Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. USERS LICENSE The Software Product (Product) described in this document is furnished under the terms of Elitecores End User license agreement. Please read these terms and conditions carefully before using the Product. By using this Product, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Product and manual (with proof of payment) to the place of purchase for a full refund. LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original licensee. Customers exclusive remedy and the entire liability of Elitecore and its suppliers under this warranty will be, at Elitecore or its service centers option, repair, replacement, or refund of the software if reported (or, upon, request, returned) to the party supplying the software to the customer. In no event does Elitecore warrant that the Software is error free, or that the customer will be able to operate the software without problems or interruptions. Elitecore hereby declares that the Endpoint Data Protection Suite may be powered by its Technology Vendor(s) from time to time, and the performance thereof shall be under warranty provided by such Technology Vendor(s). It is specified that such Technology Vendor(s) does (do) not warrant that the Software protects against all known threats to the Endpoint Data, nor that the Software will not occasionally erroneously report a threat in a title not affected by that threat. Hardware: Elitecore warrants that the Hardware portion (if applicable) of the Elitecore Products excluding power supplies, fans and electrical components will be free from material defects in workmanship and materials for a period of One (1) year. Elitecore's sole obligation shall be to repair or replace the defective hardware at no charge to the original owner. The replacement Hardware need not be new or of an identical make, model or part. Elitecore may, at its discretion, replace the defective Hardware (or any part thereof) with any reconditioned product that Elitecore reasonably determines as substantially equivalent (or superior) in all material respects to the defective Hardware. DISCLAIMER OF WARRANTY Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including, without limitation, any implied warranty or merchantability, fitness for a particular purpose, non-infringement or arising from a course of dealing, usage, or trade practice, and hereby excluded to the extent allowed by applicable law. In no event will Elitecore or its supplier be liable for any lost revenue, profit, or data, or for special, indirect, consequential, incidental, or punitive damages however caused and regardless of the theory of liability arising out of the use of or inability to use the product even if Elitecore or its suppliers have been advised of the possibility of such damages. In no event shall Elitecores or its suppliers liability to the customer, whether in contract, tort (including negligence) or otherwise, exceed the price paid by the customer. The foregoing limitations shall apply even if the above stated warranty fails of its essential purpose. In no event shall Elitecore or its supplier be liable for any indirect, special, consequential, or incidental damages, including, without limitation, lost profits or loss or damage to data arising out of the use or inability to use this manual, even if Elitecore or its suppliers have been advised of the possibility of such damages. RESTRICTED RIGHTS Copyright 1999-2009 Elitecore Technologies Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of Elitecore Technologies Ltd. CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA Phone: +91-79-66065606 Fax: +91-79-26407640
Contents
Contents........................................................................................................................................... ii Technical Support ............................................................................................................................iii Chapter 1................................................................................................................................................. 4 Endpoint Data Protection Installation .................................................................................................. 4 1.1 Basic Structure........................................................................................................................... 4 1.2 System Requirements................................................................................................................ 5 1.3 Installation.................................................................................................................................. 5 1.4 Agent Deployment ...................................................................................................................11 1.5 System Upgrade ......................................................................................................................20 1.6 Uninstall Endpoint Data Protection ..........................................................................................21
Technical Support
You may direct all questions, comments, or requests concerning the software you purchased, your registration status, or similar issues to Customer care/service department at the following address: Corporate Office eLitecore Technologies Ltd. 904, Silicon Tower Off C.G. Road Ahmedabad 380015 Gujarat, India. Phone: +91-79-66065606 Fax: +91-79-26407640 Web site: www.elitecore.com Cyberoam contact: Email: support@cyberoam.com Web site : www.cyberoam.com Telephonic Support: Region North America Europe APAC Middle East & Africa India Toll Free Number +1-877-777-0368 +44-808-120-3958 +1-877-777-0368 +1-877-777-0368 1-800-301-00013 Non Toll Free Number +1-973-302-8446 +44-203-355-7917 +1-973-302-8446 +1-973-302-8446 +91-79-66065777
Chapter 1
Endpoint Data Protection Installation
1.1 Basic Structure
Endpoint Data Protection system consists of 3 different components: Agent, Server, and Console. The Agent is installed on every computer. Server is used for database storage and Agent management. Its main function is to manage the inspected data. Usually, the server should be installed on a server class computer with a large amount of system memory and large hard disk capacity. Console is used to audit, control and monitor the computers with Agent installed and examine the log history. In most cases, Console will be installed on the administrators computer alone, but it can also be installed on the Server too. The basic structure is shown below:
Server functions
Search the network periodically, handles all the computers with Agent installed and send policy settings and commands to Agents. Collects Agent data and saves it to the database. Backup log history. Provide convenient log history management, such as, reading, archiving, and searching.
