DLP 15.1 Install Guide PDF
DLP 15.1 Install Guide PDF
DLP 15.1 Install Guide PDF
Version 15.1
Legal Notice
Copyright © 2018 Symantec Corporation. All rights reserved.
Symantec, CloudSOC, Blue Coat, the Symantec Logo, the Checkmark Logo, the Blue Coat logo, and the
Shield Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S.
and other countries. Other names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution
to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open
source or free software licenses. The License Agreement accompanying the Software does not alter any
rights or obligations you may have under those open source or free software licenses. Please see the
Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec
product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution,
and decompilation/reverse engineering. No part of this document may be reproduced in any form by any
means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO
CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined
in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer
Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and
Commercial Computer Software Documentation," as applicable, and any successor regulations, whether
delivered by Symantec as on premises or hosted services. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government
shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Contents
■ About updates to the Symantec Data Loss Prevention Installation Guide for Windows
Table 1-1 Change history for the Symantec Data Loss Prevention Installation Guide for
Windows
Date Description
10 September Updated the command syntax for configuring the JDBC driver on the Enforce Server
2018 while creating certificates to secure communications between the server and the
Oracle database.
Chapter 2
Planning the Symantec
Data Loss Prevention
installation
This chapter includes the following topics:
■ Verifying that servers are ready for Symantec Data Loss Prevention installation
Planning the Symantec Data Loss Prevention installation 11
About installation tiers
Single-tier To implement the single-tier installation, you install the database, the Enforce Server,
and a detection server all on the same computer. Typically, this installation is
implemented for testing purposes.
If you choose either of these types of installation, the Symantec Data Loss Prevention
administrator needs to be able to perform database maintenance tasks, such as
database backups.
Two-tier To implement the two-tier installation, you install the Oracle database and the
Enforce Server on the same computer. You then install detection servers on separate
computers.
Three-tier To implement the three-tier installation, you install the Oracle database, the Enforce
Server, and a detection server on separate computers. Symantec recommends
implementing the three-tier installation architecture as it enables your database
administration team to control the database. In this way you can use all of your
corporate standard tools for database backup, recovery, monitoring, performance,
and maintenance. Three-tier installations require that you install the Oracle Client
(SQL*Plus and Database Utilities) on the Enforce Server to communicate with the
Oracle server.
See “About authenticating users” in the Symantec Data Loss Prevention Administration Guide
for more information about all of the authentication and sign-on mechanisms that Symantec
Data Loss Prevention supports.
See the Symantec Data Loss Prevention Administration Guide for information about configuring
certificate authentication after you install Symantec Data Loss Prevention.
See the Symantec Data Loss Prevention System Requirements and Compatibility Guide
available at the Symantec Support Center:
https://www.symantec.com/docs/DOC10602
■ For two-tier or three-tier installations, a remote access utility may be required (for
example, Remote Desktop for Windows systems, or PuTTY or a similar SSH client for
Linux systems).
■ Windows-based Discover servers that are scanning targets on UNIX machines must
have the NFS Client feature enabled. You can enable the NFS Client on your Windows
Server 2008 R2, 2012, or 2016 computer from the Windows Server Manager.
To enable the NFS client on your Windows-based Discover server, take one of the
following actions:
■ Windows Server 2008 R2: In the Windows Server Manager, use the Add Features
wizard to select and install the Subsystem for UNIX-based Applications.
How to install a feature on Windows Server 2008 R2.
■ Windows Server 2012 and 2016: In the Windows Server Manager, use the Add
Roles and Features wizard to select and install the Client for NFS.
How to install a feature on Windows Server 2012 and 2016.
2 Verify that your servers are ready for See “Verifying that servers are ready for
installation. Symantec Data Loss Prevention
installation” on page 23.
4 Install the Oracle Client (SQL*Plus and The user account that is used to install
Database Utilities) on the Enforce Server Symantec Data Loss Prevention requires
computer to enable communication with access to SQL*Plus to create tables and
the Oracle server. views.
5 Install the Java Runtime Environment on See “Installing the Java Runtime
the Enforce Server. Environment on the Enforce Server”
on page 27.
7 Verify that the Enforce Server is correctly See “Verifying an Enforce Server
installed. installation” on page 33.
8 Install one or more Symantec Data Loss See “Installing a new license file”
Prevention license files. on page 34.
10 Generate server certificates for secure If you are installing Network Prevent in a
communication. hosted environment, you must create
user-generated certificates for the
Enforce Server and all detection servers
in your deployment. This ensures that
communication between the Enforce
Server and all detection servers is
secure.
12 Install the Java Runtime Environment on See “Installing the Java Runtime
the detection server. Environment on a detection server”
on page 44.
2 Verify that your servers are ready for See “Verifying that servers are ready for
installation. Symantec Data Loss Prevention
installation” on page 23.
3 Install Oracle and create the Symantec See the Symantec Data Loss Prevention
Data Loss Prevention database. Oracle 12c Standard Edition 2 Release
2 Installation and Upgrade Guide.
4 Install the Java Runtime Environment on See “Installing the Java Runtime
the Enforce Server. Environment on the Enforce Server”
on page 27.
6 Verify that the Enforce Server is correctly See “Verifying an Enforce Server
installed. installation” on page 33.
7 Install one or more Symantec Data Loss See “Installing a new license file”
Prevention license files. on page 34.
9 Generate server certificates for secure If you are installing Network Prevent in a
communication. hosted environment, you must create
user-generated certificates for the
Enforce Server and all detection servers
in your deployment. This ensures that
communication between the Enforce
Server and all detection servers is
secure.
11 Install the Java Runtime Environment on See “Installing the Java Runtime
the detection server. Environment on the Enforce Server”
on page 27.
2 Verify that the server is ready for See “Verifying that servers are ready for
installation. Symantec Data Loss Prevention
installation” on page 23.
3 Install Oracle and create the Symantec See the Symantec Data Loss Prevention
Data Loss Prevention database. Oracle 12c Standard Edition 2 Release
2 Installation and Upgrade Guide.
4 Install the Java Runtime Environment. See “Installing the Java Runtime
Environment on the Enforce Server”
on page 27.
5 Install the Enforce Server and a detection See “Installing a single-tier server”
server on the same computer. on page 79.
8 Install one or more Symantec Data Loss See “Installing a new license file”
Prevention license files. on page 34.
■ Windows 64-bit:
DLPDownloadHome\DLP\15.1\Endpoint\Win\x64\AgentInstallers-x64_15_1.zip
■ Windows 32-bit:
DLPDownloadHome\DLP\15.1\Endpoint\Win\x86\AgentInstallers-x86_15_1.zip.
These files are only available if you licensed Endpoint Prevent.
■ Symantec Data Loss Prevention solution packs.
The solution packs are located at:DLPDownloadHome\DLP\15.1\Solution_Packs\
10 If you plan to use Symantec Data Loss Prevention alerting capabilities, you need the
following items:
■ Access to a local SMTP server.
■ Mail server configuration for sending SMTP email. This configuration includes an
account and password if the mail server requires authentication.
You can store incident attachments either in a directory on the Enforce Sever host computer,
or on an stand-alone computer. You can use any file system you choose. Symantec
recommends that you work with your data storage administrator to set up an appropriate
directory for incident attachment storage.
To set up an external storage directory, Symantec recommend these best practices:
■ If you choose to store your incident attachments on the Enforce Server host computer,
complete the following steps:
■ Create an external storage directory before you install Symantec Data Loss Prevention.
■ Create the "SymantecDLP" user.
■ Grant Read/Write permissions to the location for the "SymantecDLP" user.
■ Do not place your storage directory under the/Symantec/DataLossPrevention folder.
■ If you choose to store incident attachments on a computer other than your Enforce Server
host computer, take the following steps:
■ Ensure that both the external storage server and the Enforce Server are in the same
domain.
■ Create a "SymantecDLP" user on the external storage server with the same password
as your Enforce Server "SymantecDLP" user to use with your external storage directory.
■ If you are using a Linux system for external storage, change the owner of the external
storage directory to the external storage "SymantecDLP" user.
■ If you are using a Microsoft Windows system for external storage, share the directory
with Read/Write permissions with the external storage "SymantecDLP" user.
After you have set up your storage location you can select external storage for incident
attachments in the Installation Wizard. All incident attachments will be stored in the external
storage directory. Incident attachments in the external storage directory cannot be migrated
back to the database. All incidents attachments stored in the external storage directory are
encrypted and can only be accessed from the Enforce Server administration console.
The incident deletion process deletes incident attachments in your external storage directory
after it deletes the associated incident data from your database. You do not need to take any
special action to delete incidents from the external storage directory.
