central quarantine

Download Central Quarantine

Post on 17-Aug-2015

223 views

Category:

Documents

3 download

Embed Size (px)

DESCRIPTION

central

TRANSCRIPT

Symantec CentralQuarantine ImplementationGuideSymantecCentral Quarantine Implementation GuideThe software described inthis book is furnished under a license agreement and may be usedonly in accordance with the terms of the agreement.Legal NoticeCopyright 2010 Symantec Corporation. All rights reserved.Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System,LiveUpdate, Norton, Sygate, and TruScan are trademarks or registered trademarks ofSymantec Corporation or its affiliates in the U.S. and other countries. Other names may betrademarks of their respective owners.This Symantec product may contain third party software for which Symantec is requiredto provide attribution to the third party (Third Party Programs). Some of the Third PartyPrograms are available under opensource or free software licenses. The License Agreementaccompanying the Software does not alter any rights or obligations you may have underthose opensource or free software licenses. Please see the ThirdParty Legal Notice Appendixto this Documentation or TPIP ReadMe File accompanying this Symantec product for moreinformation on the Third Party Programs.The product described in this document is distributed under licenses restricting its use,copying, distribution, and decompilation/reverse engineering. No part of this documentmay be reproduced in any form by any means without prior written authorization ofSymantec Corporation and its licensors, if any.THEDOCUMENTATIONISPROVIDED"ASIS" ANDALLEXPRESSORIMPLIEDCONDITIONS,REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TOBELEGALLYINVALID. SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTALOR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINEDIN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.The LicensedSoftware andDocumentationare deemedto be commercial computer softwareas defined inFAR12.212 and subject to restricted rights as defined inFARSection52.227-19"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights inCommercial Computer Software or Commercial Computer Software Documentation", asapplicable, and any successor regulations. Any use, modification, reproduction release,performance, display or disclosure of the Licensed Software and Documentationby the U.S.Government shall be solely in accordance with the terms of this Agreement.Symantec Corporation350 Ellis StreetMountain View, CA 94043http://www.symantec.comTechnical SupportSymantec Technical Support maintains support centers globally. TechnicalSupports primary role is to respond to specific queries about product featuresandfunctionality. The Technical Support groupalso creates content for our onlineKnowledge Base. The Technical Support group works collaboratively with theother functional areas within Symantec to answer your questions in a timelyfashion. For example, the Technical Support groupworks withProduct Engineeringand Symantec Security Response to provide alerting services and virus definitionupdates.Symantecs support offerings include the following: A range of support options that give you the flexibility to select the rightamount of service for any size organization Telephone and/or web-based support that provides rapid response andup-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7days a week basis Premium service offerings that include Account Management ServicesFor information about Symantecs Maintenance Programs, you can visit our Website at the following URL:www.symantec.com/business/support/Contacting Technical SupportCustomers with a current support agreement may access Technical Supportinformation at the following URL:www.symantec.com/business/support/Before contacting Technical Support, make sure you have satisfied the systemrequirements that are listed in your product documentation. Also, you should beat the computer onwhichthe problemoccurred, incase it is necessary to replicatethe problem.When you contact Technical Support, please have the following informationavailable: Product release level Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changesLicensing and registrationIf your Symantec product requires registrationor alicense key, access our technicalsupport web page at the following URL:www.symantec.com/business/support/Customer serviceCustomer service information is available at the following URL:www.symantec.com/business/support/Customer Service is available to assist with non-technical questions, such as thefollowing types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manualsSupport agreement resourcesIf you want to contact Symantec regarding an existing support agreement, pleasecontact the support agreement administration team for your region as follows:customercare_apac@symantec.com Asia-Pacific and Japansemea@symantec.com Europe, Middle-East, and Africasupportsolutions@symantec.com North America and Latin AmericaAdditional enterprise servicesSymantec offers a comprehensive set of services that allowyou to maximize yourinvestment in Symantec products and to develop your knowledge, expertise, andglobal insight, which enable you to manage your business risks proactively.Enterprise services that are available include the following:Managed Services remove the burden of managing and monitoring securitydevices and events, ensuring rapid response to real threats.Managed ServicesSymantec Consulting Services provide on-site technical expertise fromSymantec andits trustedpartners. Symantec ConsultingServices offer a varietyof prepackaged and customizable options that include assessment, design,implementation, monitoring, and management capabilities. Eachis focused onestablishing andmaintaining the integrity andavailability of your ITresources.Consulting ServicesEducationServices provide a full array of technical training, security education,security certification, and awareness communication programs.Education ServicesTo access more information about enterprise services, please visit our Web siteat the following URL:www.symantec.com/business/services/Select your country or language from the site index.Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Chapter 1 Introducing Symantec Central Quarantine. . . . . . . . . . . . . . . . . . . . . 9About Symantec Central Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9About Central Quarantine components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10How Central Quarantine works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11About identifying and quarantining viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11About analyzing viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12What you can do with Central Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Where to get more information about Central Quarantine . . . . . . . . . . . . . . . . . . . 13Chapter 2 Installing and configuring the CentralQuarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Before you install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15System requirements for the Central Quarantine Server . . . . . . . . . . . . . . . . . . . . . 16System requirements for the Quarantine Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Installing the Central Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Chapter 3 Using the Central Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19About the Central Quarantine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Enabling the Quarantine Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Configuring the Quarantine Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Configuring an Antivirus and Antispyware Policy to use theQuarantine Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21About Central Quarantine properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Managing quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Recommended

View more >