Console functions
Provides the view of complete dashboard. Helps to create policies and view logs. For archiving and backup
Agent functions
Collects and saves data periodically Sends the collected data to the Server periodically Controls the operation of the user and computer according to the system policy.
Server
Recommended Console OS
Recommended Agent OS
Recommended
NOTE: Server & SQL Requirements If the Server is installed on Windows 2000 SP4, please make sure the system is updated with service patch: Win2000-KB891861-v2x86-*.exe If you are using Microsoft Server 2000, please make sure that the system is updated with Service Pack 4: SQL2000-KB884525-SP4x86-ENU.exe
1.3 Installation
NOTE: SQL Server Limitations The limitation of Database size on free MSDE and SQL Express 2005 are 2G and 4G respectively. With this limitation, it would affect the stabilities of server. We strongly recommend using Enterprise version if there are many agents and too much data has to be stored in the database. Please ensure that SQL Server 2000 is installed together with SP4, and SQL Server 2005 is installed together with SP1. If any errors are encountered in the EndPoint Data Protection servers boot up process, please go to the Windows Control Panel Administrative Tools Event Viewer Application Log to confirm the version of SQL Server
Cyberoam Endpoint Data Protection Installation Guide 6. In the Instance Name windows, make sure Default Instance is selected. If another option is selected, then ENDPOINT DATA PROTECTION server would not start up properly. 7. In the Service Account windows, select Use the built-in System account and then select Local system. Click Next to continue. 8. The remaining parts should be followed by the default settings until the installation completed. 9. Open the SQL Server Configuration Manager from Start All Programs Server 2005 Configuration Tools SQL Server Configuration Manager Microsoft SQL
10. In the left panel, expend the SQL Server 2005 Network Configuration and then click the Protocols for MSSQLSERVER. Also double click Named Pipes to make the status Enabled.
SQL Server Configuration 11. If it is not enabled; expand the SQL Native Client Configuration and then click the Client Protocols. Double click Named Pipes to make the status Enabled.
Cyberoam Endpoint Data Protection Installation Guide 5. Select the path of short-cut inside the Start menu. Click Next. 6. After verifying the settings, click Install and wait for the installation process to complete. Then, click Finish to end the installation. The server will startup and the Endpoint Data Protection Service Manager will be displayed on the task bar. NOTE: Event Viewer helps trace the installation problems During the server installation, installation process will determine the operation system and the version of the SQL Server. If the installation is not successful, please check the error message in Windows Event Viewer Application to analyze the problems.
Server Registration
How to register the server 1. Right click Endpoint Data Protection Service Manager Tools Register, and then input administrator password to enter the registration interface 2. Click the Upgrade button. The serial number text field becomes editable, and input the licensed serial number 3. Click Confirm button to confirm the input serial number. If the input is correct, system will pop up a confirmation dialogue and remind you to activate the system. You have to register the product to obtain the register ID. Only with valid register ID input, the whole registration procedure of initial stage is completed. There are two methods to complete the registration:
1. Online
Please fill in the product registration information with Company Name, Contact Person, Contact Number and email address. Click Register Online button, then the Register ID will be returned and displayed in the Register ID [RID] field. A dialogue box with system message showed will pop up to confirm the registration. Click Close button to leave the registration interface.
2. Email
Please fill in the product registration information with Company Name, Contact Person, Contact Number and email address. Click Send Email button. Email will be sent to your registered email address with Register ID. Please copy and paste the Register ID into Register ID [RID] field, and then click Register button to confirm the registration. A dialogue box with system message will pop up to confirm the registration. Click Close button to leave the registration interface.