To verify that servers are ready for Symantec Data Loss Prevention installation
1 Verify that all systems are racked and set up in the data center.
2 Verify that the network cables are plugged into the appropriate ports as follows:
■ Enforce Server NIC Port 1.
Standard network access for Administration.
If the Enforce Server has multiple NICs, disable the unused NIC if possible. This task
can only be completed once you have installed the Enforce Server.
See “Enforce Servers and unused NICs” on page 142.
■ Detection servers NIC Port 1.
Standard network access for Administration.
■ Network Monitor detection servers NIC Port 2.
SPAN port or tap should be plugged into this port for detection. (Does not need an IP
address.)
If you use a high-speed packet capture card (such as Endace or Napatech), then do
not set this port for SPAN or tap.
11 Turn on remote desktop connections for each Symantec Data Loss Prevention server
computer. In Windows, right-click My Computer. Click Properties and then select Remote
> Allow users to connect remotely to this computer. Verify that you can use Remote
Desktop to log onto the server from a local workstation.
12 Verify that port 25 is not blocked. The Symantec Data Loss Prevention server uses port
25 (SMTP) for email alerts.
13 Verify that the Network Monitor detection server NICs receive the correct traffic from the
SPAN port or tap. Install the latest version of Wireshark and use it to verify traffic on the
server.
For Endace cards, use dagsnap -o out.pcap from a command line. Then review the
dagsnap output in Wireshark.
For Napatech cards, there is a "statistics" tool with option -bch=0xf to observe the
"Hardware counters" for all channels/ports.
14 Ensure that all servers are synchronized with the same time (to the minute). Ensure that
the servers are updated with the correct Daylight Saving Time patches.
15 Confirm that the designated Enforce Server has at least 1 GB of free space.
See “Symantec Data Loss Prevention required items” on page 14.
See “Symantec Data Loss Prevention preinstallation steps” on page 21.
For Network Prevent for Email detection server installations, verify the following:
■ Use an SSH client to verify that you can access the Mail Transfer Agent (MTA).
■ Verify that the firewall permits you to Telnet from the Network Prevent for Email Server
computer to the MTA on port 25. Also ensure that you can Telnet from the MTA to the
Network Prevent for Email detection server computer on port 10026.
Chapter 3
Installing an Enforce Server
This chapter includes the following topics:
■ Before you begin, make sure that you have access and permission to run the Symantec
Data Loss Prevention installer software: EnforceServer.msi.
■ Install the Java Runtime Environment.
See “Installing the Java Runtime Environment on the Enforce Server” on page 27.
If you intend to run Symantec Data Loss Prevention using Federal Information Processing
Standards (FIPS) encryption, you must first prepare for FIPS encryption. You enable FIPS
encryption during the installation process.
See “About FIPS encryption” on page 155.
Note: You can skip this step if you have already installed a JRE that meets Symantec Data
Loss Prevention requirements.
Note: Enter directory names, account names, passwords, IP addresses, and port numbers
that you create or specify during the installation process using standard 7-bit ASCII characters
only. Extended (hi-ASCII) and double-byte characters are not supported.
Using the graphical user interface method to install does not generate log information. To
generate log information, run the installation using the following command:
C:\msiexec /i EnforceServer.msi /L*v c:\enforce_install.log
You can complete the installation using Silent Mode. Enter values with information specific to
your installation for the following:
Command Description
Command Description
The following is an example of what the completed command might look like:
3 Log on (or remote logon) as Administrator to the Enforce Server system on which you
intend to install Enforce.
4 Go to the folder where you copied the EnforceServer.msi file (c:\temp).
Note: Using the graphical user interface method to install does not generate log information.
To generate log information, run the installation using the following command:
C:\msiexec /i EnforceServer.msi /L*v c:\enforce_install.log
After you complete the Enforce Server installation, you can find the data directory at
e:\enf data.
Symantec recommends that you use the default destination directory. References to the
"installation directory" in Symantec Data Loss Prevention documentation are to this default
location.
9 In the JRE Directory panel, accept the default JRE location (or click Browse to locate
it), and click Next.
10 In the FIPS Cryptography Mode panel, select whether to disable or enable FIPS
encryption.
See “About FIPS encryption” on page 155.
11 In the Service User panel, select one of the following options.
■ New Users: Select this option to create the Symantec Data Loss Prevention system
account user name and password and confirm the password. This account is used to
manage Symantec Data Loss Prevention services. The default user name is
“SymantecDLP.” New service user accounts must be admin local accounts.
Note: The password you enter for the System Account must conform to the password
policy of the server. For example, the server may require all passwords to include
special characters.
Installing an Enforce Server 31
Installing an Enforce Server
■ Existing Users: Select this option to use an existing local or domain user account.
Click Next.
12 (Optional) If you opted to create a new service user, enter the new account name and
password. Confirm the password, then click Next.
13 (Optional) If you opted to use an existing domain user account, enter the account name
and password. The user name must be in DOMAIN\username format.
14 In the Oracle Database panel, enter details about the Oracle database server. Specify
one of the following options in the Oracle Database Server field:
Host Enter host information based on your Symantec Data Loss Prevention installation:
■ Single- and two-tier installation (Enforce and Oracle servers on the same
system): The Oracle Server location is 127.0.0.1.
■ Three-tier installation (Enforce Server and Oracle server on different systems):
Specify the Oracle server host name or IP address. To install into a test
environment that has no DNS available, use the IP address of the Oracle
database server.
Username Enter the Symantec Data Loss Prevention database user name.
If your Oracle database is not the correct version, you are warned and offered the choice
of continuing or canceling the installation. You can continue and upgrade the Oracle
database later.
If you are re-using a database that was created for an earlier Symantec Data Loss
Prevention installation, the Symantec Data Loss Prevention database user ("protect" user
by default) may not have sufficient privileges to install the product. In this case, you must
manually add the necessary privileges using SQL*Plus.
Note: Symantec Data Loss Prevention requires the Oracle database to use the AL32UTF8
character set. If your database is configured for a different character set, you are notified
and the installation is canceled. Correct the problem and re-run the installer.
■ Select Initialize Database if you are performing a new Symantec Data Loss Prevention
installation.
You can also select this option if you are reinstalling and want to overwrite the existing
Enforce schema and all data. Note that this action cannot be undone. If this check box
is selected, the data in your existing Symantec Data Loss Prevention database is
destroyed after you click Next.
■ Select Preserve Database Data if you want to connect to an existing database.
Selecting this option skips the database initialization process. If you choose to skip
the database initialization, you specify the unique Enforce Reinstallation Resources
file for the existing database that you want to use.
See “Creating the Enforce Reinstallation Resources file” on page 150.
17 In the Enforce Administrator Password panel, enter and confirm a password you use
to access the Enforce Server administration console.
If you selected Preserve Database Data in the previous step, the Enforce Administrator
Password panel does not display. The administrator credentials are already saved in the
existing database.
18 Click Next to display the Enable external storage for incident attachments panel.
19 If you choose to store your incident attachments externally, select the Enable external
storage for incident attachments box and enter the path or browse to your external
storage directory.
See “About external storage for incident attachments” on page 22.
20 In the Additional Locale panel, select an alternate locale, or accept the default of None,
and click Next.
Locale controls the format of numbers and dates, and how lists and reports are
alphabetically sorted. If you accept the default choice of None, English is the locale for
this Symantec Data Loss Prevention installation. If you choose an alternate locale, that
locale becomes the default for this installation, but individual users can select English as
a locale for their use.
See the Symantec Data Loss Prevention Administration Guide for more information on
locales.
21 Click Install.
The installation process can take a few minutes. The installation program window may
persist for a while during the startup of the services. After a successful installation, a
completion notice displays.
22 Restart any antivirus, pop-up blocker, or other protection software that you disabled before
starting the Symantec Data Loss Prevention installation process.
Installing an Enforce Server 33
Verifying an Enforce Server installation
Note: On Windows platforms, all services run under the System Account user name (by
default, “SymantecDLP”).
■ SymantecDLPIncidentPersister
■ SymantecDLPNotifier
■ SymantecDLPDetectionServerController
Installing an Enforce Server 34
Installing a new license file
3 If the Symantec Data Loss Prevention services do not start, check the log files for possible
issues (for example, connectivity, password, or database access issues).
The Symantec Data Loss Prevention installation log is at c:\ProgramData\Symantec\Data
Loss Prevention\Enforce Server\15.1\
You may also need to install the Update for Universal C Runtime in Windows. See
https://support.microsoft.com/en-us/kb/2999226.
4 Once you have verified the Enforce Server installation, you can log on to the Enforce
Server to view the administration console. Using the administration console, go to System
> Settings > General accept the EULA, enter your company information, and add all of
your licenses.
See “Installing a new license file” on page 34.
