SPE For NAS Getting Started Guide
SPE For NAS Getting Started Guide
SPE For NAS Getting Started Guide
v7.5.3
Symantec™ Protection Engine for Network Attached
Storage Getting Started Guide
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Legal Notice
Copyright © 2016 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Getting Started
This document includes the following topics:
■ System requirements
Note: From version 7.0, Native protocol has been deprecated. Symantec
recommends the use of either ICAP or RPC protocol.
Dedicated virus scanning for Web traffic is recommended for the following reasons:
■ Scanning Web traffic lets you catch and block threats at the gateway, rather
than multiple times at each desktop. Users can potentially disable desktop
protection, which can leave your network vulnerable to attack.
■ Because many people now use Web-based email, email-born viruses that would
otherwise be caught by antivirus scanning at the SMTP gateway can slip through
to infect the network.
■ The industry trend has been to Web-enable many application environments to
include the use of technologies like ActiveX, JavaScript, and Java applets to
enhance the user experience. Many new threats are associated with these Web
technologies. Malicious mobile code viruses, such as Nimda and Code Red,
have entered networks as executables (for example, ActiveX, JavaScript, or
Visual Basic Scripts) that appear to be part of safe Web content.
■ The industry trend has been to Web-enable many application environments to
include the use of technologies like ActiveX applet to enhance the user
experience. Many new threats are associated with these Web technologies.
Malicious mobile code viruses, such as Nimda and Code Red, have entered
networks as executables (for example, ActiveX, JavaScript, or Visual Basic
Scripts) that appear to be part of safe Web content.
■ Once a threat has been cached, malicious code can potentially be passed to
other users on the network, which can compromise additional computers and
data on the network.
■ Malicious code can result in lost, stolen, or corrupted files, which can result in
costly downtime to the enterprise.
Engine devotes to decompose a file and its contents, the maximum file size for
container files, and the maximum number of nested levels to be decomposed for
scanning.
Symantec Protection Engine for Messaging uses the following technologies to
protect your messaging environment from threats:
Automatic product and virus Symantec LiveUpdate technology ensures that your network
definitions updates is not at risk of infection from newly discovered viruses. The
updates are handled automatically without having the restart
services or redeploy software. This ensures no interruption
in scanning services during the updates.
You can also update risk definitions using Rapid Release or
Intelligent Updater.
Feature Description
Support for Rapid Release v5 packages on Symantec Protection Engine 7.5.3 now
Windows platforms supports the Rapid Release v5 definitions
on Windows platforms.
Support to block the file based on its true type Now with Symantec Protection Engine 7.5.3,
you can block the file based on its true type.
FTP protocol support for LiveUpdate Earlier, only HTTP was supported for
LiveUpdate. Now, you can use FTP protocol
to download definitions from the desired
(local) server.
https://support.symantec.com/
en_US/article.INFO3193.html
Feature Description
Removal of support for JRE 6.0 Support for JRE 6.0 is removed in Symantec
Protection Engine 7.5.2.
HTTP support for local reputation server Symantec Protection Engine 7.5.2 now
supports “HTTP” protocol for server URL
configuration setting for local reputation
server.
Getting Started 9
What's new in Symantec Protection Engine
Feature Description
Removal of Java dependency in Symantec You can now install and configure Symantec
Protection Engine Protection Engine without the dependency
on Java.
Feature Description
Security improvements for silent installation Prior to Symantec Protection Engine 7.5.0,
the response file, required to initiate the
silent installation, had to be located in the
temp directory of the user. This meant that
any user had access to the file.
New Product Catalog for Symantec Protection Customers who use Symantec
Engine LiveUpdate™ Administrator (LUA) to
download definitions to their local
LiveUpdate server for distribution, must
update their product catalog in the LUA. To
download new definitions, you must add
Symantec Protection Engine 7.5 to the
product catalog in the LUA.
Getting Started 11
About supported protocols for Symantec Protection Engine
Protocol Description
Protocol Description
For more details on the supported protocols, see Symantec Protection Engine
Implementation Guide.