Table 2.2 Registration Methods NOTE: About Registration If your server cannot connect to Internet, please email us with your Serial Number [SN] and Product ID [PID]. We will help you process the registration individually.
Set Checkcode How to set Checkcode After the server starts up at the first time, right click the Service Manager icon and select from the popup menu Tools Checkcode. System would request to input administrator login and password before setting the Checkcode. To confirm the setting, please input the Checkcode twice. Click OK button to complete the setting. The default Checkcode is empty. Once the checkcode is new set, reset or updated, this data will be updated to connected agents automatically.
NOTE: About Checkcode System Administrator has to memorize or record this Checkcode in the safe place. In case the operating system is required to be re-installed or Endpoint Data Protection is required to install on a new server, the last Checkcode must be input after the re-installation completed. Otherwise, those existing agents could not be connected to the new setup server because their checkcode are not matched. In this case, all agents must be re-installed. If agents do not appear in the Console, please go to Endpoint Data Protection Console Log System to check whether it is checkcode error or not Events
View Event Logs How to view the server logs Right click the Service Manager popup menu Tools Event Log. Click the Application from the left-hand-side panel of the Event Viewer to check the OSERVER3 process logs including the startup, stop or error status of oserver3.exe.
Agent Generator Input the following fields, finally click Create Setup File button to generate the agent program.
Server IP Address
Default is the IP of the local machine. If more than one IP addresses, you can input using comma , to separate the IPs e.g. 192.168.1.223, 58.177.209.222 Static IP or Dynamic DNS is allowed to input
Input or Select the path and filename of the Agent setup file to be created
1. Scanning Settings
By default, the system scans all computers from EndPoint Data Protection servers network segment. If you want to extend the searching area, go to File Scanning Settings. In the opened dialogue, you can add the IP range.
Window 95/98/ me
No Yes No Yes No Yes
Online or not
Yes Yes No No Yes Yes
Deep blue Deep blue Gray Gray Light Blue Light Blue
3. Installation
Click the computers on which you would like to install the agent. After selecting the computer, go to Operation Install to start the installation. During installation, the administrator login and password are required if the current logon session is not administrator. The near bottom panel shows the details of installation status and if any failures happened, the panel will show you the description and corresponding error code. FAQ If failure occurs during remote installation, check if the following items are available in your targeted computer: 1. If the current logon session does not grant administrator rights, at this time the system would pop up a dialogue box requesting the login account and password with administrator rights. 2. Check ADMIN$ share is opened or not. Go to DOS Command Promote and type: net share command to see whether ADMIN$ is already opened or not. If not, then type net share ADMIN$ to invoke this function
3. Check any shared folders function is available. If not, please try to share a folder to invoke this function. For example, right click a folder, select Properties Sharing. Then Select Share this folder. Input Share name and define permission. Click OK to invoke the shared folder function
NOTE: About Agent Installation This installation method only works on Windows NT4.0/2000/XP. If you need to install agents on Windows 9x/ME, you have to use Direct Installation method. Because of some local security policies settings in Windows NT it may affect the normal operations, and does not guarantee 100% for remote installation method. If you have followed the above steps but still failed, we would recommend using Direct Installation method.
Cyberoam Endpoint Data Protection Installation Guide System would request to input details such as domain you want to logon, server, account and password on the domain logon window. Click Log On to continue.
Click Default to get the local domain name automatically, if the computer has console installed and has joined the domain. Step 2 Import Domain Organization
Step 3 Select Domain Node Check the nodes in the domain you want to import to the Cyberoam Endpoint Data Protection Server one by one, or check the checkbox before Select all, Select new nodes or Select imported nodes to quickly select the nodes you want to import to Cyberoam Endpoint Data Protection server.
to select the target computer group or user group that you want to import the nodes to and Click click OK button.
3. Import
Click Import User or Import Computer to execute the operation. If the nodes you want to import have been imported to a different target place, a Conflict Resolution dialogue box will pop up to ask you to confirm your operation. Click Execute to replace the old configuration and click Cancel to ignore the replace operation as shown in the below screenshot.
Cyberoam Endpoint Data Protection Installation Guide Step 4 View Synchronization Configuration Info If you want to view the synchronization information, there are two ways. From the menu bar, go to Tools Synchronization Configuration Synchronization Configuration to view the information. View
From the Domain Organization dialogue box, click View Synchronization Configuration button to view the information.