See the Symantec Data Loss Prevention Administration Guide for information about
logging on to, and using, the Enforce Server administration console.
Note: If you do not agree to the terms and conditions of the EULA, you cannot install the
software.
See the solution pack documentation for a description of the contents of each solution pack.
Solution pack documentation can be found in the following directory:
DLPDownloadHome\DLP\15.1\Docs\Solution_Packs\.
This directory was created when you unzipped either the entire software download file or the
documentation ZIP file.
You must choose and import a solution pack immediately after installing the Enforce Server
and before installing any detection servers. You only import a single solution pack. You cannot
change the imported solution pack at a later time.
See “Importing a solution pack” on page 37.
For information about importing a solution pack, see the Symantec Data Loss Prevention
Installation Guide.
For example, do not import a version 14.6 solution pack on a version 15.1 Enforce Server.
■ Do not attempt to import more than one solution pack on the same Enforce Server, as the
solution pack import fails.
■ Do not import a solution pack on an Enforce Server that was modified after the initial
installation; the solution pack import fails.
■ After you import a solution pack, you cannot change the installation to use a different
solution pack at a later time.
To import a solution pack
1 Decide which solution pack you want to use.
See “About Symantec Data Loss Prevention solution packs” on page 36.
Note: You must use a version 15.1 solution pack; earlier versions are not supported.
SolutionPackInstaller.exe import
c:\Program Files\Symantec\Data Loss Prevention\Financial_v15.1.vsp
Importing a solution pack 39
Importing a solution pack
8 Check the solution pack installer messages to be sure that the installation succeeded
without error.
9 Restart the SymantecDLPManager service.
See “About Symantec Data Loss Prevention services” on page 144.
10 After you have completed importing the solution pack, do one of the following depending
on the type of installation:
■ On three-tier or two-tier installations install one or more detection servers.
See “About detection servers” on page 40.
Network Monitor Network Monitor inspects the network communications for confidential
data, accurately detects policy violations, and precisely qualifies and
quantifies the risk of data loss. Data loss can include intellectual property
or customer data.
Network Prevent for Email Network Prevent for Email prevents data security violations by blocking
the email communications that contain confidential data. It can also
conditionally route traffic with confidential data to an encryption gateway
for secure delivery and encryption-policy enforcement.
Note: You can optionally deploy Network Prevent for Email in a hosted
service provider network, or in a network location that requires
communication across a Wide Area Network (WAN) to reach the Enforce
Server.
Network Prevent for Web Network Prevent for Web prevents data security violations for data that
is transmitted by web communications and file-transfer protocols.
Note: You can optionally deploy Network Prevent for Web in a hosted
service provider network, or in a network location that requires
communication across a Wide Area Network (WAN) to reach the Enforce
Server.
Endpoint Prevent Endpoint Prevent monitors the use of sensitive data on endpoint systems
and detects endpoint policy violations. Endpoint Prevent also identifies
unsecured confidential data that is exposed on endpoints.
Installing and registering detection servers 42
Detection servers and remote indexers
Single Tier Monitor The Single Tier Monitor enables the detection servers that you have
licensed on the same host as the Enforce Server. The single-tier server
performs detection for the following products (you must have a license
for each): Network Monitor, Network Discover/Cloud Storage Discover,
Network Prevent for Email, Network Prevent for Web, and Endpoint
Prevent.
■ Confirm that you have WinPcap. On the Internet, go to the following URL:
http://www.winpcap.org
See the Symantec Data Loss Prevention System Requirements and Compatibility Guide
for version requirements.
Note: The WinPcap software is only required for the Network Monitor Server. However,
Symantec recommends that you install WinPcap no matter which type of detection server
you plan to install and configure.
■ Confirm that you have Wireshark, available from www.wireshark.org. During the Wireshark
installation process on Windows platforms, do not install a version of WinPcap lower than
4.1.2.
■ Confirm that you have Windows Services for UNIX (SFU) version 3.5 (SFU35SEL_EN.exe).
SFU is required for a Network Discover Server to run a scan against a target on a UNIX
machine. SFU can be downloaded from Microsoft.
■ Symantec recommends that you disable any antivirus, pop-up locker, and registry-protection
software before you begin the detection server installation process.
■ Install the Java Runtime Environment.
See “Installing the Java Runtime Environment on a detection server” on page 44.
Azure RMS Install the RMS client, version 2.1, on the detection server.
AD RMS ■ Install the RMS client, version 2.1, on the detection server using a domain service
user that is added to the AD RMS Super Users group.
■ Provide both the AD RMS Service User and the DLP Service User with Read and
Execute permissions to access ServerCertification.asmx. Refer to the
Microsoft Developer Network for additional details:
https://msdn.microsoft.com/en-us/library/mt433203.aspx.
■ Add the detection server to the AD RMS server domain.
■ Run the detection server services using a domain user that is a member of the AD
RMS Super Users group.
Installing and registering detection servers 44
Installing the Java Runtime Environment on a detection server
After you install the detection server, you enable RMS file detection. See “Enabling Microsoft
Rights Management file monitoring” on page 49.
Note: You can skip this step if you have already installed a JRE that meets Symantec Data
Loss Prevention requirements.
Note: The following instructions assume that the DetectionServer.msi file has been copied
into the c:\temp directory on the server computer.
Installing and registering detection servers 45
Installing a detection server
You can complete the installation using Silent Mode. Enter values with information specific to
your installation for the following:
Command Description
Command Description
The following is an example of what the completed command for Silent Mode installation might
look like:
4 Copy the detection server installer (DetectionServer.msi) from the Enforce Server to a
local directory on the detection server.
DetectionServer.msi is included in your software download (DLPDownloadHome) directory.
It should have been copied to a local directory on the Enforce Server during the Enforce
Server installation process.
Note: Using the graphical user interface method to install does not generate log information.
To generate log information, run the installation using the following command:
5 Click Start > Run > Browse to navigate to the folder where you copied the
DetectionServer.msi file.
Note: Directory names, IP addresses, and port numbers created or specified during the
installation process must be entered in standard 7-bit ASCII characters only. Extended
(hi-ASCII) and double-byte characters are not supported.
10 In the JRE Directory panel, accept the default JRE location (or click Browse to locate
it), and click Next.
11 In the FIPS Cryptography Mode panel, select whether to disable or enable FIPS
encryption.
See “About FIPS encryption” on page 155.
12 In the Service User panel, select one of the following options, then click Next.
Installing and registering detection servers 48
Installing a detection server
■ New Users: Select this option to create the Symantec Data Loss Prevention system
account user name and password and confirm the password. This account is used to
manage Symantec Data Loss Prevention services. The default user name is
“SymantecDLP.” New service user accounts are local accounts.
Note: To use the RMS detection feature, you must enable it after installing the detection
server.
See “Enabling Microsoft Rights Management file monitoring” on page 49.
The password you enter for the System Account must conform to the password policy
of the server. For example, the server may require all passwords to include special
characters.
■ Existing Users: Select this option to use an existing local or domain user account.
Enter a domain service user name and password if you plan to manage the detection
server with a domain user. If you want to use the RMS detection feature, ensure that
the domain user that you enter has access to the RMS AD system (and is a member
of the selected AD RMS Super Users group) or the Azure RMS system.
Click Next.
13 (Optional) If you opted to create a new service user, enter the new account name and
password. Confirm the password, then click Next.
14 (Optional) If you opted to use an existing local or domain user account, enter the account
name and password. The user name for a domain users must be in DOMAIN\username
format.
15 In the Update User panel, enter the account name and password. The default user name
is "SymantecDLPUpdate."
This account is used to manage updates sent to the detection server.
16 In the Detection Server Default Certificates panel, select one of the following options:
■ Enable Default Certificates: Select if the detection server runs on a secure network
or if it is only accessible by trusted traffic.
■ Disable Default Certificates: Select if you plan to generate unique, self-signed
certificates for your organization’s installation.
See “About the sslkeytool utility and server certificates” on page 55.
2 Run the configuration utility ConfigurationCreator.exe to add the system user. Run
the utility as the protect user.
Note: Enter all credentials accurately to ensure that the feature is enabled.
After running this script, the following files are created in the
MicrosoftRightsManagementPlugin at \Program Files\Symantec\Data Loss
Prevention\Enforce Server\15.1\Protect\plugins\contentextraction\:
■ rightsManagementConfiguration
■ rightsManagementConfigurationProtection
Note: You can confirm that Symantec Data Loss Prevention is monitoring RMS content
by reviewing the ContentExtractionHost_FileReader.log file (located at
\ProgramData\Symantec\Data Loss Prevention\detection
server\15.1\protect\Logs\debug). Error messages that display for the
MicrosoftRightsManagementPlugin.cpp item indicate that the plugin is not monitoring
RMS content.