Adobe Acrobat Reader is required to view the reports that are generated in .pdf
format. You can download Adobe Acrobat Reader from http://www.adobe.com/.
■ Install Java 2SE Runtime Environment (JRE) 7.0 (update 80 or later) or JRE
8.0 (update 66 or later) on the server.
Getting Started 16
Before you install Symantec Protection Engine
Note: Symantec Protection Engine supports only 32-bit versions of Java Runtime
Environment. Symantec Protection Engine cannot be installed with 64-bit JRE
versions.
■ Disable any third-party antivirus products that are running on the server on which
you plan to install Symantec Protection Engine. You can turn on antivirus
protection after installation is complete.
Symantec Protection Engine scans the files that client applications pass to
Symantec Protection Engine. Symantec Protection Engine does not protect the
computer on which it runs. Since Symantec Protection Engine processes the
files that might contain threats, the server on which it runs is vulnerable if it has
no real-time protection.
Use an antivirus program to protect the server on which Symantec Protection
Engine runs, such as Symantec Endpoint Protection. To prevent scanning
conflicts, configure the antivirus program not to scan the temporary directory
that Symantec Protection Engine uses for scanning.
■ Review the deployment considerations and recommendations. These
recommendations can enhance your overall performance.
4.3.x and earlier Symantec Protection Engine does not support direct upgrades
from version 4.3.x. To install version 7.5.3, you must first
either uninstall 4.3.x or upgrade to 5.2.x, then upgrade to
7.0.x, and then further upgrade to version 7.5.3.
You must stop the Symantec Protection Engine service before you upgrade the
software.
If you want to upgrade from version 5.2/5.1 and use security certificates, take the
following actions:
■ If you use the default security files that Symantec Protection Engine generated,
delete the keystore.public and keystore.private before you perform the upgrade
installation.
■ If you use custom security files, you can retain the custom security files.
Symantec Protection Engine automatically uses the existing files when you
upgrade.
Getting Started 18
System requirements
System requirements
Before you install Symantec Protection Engine, verify that your server meets the
minimum system requirements.
See “System requirements to install Symantec Protection Engine on Solaris”
on page 19.
Ensure that your operating system has the latest service patches
available.
Processor Intel or AMD Server Grade Single Processor Quad Core systems or
higher
Hardware ■ Network interface card (NIC) running TCP/IP with a static IP address
■ Internet connection to update definitions
■ 100 Mbps Ethernet link (1 Gbps recommended)
Getting Started 19
System requirements
Software ■ Install Java 2SE Runtime Environment (JRE) 7.0 (update 80 or later)
or JRE 8.0 (update 66 or later) on the server.
Note: You must install JRE only if you plan to operate Symantec
Protection Engine in the Core server with user interface mode.
Ensure that your operating system has the latest service patches
available.
Processor UltraSPARC
Hardware ■ Network interface card (NIC) running TCP/IP with a static IP address
■ Internet connection to update definitions
■ 100 Mbps Ethernet link (1 Gbps recommended)
Operating system ■ Red Hat Enterprise Linux Server 5.7 (32-bit and 64-bit) or later
■ Red Hat Enterprise Linux Advanced Server 5.7 (32-bit and 64-bit)
or later
■ Red Hat Enterprise Linux Server 5.11 (32-bit and 64-bit) or later
■ Red Hat Enterprise Linux Server 6.2 (32-bit and 64-bit) or later
■ Red Hat Enterprise Linux Server 6.6 (32-bit and 64-bit) or later
■ SUSE Linux Enterprise Server 11 (32-bit and 64-bit)
■ SUSE Linux Enterprise Server 12 (64-bit)
Ensure that your operating system has the latest service patches
available.
Processor Intel or AMD Server Grade Single Processor Quad Core systems or
higher
Hardware ■ Network interface card (NIC) running TCP/IP with a static IP address
■ Internet connection to update definitions
■ 100 Mbps Ethernet link (1 Gbps recommended)
Getting Started 22
System requirements