NOTE Nodes which have been imported can be deleted from the View Synchronization Configuration window. Also, the imported configuration can be cleared from this window.
Step 5 After importing the computers in the Cyberoam Endpoint Data Protection server we need to install the Endpoint Data Protection agents in the Domain computers. There are two ways of doing it:1. Agent Remote Installer. 2. Agent Installation Generator.
Cyberoam Endpoint Data Protection Installation Guide (i) Once the Agent is installed in the domain machines, they will be visible in the Cyberoam Endpoint Data Protection server console.
(ii) When the Domain user will login in the agent machine they will be visible in the Cyberoam Endpoint Data Protection server.
(iii) You can configure different policies on the users as per the requirement.
Note Please, make sure that you tick Silent Installation and specify the Domain Administrator Details.
Note: Netlogon folder can be found at \\adsservername\netlogon. Replace <adsservername> with Active Directorys Server name or IP.
Step 3 Logon Script Please, follow Step 3.1 if you do not have a logon script. Step 3.1 Create a batch file (logonscript.bat) in the Netlogon folder on the server and paste the below lines in the batch file. START \\adsservername\netlogon\agent.exe Note: Replace the <adsservername> with the Active Directorys Computer Name or IP. If you already have a logon script please, follow Step 3.2.
Step 3.2 Update the existing logon script with the below line. START \\adsservername\netlogon\agent.exe Note: Replace the <adsservername> with the Active Directorys Computer Name or IP.
Step 4 Attach logonscript.bat to Profile if the script is not already attached. On the next login attempt by the user, the agent will be installed on the end users machine and would be visible in the Endpoint Data Protection Console after a few minutes.
3. Now you can start the upgrade process by executing the upgrade program. In the upgrade program, you can see your current version and upgrade version details. Click Upgrade button to start or you can upgrade using EndPoint Data Protection full package to replace the
Cyberoam Endpoint Data Protection Installation Guide existing one completely. 4. After the completion, go to Windows Control Panel Administrative Tools Service to start the OCULAR V3 SERVER and OCULAR V3 UPDATE manually. (If you are using EndPoint Data Protection full package method, the server will start up automatically)
b) Right click the agent from The Whole Network. Then select Control Agent from the menu. c) Go to Tools Computers, and click the Uninstall or Delete button
*Note - Difference between the function of Uninstall and Delete button Uninstall button: The agent is uninstalled without releasing agent license Delete button: The agent is uninstalled and also releases agent license
Figure 2.8 Uninstall Agent From Agent side Below mentioned are steps for uninstallation, for agents that cannot connect to EndPoint Data Protection server. (i.e. the agent in offline mode). 1. Go to Start Run, type agt3tool ocularadv command
2. Select Uninstall Agent and then click Generate button 3. Inform your System Administrator about the Operate Code showed in the Check confirm code dialog box 4. When a System Administrator gets the Operate Code, go to EndPoint Data Protection Console Tools Agent Tool Confirm-Code Generator. Input the Operate Code in the field of Agent Operate Code. Then click the Parse button, and the agent information will be showed in the bottom textbox. 5. Click the Generate button. The Confirm Code in Blue color will be shown in the Confirm Code Information box. The System Administrator should tell the Confirm Code to the agent user.
6. Once the agent user gets the Confirm Code, he keys it in the field of Confirm Code to process the un-installation immediately.
About Agent Un-installation Note* - Uninstalled agent do not exactly delete the agent as the agent license has not been released, as mentioned in the above methods. If you only uninstall the agent, the agent will still appear in the Endpoint Data Protection Console (i.e. The Whole Network tree) and its icon are displayed in dark gray color as shown in the above screen shot. To delete the agent completely: 1. Go to Endpoint Data Protection Console that you want to delete completely. Tools Computers. Select the agent from the list
2. Click Delete button. This action implies that the agent is completely deleted and removed from Endpoint Data Protection. Below mentioned are the steps to check the agent is deleted completely or not: The agent should not appear in The Whole Network Tree. Go to Endpoint Data Protection Console Tools Computers. Here, the agent should not be listed and the total number of licenses should also be decreased.