Note: You can confirm that Symantec Data Loss Prevention is monitoring RMS content
by reviewing the ContentExtractionHost_FileReader.log file (located at
\ProgramData\Symantec\Data Loss Prevention\detection
server\15.1\protect\Logs\debug). Error messages that display for the
MicrosoftRightsManagementPlugin.cpp item indicate that the plugin is not monitoring
RMS content.
5 Enter the General information. This information defines how the server communicates
with the Enforce Server.
■ In Name, enter a unique name for the detection server.
■ In Host, enter the detection server’s host name or IP address. For a single-tier
installation, click the Same as Enforce check box to autofill the host information. For
a Single Tier Monitor, the local host is pre-selected.
■ In Port, enter the port number the detection server uses to communicate with the
Enforce Server. If you chose the default port when you installed the detection server,
then enter 8100. However, if you changed the default port, then enter the same port
number here (it can be any port higher than 1024).
The additional configuration options displayed on the Configure Server page vary
according to the type of server you selected.
6 Specify the remaining configuration options as appropriate.
See the Symantec Data Loss Prevention Administration Guide for details on how to
configure each type of server.
7 Click Save.
The Server Detail screen for that server appears.
8 If necessary, click Server Settings or other configuration tabs to specify additional
configuration parameters.
9 If necessary, restart the server by clicking Recycle on the Server Detail screen. Or you
can start the Symantec DLP services manually on the server itself.
See “About Symantec Data Loss Prevention services” on page 144.
10 To verify that the server was registered, return to the System Overview page. Verify that
the detection server appears in the server list, and that the server status is Running.
11 To verify the type of certificates that the server uses, select System > Servers > Alerts.
Examine the list of alerts to determine the type certificates that Symantec Data Loss
Prevention servers use:
■ If servers use the built-in certificate, the Enforce Server shows a warning event with
code 2709: Using built-in certificate.
■ If servers use unique, generated certificates, the Enforce Server shows an info event
with code 2710: Using user generated certificate.
and configure its general settings. To configure the Single Tier Monitor, you configure the
channels for each detection server type for which you have a license.
For more information about configuring and maintaining detection servers, see the Symantec
Data Loss Prevention Administration Guide.
To register the Single Tier Monitor
1 Log on to the Enforce Server as Administrator.
2 Go to System > Servers > Overview.
The System Overview page appears.
3 Click Add Server.
The Add Server page appears.
4 Select Single Tier Monitor, then click Next.
The Configure Server screen appears.
5 Enter the General information. This information defines how the server communicates
with the Enforce Server.
■ In the Name field, enter a unique name for the detection server.
■ The Host field is already set to the local host address. You cannot change this setting.
■ In the Port field, enter the port number the detection server uses to communicate with
the Enforce Server. By default, the port is set to 8100. If you want to use a different
port number, enter any port number greater than 1024 here.
■ If servers use the built-in certificate, the Enforce Server shows a warning event with
code 2709: Using built-in certificate.
■ If servers use unique, generated certificates, the Enforce Server shows an info event
with code 2710: Using user generated certificate.
Chapter 6
Configuring certificates for
secure server
communications
This chapter includes the following topics:
■ About securing communications between the Enforce Server and the database
Note: If you install a Network Prevent detection server in a hosted environment, you must
generate unique certificates for your Symantec Data Loss Prevention servers. You cannot use
the built-in certificate to communicate with a hosted Network Prevent server.
Configuring certificates for secure server communications 56
About the sslkeytool utility and server certificates
Symantec recommends that you create dedicated certificates for communication with your
Symantec Data Loss Prevention servers. When you configure the Enforce Server to use a
generated certificate, all detection servers in your installation must also use generated
certificates. You cannot use the generated certificate with some detection servers and the
built-in certificate with other servers. Single-tier deployments do not support generated
certificates. You must use the built-in certificate with singler-tier deployments.
See “About sslkeytool command line options” on page 56.
See “Using sslkeytool to generate new Enforce and detection server certificates” on page 58.
See “Using sslkeytool to add new detection server certificates” on page 60.
See “About server security and SSL/TLS certificates” on page 127.
It must run under the Symantec Data Loss Prevention operating system user account which,
by default, is “protect.” Also, you must run the sslkeytool utility directly on the Enforce Server
computer.
Table 6-1 lists the command forms and options that are available for the sslkeytool utility:
sslKeyTool -genkey [-dir=<directory> You use this command form the first time you generate
-alias=<aliasFile>] unique certificates for your Symantec Data Loss Prevention
installation.
sslKeyTool -list=<file> This command lists the content of the specified keystore
file.
Configuring certificates for secure server communications 57
About the sslkeytool utility and server certificates
sslKeyTool -alias=<aliasFile> You use this command form to add new detection server
-enforce=<enforceKeystoreFile> certificates to an existing Symantec Data Loss Prevention
[-dir=<directory>] installation.
Table 6-2 provides examples that demonstrate the usage of the sslkeytool command forms
and options.
Example Description
sslkeytool -alias=Monitor.list.txt Without the directory option -dir, the Enforce Server
-enforce=enforce.date.sslkeystore certificate must be in the current directory. The new
detection server certificate(s) will be created in the current
directory.
See “About the sslkeytool utility and server certificates” on page 55.
See “Using sslkeytool to generate new Enforce and detection server certificates” on page 58.
See “Using sslkeytool to add new detection server certificates” on page 60.
See “About server security and SSL/TLS certificates” on page 127.
Note: The steps that follow are for generating unique certificates for the Enforce Server and
detection servers at the same time. If you need to generate one or more detection server
certificates after the Enforce Server certificate is generated, the procedure is different. See
“Using sslkeytool to add new detection server certificates” on page 60.
3 If you want to create a dedicated certificate file for each detection server, first create a
text file to list the alias names you want to create. Place each alias on a separate line.
For example:
net_monitor01
protect01
endpoint01
smtp_prevent01
web_prevent01
Note: The -genkey argument automatically creates certificates for the "enforce" and
"monitor" aliases. Do not add these aliases to your custom alias file.
4 Run the sslkeytool utility with the -genkey argument and optional -dir argument to specify
the output directory. If you created a custom alias file, also specify the optional -alias
argument, as in the following example:
This generates new certificates (keystore files) in the specified directory. Two files are
automatically generated with the -genkey argument:
■ enforce.timestamp.sslKeyStore
■ monitor.timestamp.sslKeyStore
The sslkeytool also generates individual files for any aliases that are defined in the alias
file. For example:
■ net_monitor01.timestamp.sslKeyStore
■ protect01.timestamp.sslKeyStore
■ endpoint01.timestamp.sslKeyStore
■ smtp_prevent01.timestamp.sslKeyStore
■ web_prevent01.timestamp.sslKeyStore
5 Copy the certificate file whose name begins with enforce to the
c:\ProgramData\Symantec\Data Loss Prevention\Enforce Server\15.1\keystore
directory on the Enforce Server:
Configuring certificates for secure server communications 60
About the sslkeytool utility and server certificates
6 If you want to use the same certificate file with all detection servers, copy the certificate
file whose name begins with monitor to the keystore directory of each detection server
in your system.
Copy the file to c:\ProgramData\Symantec\Data Loss Prevention\Detection
Server\15.1\protect\keystore
If you generated a unique certificate file for each detection server in your system, copy
the appropriate certificate file to the keystore directory on each detection server computer.
7 Delete or secure any additional copies of the certificate files to prevent unauthorized
access to the generated keys.
8 Restart the SymantecDLPDetectionServerController service on the Enforce Server
and the SymantecDLPDetectionServer service on the detection servers.
When you install a Symantec Data Loss Prevention server, the installation program creates
a default keystore in the keystore directory. When you copy a generated certificate file into
this directory, the generated file overrides the default certificate. If you later remove the
certificate file from the keystore directory, Symantec Data Loss Prevention reverts to the
default keystore file embedded within the application. This behavior ensures that data traffic
is always protected. Note, however, that you cannot use the built-in certificate with certain
servers and a generated certificate with other servers. All servers in the Symantec Data Loss
Prevention system must use either the built-in certificate or a custom certificate.
Note: If more than one keystore file is placed in the keystore directory, the server does not
start.
See “Using sslkeytool to add new detection server certificates” on page 60.
See “About sslkeytool command line options” on page 56.
See “About the sslkeytool utility and server certificates” on page 55.
See “About server security and SSL/TLS certificates” on page 127.
