Enterprise Edition 4.0
SPS EE 4.0 Getting Started Guide Nov. 2012
Page 13
Security Configuration
Configure policies
Identify any special requirements your organization may need. Although the default policies
for the Protection Suite technologies are very robust and effective your environment may
have unique requirements that are not covered in the default templates and policies. Try to
minimize any unnecessary changes to simplify troubleshooting steps if required.
■
Endpoint Protection policies: client groups and locations, scanning exclusions for special file types or
directories, communication settings, etc.
■
Messaging Gateway: Scan inbound and outbound, unique IP addresses for better performance,
configure regular backups and updates, etc.
■
Mail Security: Endpoint Protection exclusions, thread tuning, etc.
■
Web Gateway: enable application control, content filter, bypass whitelist modules, policy precedence
order, etc.
Backup & Recovery
Install the System
Recovery Management
Solution
Installing the System Recovery Management Solution has a number of benefits. It allows you
to run a Discovery to identify endpoints on your network (including virtual systems). It also
allows you to centrally manage your endpoints to simplify configuration and administration.
Note that only status and configuration data is exchanged between the Management Solution
and endpoints. Backup data gets written directly to storage and doesn’t travel through the
Management Solution. System Recovery Management Solution requires the Symantec
Management Platform.
Client Deployment &
Configuration
Discover clients and
deploy the System
Recovery agents
After the Management Platform has been installed, run a discovery to identify endpoints on
the network.
■
Deploy the Symantec Management Agent (SMA) to the desired target systems.
■
Deploy the System Recovery Agent. This can be installed in either full or “headless” mode (no local UI).
Configure System
Recovery storage and
backup policies
■
Identify the storage locations for your endpoint backups. Storage locations can be local (directly
attached to the endpoint) or on a network resource that the endpoint can access. Performance will
depend on transfer rates of the network or hardware devices. Backups can be password protected and
backup data can be compressed. Note that compression levels may affect backup performance.
■
Backup policies can be configured to perform a full with incremental to reduce the amount of time that
subsequent backups will take.
Perform a full endpoint
backup
■
Having a full endpoint backup can simplify troubleshooting or recovery in the case of failures during
client agent implementation or migration.
■
Create and test the Symantec Recovery Disk to ensure you can perform a system recovery if necessary.