for the nodetogroup table.
Software table
The software table stores all administrator-managed software on the network.
The table is defined by a one-to-many relationship to the softwarevers table.
Table A-11 provides a list of the keys, data types, data type storage sizes, and a
description of each column for the software table.
Softwarestatus table
The softwarestatus table stores information about software installed on client
computers. This table is designed to be expandable in the future.
Table A-12 provides a list of the keys, data types, data type storage sizes, and a
description of each column for the softwarestatus table.
Softwarestatuskey table
The softwarestatuskey table stores information used by the logs in the
administration console. Table A-13 provides a list of the keys, data types, data
type storage sizes, and a description of each column for the softwarestatuskey
table.
Table A-13 Softwarestatuskey table
Softwarevers table
The softwarevers table stores information about all administrator-managed
software on the network. This table is makes up a one-to-many relationship with
software. Table A-14 provides a list of the keys, data types, data type storage
sizes, and a description of each column for the softwarevers table.
Statuslog table
The statuslog table stores information about client’s responses to commands,
and status and log information.
Table A-15 provides a list of the keys, data types, data type storage sizes, and a
description of each column for the statuslog table.
-7 The execution of the command has failed on the client, perhaps because a client
file is deleted or corrupted.
-10 The command cannot execute because the software version is not compatible
with the command.
A Commands
adding clients to groups 34
Administrator accounts
broadcasting public keys 40
creating 28
creating command templates 37
editing 29
creating groups 34
overview 27
creating public keys 39
removing 29
deleting command templates 38
AntiVirus
deleting groups 34
Auto-Protect 53
Install Software 45
configuring Auto-Protect preferences 21
installing client software 45, 46
outdated virus definitions 53
installing client software updates 45
restoring LiveUpdate preferences 19
pinging 31
running LiveUpdate 47
removing clients 33
scanning the client for viruses 24
removing clients from groups 35
updating intermittent clients 24
removing public keys 40
updating program files 17
restoring LiveUpdate preferences 19
updating protection files 17
running custom scripts 48
updating virus definitions 17
running LiveUpdate Everything 47
viewing software status logs
scanning the client for viruses 24
viewing Auto-Protect settings 55
updating program files 17
viewing virus definitions date 55
updating protection files 17
Auto-Protect status 53
updating virus definitions 17
using command templates 38
C
Client Events log 52 D
Client-installed software 54
Database column name
Clients
added info 68
adding to groups 34
cmd index 60
installing client software updates 45
cmd name 60, 61
installing software 45, 46
cmdname 59
managing 30
command serial 64
pinging 31
comment 61, 62
public keys 40
defaultflags 59
removing 33
download 67
updating intermittent connections 24
entered 62, 68
Command log 52
event 63
Command templates
EventCode 63
creating 37
EventSubValue 63
deleting 38
expiration 61
overview 37
flags 61
using 38
group id 63, 65
72 Index
Logs (continued)
Events 52
purging 56
software status 55
M
Mac OS X Server 10.3, components of 14
Mount Scan settings 21
P
Ping command 31
Preferences
configuring Auto-Protect 21
restoring LiveUpdate options 19
Prevalent Viruses 53
Purging log data 56
R
Reports, customizing views 55
Run Custom Script command 48
S
SafeZone settings 21
Security
broadcasting public keys 40
digital signatures 15
public/private key pair encryption 39
removing public keys 40
Software status logs 55
Status overview 51
Symantec Administration Console for Macintosh,
components 14
Symantec Macintosh Administration Console client
software 15
V
Virus definitions, updating intermittent clients 24
Virus Detections 53