3 Create a directory in which you will store the new detection server certificate files. For
example:
mkdir new_certificates
4 Copy the Enforce Server certificate file to the new directory. For example:
Windows command:
copy ..\keystore\enforce.Fri_Jun_12_11_24_20_PDT_2016.sslkeyStore
.\new_certificates
5 Create a text file that lists the new server alias names that you want to create. Place each
alias on a separate line. For example:
network02
smtp_prevent02
6 Run the sslkeytool utility with the -alias argument and -dir argument to specify the
output directory. Also specify the name of the Enforce Server certificate file that you copied
into the certificate directory. For example:
Windows command:
sslkeytool -alias=.\aliases.txt
-enforce=enforce.Fri_Jun_10_11_24_20_PDT_2016.sslkeyStore
-dir=.\new_certificates
This generates a new certificate file for each alias, and stores the new files in the specified
directory. Each certificate file also includes the Enforce Server certificate from the Enforce
Server keystore that you specify.
Configuring certificates for secure server communications 62
About the sslkeytool utility and server certificates
7 Copy each new certificate file to the keystore directory on the appropriate detection server
computer.
On Windows the path is c:\Program Data\Symantec\Data Loss Prevention\Detection
Server\15.1\protect\keystore.
8 Delete or secure any additional copies of the certificate files to prevent unauthorized
access to the generated keys.
9 Restart the SymantecDLPDetectionServer service on each detection server to use the
new certificate file.
■ If servers use unique, generated certificates, the Enforce Server shows an info event
with code 2710: Using user generated certificate.
Table 6-3 Steps to secure communications between the Enforce Server and the database
1 Generate the self-signed certificates using the See “About orapki command line options”
orapki command-line utility that is provided with on page 63.
the Oracle database.
See “Using orapki to generate the server
certificate on the Oracle database”
on page 64.
2 Configure the JDBC driver on the Enforce Server See “Configuring communication on the
to use the TLS connection and port. Enforce Server” on page 65.
3 Configure the server certificate on the Enforce See “Configuring the server certificate on
Server. the Enforce Server” on page 67.
orapki wallet create -wallet You use this command to create a wallet where
c:\oracle\wallet\server_wallet certificates are stored.
-auto_login -pwd password
This command also creates the server_wallet
directory.
orapki wallet add -wallet You use this command to add a self-signed
c:\oracle\wallet\server_wallet -dn certificate and a pair of private/public keys to the
"CN=oracleserver" -keysize 2048 wallet.
-self_signed -validity 3650 -pwd
password -sign_alg sha256
orapki wallet display -wallet You use this command to view the contents of the
c:\oracle\wallet\server_wallet wallet to confirm that the self-signed certificate was
created successfully.
orapki wallet export -wallet You use this command to export the self-signed
c:\oracle\wallet\server_wallet -dn certificate.
"CN=oracleserver" -cert
In addition to exporting the certificate files, the
c:\oracle\wallet\server_wallet\cert.txt command creates the file cert.txt in the
c:\oracle\wallet\server_wallet directory.
cd wallet
4 Create a wallet on the Oracle server with auto login enabled by running the following
command in the c:\oracle\wallet directory:
orapki wallet create -wallet .\server_wallet -auto_login -pwd walletpassword
Configuring certificates for secure server communications 65
About securing communications between the Enforce Server and the database
Note: Use a wallet password that adheres to the password policy. Passwords must have
a minimum length of eight characters and contain alphabetic characters combined with
numbers or special characters.
■ cwallet.sso
■ ewallet.p12
5 Generate the self-signed certificate and add it to the wallet by running the following
command:
orapki wallet add -wallet c:\oracle\wallet\server_wallet -dn
"CN=oracleserver" -keysize 2048 -self_signed -validity 3650 -pwd
walletpassword -sign_alg sha256
Replace oracleserver with the name of the computer where Oracle is running.
6 View the wallet to confirm that the certificate was created successfully by running the
following command:
orapki wallet display -wallet c:\oracle\wallet\server_wallet
When the certificate is created successfully, the command returns information in the
following form:
Requested Certificates:
User Certificates:
Subject: CN=oracleserver
Trusted Certificates:
Subject: CN=oracleserver
LISTENER =
(DESCRIPTION_LIST =
(DESCRIPTION =
(ADDRESS = (PROTOCOL = TCPS)(HOST = [oracle host name])(PORT = 2484))
(ADDRESS = (PROTOCOL = IPC)(KEY = protect))
)
)
SSL_CLIENT_AUTHENTICATION = FALSE
WALLET_LOCATION = (SOURCE = (METHOD = FILE) (METHOD_DATA = (DIRECTORY =
c:\oracle\wallet\server_wallet)))
SQLNET.AUTHENTICATION_SERVICES=(NONE)
SSL_CLIENT_AUTHENTICATION = FALSE
WALLET_LOCATION = (SOURCE = (METHOD = FILE) (METHOD_DATA = (DIRECTORY =
c:\oracle\wallet\server_wallet)))
9 Update the protocol to TCPS and the port to 2484. The updated content should match
the following:
PROTECT =
(DESCRIPTION =
(ADDRESS = (PROTOCOL = TCPS)(HOST = [oracle host name])(PORT = 2484))
(CONNECT_DATA =
(SERVER = DEDICATED)
(SERVICE_NAME = protect)
)
)
LISTENER_PROTECT =
(ADDRESS = (PROTOCOL = TCPS)(HOST = [oracle host name])(PORT = 2484))
sqlplus /nolog
SQL> exit
lsnrctl status
3 Add the certificate to the cacerts file that is located on the Enforce Server by completing
the following steps:
Note: If the server certificate on the Oracle database is signed by a public CA (instead
of being self-signed), skip to 4.
See “Using orapki to generate the server certificate on the Oracle database” on page 64.
c Insert the certificate into the cacerts file by running the following command as an
administrator:
d Confirm that the certificate was added by running the following command:
Requirements and Compatibility Guide. Symantec recommends installing the domain controller
agent on a dedicated server. The domain controller agent can connect to multiple domain
controllers.
The following User Identification configurations are not supported:
■ One domain controller agent to multiple Enforce Servers
■ Linux domain controllers
■ Domain controller agents installed on endpoints
6 Click Next.
The Domain Controller Configuration panel appears.
7 Enter the fully qualified domain name (FQDN) of your domain controller.
8 Click Next.
The DC Agent Service Configuration panel appears.
9 Enter the logon (DOMAIN\USERNAME) and password for the Active Directory user that
the domain controller agent uses to query the domain controller.
10 Click Next.
The Symantec DLP Enforce Server Configuration panel appears.
11 Enter the following information:
■ The Enforce Server host name
■ The Enforce Server port
■ The logon name for the domain controller agent Enforce Server account
■ The password for the domain controller agent Enforce Server account
■ Optional: If you choose to use certificate authentication, select Use a certificate to
authenticate?, then enter the path to the Enforce Server certificate and the CA root
certificate, both located on your Enforce Server.
12 Click Next.
The DC Agent Communication Configuration panel appears.
13 Enter the following information:
Installing the domain controller agent to identify users in incidents 73
Domain controller agent post-installation tasks
■ Communication Interval: This value specifies how often the domain controller agent
connects to the domain controller to collect events, in seconds. The default
communication interval is 1 hour (3600 seconds).
■ Lookback Time: This value specifies the time frame for which the domain controller
collects events from the domain controller, in seconds. The default lookback time is
12 hours (43200 seconds).
14 Click Next.
The Ready to Install Vontu Domain Controller Agent panel appears.
15 Click Next.
The Installing Vontu Domain Controller Agent panel appears and displays a progress
bar.
16 Click Finish to complete the installation of the domain controller agent.
Updating the Enforce Server logon for the domain controller agent
You can update the Enforce Server logon credential for the domain controller agent in the
Credential Manager on the domain controller agent host server.
Updating the Enforce Server logon for the domain controller agent
1 Log on to the domain controller agent host server as the Service Logon user.
2 In the Credential Manager (Control Panel > User Accounts > Credential Manager),
edit the generic credential for the Enforce Server.
3 Click Save.
Problem Solution
There are no entries in the Domain Controllers User identification is disabled by default. Go to
list. System > Incident Data > User Identification and
set a mapping schedule.
Installing the domain controller agent to identify users in incidents 76
Uninstalling the domain controller agent
Problem Solution
The domain controller agent service does not start Check the domain controller log at System >
Incident Data > User Identification page.
The IPU tables in the database have no events Check the Enforce Server logs and verify that the
log-on user for the Enforce Server has the correct
credentials.
See the Symantec Data Loss Prevention Oracle 12c Standard Edition 2 Release 2
Installation and Upgrade Guide available at the Symantec Support Center:
http://www.symantec.com/docs/DOC10713
■ Install the Java Runtime Environment (JRE).
See “Installing the Java Runtime Environment for a single-tier installation” on page 78.
You can skip this step if you have already installed a JRE that meets Symantec Data Loss
Prevention requirements.
■ Confirm that you have access and permission to run the Symantec Data Loss Prevention
installer software: SingleTierServer.msi.
Note: You can skip this step if you have already installed a JRE that meets Symantec Data
Loss Prevention requirements.
Note: The following instructions assume that the SingleTierServer.msi file, license file, and
solution pack file have been copied into the c:\temp directory on the Enforce Server.
Note: Using the graphical user interface method to install does not generate log information.
To generate log information, run the installation using the following command: C:\msiexec
/i SingleTierServer.msi /L*v c:\singletierserver_install.log.
After you complete the Single Tier installation, you can find the data directory at
e:\singletier_data.
You can complete the installation using Silent Mode. Enter values with information specific to
your installation for the following:
Command Description
Command Description
Command Description
The following is an example of what the completed command might look like:
Note: On Windows platforms, all services run the System Account user name.
■ SymantecDLPIncidentPersister
■ SymantecDLPNotifier
■ SymantecDLPDetectionServer
Performing a single-tier installation 82
Policy authoring considerations
■ SymantecDLPDetectionServerController
2 If the Symantec Data Loss Prevention services do not start, check the log files for possible
issues (for example, connectivity, password, or database access issues).
The Symantec Data Loss Prevention installation log is at c:\ProgramData\Symantec\Data
Loss Prevention\Single Tier Server\15.1\
You may also need to install the Update for Universal C Runtime in Windows. See
https://support.microsoft.com/en-us/kb/2999226.
Once you have verified the Enforce Server installation, you can log on to the Enforce Server
to view the administration console.
See the Symantec Data Loss Prevention Administration Guide for information about logging
on to, and using, the Enforce Server administration console.
You must import a Symantec Data Loss Prevention solution pack immediately after installing
and verifying the single-tier server, and before changing any single-tier server configurations.
See “About Symantec Data Loss Prevention solution packs” on page 36.
After importing a solution pack, register a detection server.
See “Registering a detection server” on page 51.
See “Registering the Single Tier Monitor” on page 52.
For more information about two-tier installations, see the Symantec Data Loss Prevention
Installation Guide.
To migrate to a two-tier deployment
1 Log on to the Enforce Server as Administrator.
2 Go to System > Servers > Overview.
The System Overview page appears.
3 Click Add Server.
The Add Server page appears.
4 Register and configure a new detection server for each detection type which you have a
license. Each server requires its own dedicated hardware.
For complete information about registering detection servers, see the Symantec Data
Loss Prevention Installation Guide.
For complete information about configuring detection servers, see the Symantec Data
Loss Prevention Administration Guide
5 After you have registered and configured each detection server, remove the configuration
from each tab on the System > Servers Overview > Configure Server page for the
corresponding channel or channels on your Single Tier Monitor.
6 After you have deployed a new detection server for each of your detection server licenses,
go to System > Servers > Overview and remove the Single Tier Monitor.
Chapter 9
Installing Symantec DLP
Agents
This chapter includes the following topics:
Note: Before you begin the Symantec DLP Agent installation process, confirm that you have
installed and configured an Endpoint Server. See “Preparing for a detection server installation”
on page 42.
See “About Endpoint Server redundancy” on page 93.
Installing Symantec DLP Agents 85
About secure communications between DLP Agents and Endpoint Servers
Note: Before you start generating the agent installation packages, confirm that the agent
installer has been copied to the Enforce Server local file system. See “Symantec Data Loss
Prevention preinstallation steps” on page 21.
Before you start generating the agent installation packages confirm that your system is ready
to package by completing the following:
■ Confirm that the agent installers are copied to the Enforce Server local file system.
See “Symantec Data Loss Prevention preinstallation steps” on page 21.
■ Confirm that the Enforce Server has at least 3 GB of free space. The packaging process
fails if the Enforce Server has less than 3 GB of free space.
Table 9-2 provides instructions for generating agent installation packages. The instructions
assume that you have deployed an Endpoint Server.
1 Navigate to the Agent Log on to the Enforce Server administration console as an administrator
Packaging page. and navigate to the System > Agents > Agent Packaging page.
Installing Symantec DLP Agents 87
About secure communications between DLP Agents and Endpoint Servers
2 Select the agent version. Select an item in the Select the agent version list that matches the agent
installer files you plan to package. You can select one of the following:
■ Pre-version 15.0
Applies to agent versions 12.5.x through 14.6.x.
■ Version 15.0
Applies to agent version 15.0.x.
■ Version 15.1 and later
Applies to all agent versions starting with 15.1.
You must select 32- and 64-bit installation files that match the agent
version you selected. For example, selecting a version 15.0 32-bit and a
version 15.1 64-bit installation file while selecting Version 15.1 and later
in the list is unsupported. Selecting mis-matched versions prevents agents
from installing on endpoints.
If you plan to package an ICT Client and ICE Utility with the DLP agent,
you must select Version 15.1 and later.
3 Select one or more DLP Agent Browse to the folder on the Enforce Server where you copied the agent
installation files. installer files:
4 Enter the server host name. Typically you enter the common name (CN) of the Endpoint Server host,
or you can enter the IP address of the server.
Be consistent with the type of identifier you use (CN or IP). If you used
the CN for the Endpoint Server when deploying it, use the same CN for
the agent package. If you used an IP address to identify the Endpoint
Server, use the same IP address for the agent package.
5 Enter the port number for the The default port is 10443. Typically you do not need to change the default
server. port unless it is already in use or intended for use by another process on
the server host.
Installing Symantec DLP Agents 88
About secure communications between DLP Agents and Endpoint Servers
6 Add additional servers Click the plus sign to add additional servers for failover.
(optional).
Note: Symantec Data Loss Prevention allots 2048 characters for Endpoint
Server names. This allotment includes the characters that are used for
the Endpoint Server name, port numbers, and semicolons to delimit each
server.
The first server that is listed is the primary; additional servers are
secondary and provide backup if the primary is down.
7 Enter the Endpoint tools A password is required to use the Endpoint tools to administer DLP
password. Agents. The Endpoint tools password is case-sensitive. The password is
encrypted and stored in a file on the Enforce Server. You should store
this password in a secure format of your own so that it can be retrieved
if forgotten.
After installing agents, you can change the password on the Agent
Password Management screen.
8 Re-enter the Endpoint tools The system validates that the passwords match and displays a message
password. if they do not.
9 Enter the target directory for The default installation directory for Windows 32- and 64-bit agents is
the agent installation (Windows %PROGRAMFILES%\Manufacturer\Endpoint Agent. Change the
only). default path if you want to install the Windows agent to a different location
on the endpoint host. You can only install the DLP Agent to an ASCII
directory using English characters. Using non-English characters can
prevent the DLP Agent from starting and from monitoring data in some
scenarios.
Note: Include the drive letter if you plan to change the default directory.
For example, use C:\Endpoint Agent. Not including a drive letter
causes the agent installation to fail.
10 Enter the uninstall password The agent uninstall password is supported for Windows agents. The
(optional, Windows only). uninstall password is a tamper-proof mechanism that requires a password
to uninstall the DLP Agent.
After installing agents, you can change the password on the Agent
Password Management screen.
11 Re-enter the uninstall The system validates that the passwords match and displays a message
password. if they do not.
12 (Optional) Select Install the Select this option to package the ICT Client with the agent package.
Symantec ICT Client.
Enter the License and ICT Web Service URL.
■ License
After the ICT admin installs the ICT server and uploads a license file
on the Server Keys tab, a server public key displays. Enter that key
in the License field.
■ ICT Web Service URL
The ICT admin defines this URL on the Encryption tab, in the URL
of Rights Template Manager Web Services field. Enter that URL in
the ICT Web Service URL field.
For more information about these two fields, see the Symantec Information
Centric Tagging Deployment Guide:
http://www.symantec.com/docs/DOC11006
13 (Optional) Select Install the Select this option to package the ICE Utility with the agent package.
Symantec ICE Utility.
For more information about the ICE Utility, see the Symantec Information
Centric Encryption Deployment Guide:
http://www.symantec.com/docs/DOC9707
Installing Symantec DLP Agents 90
About secure communications between DLP Agents and Endpoint Servers
14 Click Generate Installer This action generates the agent installer package for each platform that
Packages. you selected in step 3.
15 Save the agent package zip When the agent packaging process is complete, the system prompts you
file. to download the agent installation package. Save the zip file to the local
file system. After you save the file you can navigate away from the Agent
Packaging screen to complete the process.
The zip file is named according to the agent installer you uploaded:
AgentInstaller_Win64.zip
AgentInstaller_Win32.zip
AgentInstaller_Mac64.zip
If you upload more than one agent installer, the package name is
AgentInstallers.zip. In this case, the zip file contains separate zip
files for each agent package for each platform you selected in step 23.
16 Install DLP Agents using the Once you have generated and downloaded the agent package, you use
agent package. it to install all agents for that platform.
endpoint_truststore.pem
install_agent.bat Use to install the DLP Agent, ICT Client, and ICE Utility
silently.
http://www.symantec.com/docs/DOC11006
upgrade_agent.bat Use to upgrade the DLP Agent, ICT Client, and ICE Utility
silently.
The Mac agent package contains endpoint certificates, installation files, the package manifest,
and a file to generate the installation script for macOS.
See “DLP Agent installation overview” on page 84.
File Description
endpoint_truststore.pem
File Description
install_agent.sh Use to install the DLP Agent and the ICE Utility.
Note: See the Symantec Data Loss Prevention System Requirements and Compatibility Guide
for information about configuring third-party software to work with the Symantec DLP Agent.
Make sure that your antivirus software and firewall software recognize the Symantec DLP
Agents as legitimate programs.
2 Hold the Shift key and right-click Command Prompt in the results list.
3 Select Run as Administrator.
Note: If you plan to install DLP Agents running Windows 8.1 or Windows 10, verify that Admin
Security mode is set to Disabled on the administrator account. This setting allows administrators
to complete tasks such as running endpoint tools and installing agents.
Before you install DLP Agents on Windows endpoints, confirm that you have completed
prerequisite steps. See “DLP Agent installation overview” on page 84.
Installing Symantec DLP Agents 95
Process to install the DLP Agent on Windows
1 Install an agent manually. See “Installing the DLP Agent for Windows
manually” on page 95.
Install a single agent to test the configuration or
to create a test scenario.
2 Install the agents using your SMS. See “Installing DLP Agents for Windows
silently” on page 96.
You install agents in this method to install many
agents at one time.
3 Confirm that the agents are running. See “Confirming that the Windows agent is
running” on page 100.
4 (Optional) Review the Windows agent installation See “What gets installed for DLP Agents
package. installed on Windows endpoints” on page 100.
Note: These steps assume that you have generated the agent installation package. See
“Generating agent installation packages” on page 86.
Table 9-6 Instructions for installing the DLP Agent for Windows manually
1 Run the DLP Agent installer You run the install_agent.bat located in the agent
batch file. installation package ZIP file.
Note: To troubleshoot the manual installation, you can remove
the /q element from the install_agent.bat file. Removing
the /q element launches the installation wizard which can
provide error information. You can also review the installation
log file (installAgent.log located at C:\) for additional
troubleshooting information.
2 Confirm that the agent is Once installed, the DLP Agent initiates a connection with the
running. Endpoint Server. Confirm that the agent is running by going to
Agent > Overview and locating the agent in the list.
Note: Do not rename the InstallAgent.bat file for any reason. If you rename this file, your
systems management software cannot recognize the file and the installation fails.
Installing Symantec DLP Agents 97
Process to install the DLP Agent on Windows
The following is an example of what the completed command might look like:
Component Description
Component Description
Symantec DLP Agent service Receives all information from the driver and relays
it to the Endpoint Server. During installation, the
DLP Agent is listed under the task manager as
edpa.exe.
1 Package the Mac agent installation files. See “Packaging Mac agent
installation files” on page 102.
You compile the Mac agent installation files into one PKG
file. You later use this file to manually install an agent, or
to insert in your SMS to install agents to many Mac
endpoints.
You can also add endpoint tools to the package and add
a custom package identifier.
3 Confirm that the Mac agent service is running. See “Confirming that the Mac
agent is running” on page 106.
4 (Optional) Review the installed Mac agent components. See “What gets installed for DLP
Agents on Mac endpoints”
These components include the drivers that prevent
on page 106.
tampering and keep the agent running.
The following steps assume that you have generated the agent installation package and
completed all prerequisites. See “About secure communications between DLP Agents and
Endpoint Servers” on page 85.
To package the Mac agent installation files:
1 Locate the AgentInstaller_Mac64.zip agent installation package. Unzip the contents
of this file to a folder on a Mac endpoint; for example use /tmp/MacInstaller.
See “Agent installation package contents” on page 90.
2 Use the Terminal.app to bundle the Mac agent installation-related file by running the
following commands:
The following is an example of what the completed command might look like:
After you execute the command, a message displays the package creation status.
A file named AgentInstall_WithCertificates.pkg is created in the location you
indicated. Based on the example above, AgentInstall_WithCertificates.pkg is created
at /tmp/MacInstaller.
3 (Optional) If you opted to register the DLP Agent with a custom package identifier, execute
the following command to verify the custom package identity:
$ pkgutil --pkg-info <com.company.xyz>
Note: The following steps assume that you have generated the agent installation package and
completed all prerequisites. See “About secure communications between DLP Agents and
Endpoint Servers” on page 85.
Installing Symantec DLP Agents 105
Process to install the DLP Agent on Mac
Table 9-10 Instructions for installing the DLP Agent on a Mac endpoint
1 Locate the agent installation For example, unzip the file to /tmp/MacInstaller.
package ZIP
(AgentInstaller_Mac64.zip),
and unzip it to the Mac endpoint.
2 Install the Mac Agent from the Run the following command on the target endpoint:
command line using the Terminal
$ sudo installer -pkg
application.
/tmp/AgentInstall/AgentInstall_15_1.pkg -target /
3 Verify the Mac agent installation. To verify the Mac agent installation, open the Activity Monitor and search
for the edpa process. It should be up and running.
The Activity Monitor displays processes being run by logged in user and
edpa runs as root. Select View All Processes to view edpa if you are
not logged in as root user.
You can also confirm that agent was installed to the default directory:
/Library/Manufacturer/Endpoint Agent.
4 (Optional) Troubleshoot the If you experience installation issues, use the Console application to
installation. check the log messages.
In addition, you can rerun the installer with -dumplog option to create
detailed installation logs. For example, use the command sudo
installer -pkg /tmp/AgentInstall/AgentInstall_15_1.pkg
-target / -dumplog.
5 (Optional) Review information See “What gets installed for DLP Agents on Mac endpoints” on page 106.
about the Mac agent installation.
These steps assume that you have generated the agent installation package and packaged
the Mac agent installation files.
See “Generating agent installation packages” on page 86.
See “Packaging Mac agent installation files” on page 102.
To perform an unattended installation
1 Enable the SMS client on the Mac endpoints.
2 Obtain root user access to the Mac endpoints.
3 Specify the AgentInstall_WithCertificates.pkg package in your systems management
software.
4 Specify a list or range of network addresses where you want to install the DLP Agent.
5 Start the silent installation process.
Note: If messages indicate that the process failed, review the install.log file that is located
in the /tmp directory on each Mac endpoint.
Component Description
Endpoint Agent daemon (EDPA) The installation process places the EDPA files here:
/Library/Manufacturer/Endpoint Agent.
The
com.symantec.manufacturer.agent.plist
file contains configuration settings for the Endpoint
Agent daemon. This file is located at
/Library/LaunchDaemons/.
Note: Before you copy Endpoint tools to the Agent Install directory on Mac endpoints, change
the permissions for each tool to be executable.
Each tool requires a password to operate. You enter the Endpoint tools password during the
agent packaging process. You can manage the Endpoint tools password using the Agent
Password Management screen.
See “Generating agent installation packages” on page 86.
See “About agent password management” on page 118.
Table 9-12 lists some of the tasks that you can complete using endpoint tools:
Installing Symantec DLP Agents 108
About Endpoint tools
Shut down the agent and the service_shutdown See “Shutting down the agent and the
watchdog services watchdog services on Windows
Available for Windows agents in the
endpoints” on page 109.
Symantec_DLP_15.1_Agent_Win-IN.zip
file. See “Shutting down the agent service
on Mac endpoints” on page 110.
Available for Mac agents in the
Symantec_DLP_15.1_Agent_Mac-IN.zip
file.
Inspect database files that are vontu_sqlite3 See “Inspecting the database files
accessed by the agent accessed by the agent” on page 110.
Available for Windows agents in the
Symantec_DLP_15.1_Agent_Win-IN.zip
file.
View extended log files logdump See “Viewing extended log files”
on page 111.
Available for Windows agents in the
.Symantec_DLP_15.1_Agent_Win-IN.zip
file.
Generate device information DeviceID.exe for Windows See “About the Device ID utilities”
removable devices. on page 113.
Start DLP Agents that are installed on start_agent See “Starting DLP Agents that run on
Mac endpoints Mac endpoints” on page 116.
Available for Mac agents on the
endpoint at
/Library/Manufacturer/Endpoint
Agent.
2 Hold the Shift key and right-click Command Prompt in the results list.
3 Select Run as Administrator.
to individually stop either the DLP Agent or watchdog service. This tool enables users with
administrator rights to stop both Symantec Data Loss Prevention services at the same time.
To run the Service_Shutdown.exe tool
◆ From the installation directory, run the following command:
service_shutdown [-p=password]
where the installation directory is the directory where you installed Symantec Data Loss
Prevention and [-p=password] is the password you previously specified. If you do not
enter a password, you are prompted to input a password. The default password is
VontuStop.
You must run the Service_Shutdown.exe tool from the same directory as the DLP Agent
keystore file.
See “About Endpoint tools” on page 119.
#sudo ./service_shutdown
-p=<tools_password>
Note: You must have administrator rights to use the tool on Windows endpoints. You must
have root or sudo access to make changes to the agent database on Mac endpoints.
where database_file is your database file and password is your specified tools password.
The Symantec Data Loss Prevention database files for Windows agents are located in
the DLP Agent installation directory and end in the *.ead extension. After you run the
command, you are prompted for your password.
2 Enter the default password VontuStop unless you have already created a unique password.
You are provided with a shell to enter SQL statements to view or update the database.
Refer to http://www.sqlite.org/sqlite.html for complete documentation about what commands
are available in this shell.
To run the vontu_sqlite3 tool on Mac endpoints
1 Set the vontu_sqlite3 tool permissions to be executable.
2 Run the following script from the Symantec Data Loss Prevention Agent installation
directory:
where database_file is your database file and password is your specified tools password.
You run this command using the Terminal application. The vontu_sqlite3 tool is located
at /Library/Manufacturer/Endpoint Agent/.
3 Enter the default password VontuStop unless you have already created a unique password.
You are provided with a shell to enter SQL statements to view or update the database.
Refer to http://www.sqlite.org/sqlite.html for complete documentation about what commands
are available in this shell.
See “About Endpoint tools” on page 119.
need to view log files with Symantec Data Loss Prevention support personnel. Without this
tool, you cannot view any DLP Agent log files.
Note: You must have administrator rights to use the tool on Windows endpoints. You must
have root or sudo access to make changes to the agent database on Mac endpoints.
where log_file is the log file you want to view and password is the specified tools password.
All Symantec Data Loss Prevention extended log files are present in the Symantec Data
Loss Prevention Agent installation directory. The files have names of the form
edpa_extfile_number.log. After you run this command, you can see the de-obfuscated
log.
Note: When using Windows PowerShell to run logdump.exe, quotes are required around
the log file. For example, run:
logdump "-log=log_file" [-p=password]
All Symantec Data Loss Prevention extended log files are present in the Symantec Data
Loss Prevention Agent installation directory. The files have names of the form
edpa_extfile_number.log. After you run this command, you can see the de-obfuscated
log.
2 (Optional) Print the contents of another log from this view.
To run the log dump tool on Mac endpoints
1 Set the logdump tool permissions to be executable.
2 Run the following scripts from the Symantec Data Loss Prevention Agent installation
directory:
where log_file is the log file you want to view and password is the specified tools password.
All Symantec Data Loss Prevention extended log files are present in the Symantec Data
Loss Prevention Agent installation directory. The files have names of the form
edpa_extfile_number.log. After you run this command, you can see the de-obfuscated
log.
3 (Optional) Print the contents of another log from this view.
Installing Symantec DLP Agents 113
About Endpoint tools
Result Description
Volume The volume or mount point that the DeviceID.exe tool found.
For example:
Volume: E:\
For example:
USBSTOR\DISK&VEN_UFD&PROD_USB_FLASH_DRIVE&REV_1100\5F73HF00Y9DBOG0DXJ
For example:
USBSTOR\\DISK&VEN_UFD&PROD_USB_FLASH_DRIVE&REV_1100\\5F73HF00Y9DBOG0DXJ
Installing Symantec DLP Agents 114
About Endpoint tools
Result Description
SanDisk&.*
For example:
SanDisk&Cruzer Blade&.*
For example:
SanDisk&Cruzer Blade&DER45TG5444
For example, plug in one or more USB devices, connect a hard drive, and so forth.
Installing Symantec DLP Agents 115
About Endpoint tools
The file appears in the C:\temp directory and contains the output from the DeviceID
process.
5 View the results of the DeviceID process.
The command prompt displays the results for each volume or mount point.
See Table 9-13 on page 113.
6 Use the DeviceID utility to evaluate the proposed regex string against a device that is
currently connected.
See Table 9-15 on page 115.
7 Use the regular expression patterns to configure endpoint devices for detection.
Command Example
parameters
The output results display information for each volume or mount point in the Terminal
application dialog.
5 Review the DeviceID process results.
6 Use the regex information to configure endpoint devices for detection.
Table 9-16
Command parameter Example
./DeviceID > deviceids.txt The tool outputs the following information to the
deviceids.txt file based on information gathered
from the attached thumb drive:
■ Volume: /Volumes/FAT_USB/
■ Type (BUS): USB
■ Device ID Regex by Vendor: JetFlash&.*
■ Device ID Regex by Model: JetFlash&Mass
Storage Device&.*
■ Device ID Regex by Serial No: JetFlash&Mass
Storage Device&79HCSMJ0RYOHT2FE
Note: You must unzip this file to a Mac endpoint. You cannot use the tool if it is unzipped to a
Windows endpoint.
sudo ./start_agent
where the installation directory is the directory where you installed Symantec Data Loss
Prevention.
3 Go to the Agent List screen and confirm that the agent is running.
See “About Endpoint tools” on page 119.
Note: By default, the limit for how many times an administrator can enter the wrong password
is 3. If the limit is exceeded, the uninstallation process quits and the process must be restarted.
You can adjust the default value using the UninstallPassword.RETRY_LIMIT advanced agent
setting.
If you want to uninstall a group of agents, specify the uninstallation password in the agent
uninstallation command line.
To enter the uninstallation password using a command line
◆ Enter the following parameter in the uninstallation command line;
UNINSTALLPASSWORD="<password>"
where <password> is the password that you specified in the password generator.
An agent command line looks like the following example:
msiexec /uninstall <product code> /q UNINSTALLPASSWORD="<password>"
Note: Only administrators with the Server Administrator role can use the Agent Password
Management screen.
When you create or change a password, the password is applied to the agents when they
connect to the Endpoint Server. Likewise, uninstall passwords or Endpoint tools passwords
Installing Symantec DLP Agents 119
About uninstallation passwords
that are created during the agent packaging process are retained until the agents connect to
the Endpoint Server.
You can disable the uninstall password for select agents on the Agent List screen.
You can use the Agent Password Management screen to complete the following agent
password-related tasks:
■ Create a new uninstall or Endpoint tools password if one was not created during the agent
packaging process.
■ Retain a password created during the agent packaging process. You can choose whether
or not to publish an uninstall password or Endpoint tools password to newly added agents
by de-selecting the checkbox for each password.
■ About locales
Caution: When you install a new version of Symantec Data Loss Prevention, any language
packs you have installed are deleted. For a new, localized version of Symantec Data Loss
Prevention, you must upgrade to a new version of the language pack.
Installing language packs 121
About locales
About locales
Locales are installed as part of a language pack.
A locale provides the following:
■ Displays dates and numbers in formats appropriate for that locale.
■ Sorts lists and reports based on text columns, such as "policy name" or "file owner,"
alphabetically according to the rules of the locale.
An administrator can also configure an additional locale for use by individual users. This
additional locale need only be supported by the required version of Java.
For a list of these locales, see
http://www.oracle.com/technetwork/java/javase/javase7locales-334809.html.
The locale can be specified at product installation time, as described in the Symantec Data
Loss Prevention Installation Guide. It can also be configured at a later time using the Language
Pack Utility.
You use the Language Pack Utility to specify a locale if one is not specified at product installation
time.
See “Using a non-English language on the Enforce Server administration console” on page 121.
Note: The addition of multiple language packs could slightly affect Enforce Server performance,
depending on the number of languages and customizations present. This occurs because an
additional set of indexes has to be built and maintained for each language.
Warning: Do not modify the Oracle database NLS_LANGUAGE and NLS_TERRITORY settings.
Installing language packs 122
Using the Language Pack Utility
See “About Symantec Data Loss Prevention language packs” on page 120.
See “About locales” on page 121.
A Symantec Data Loss Prevention administrator specifies which of the available languages
is the default system-wide language.
To choose the default language for all users
1 On the Enforce Server, go to System > Settings > General and click Configure.
The Edit General Settings screen is displayed.
2 Scroll to the Language section of the Edit General Settings screen, and click the button
next to the language you want to use as the system-wide default.
3 Click Save.
Individual Symantec Data Loss Prevention users can choose which of the available languages
and locales they want to use by updating their profiles.
Administrators can use the Language Pack Utility to update the available languages.
See “Using the Language Pack Utility” on page 122.
Note: If the Enforce Server runs on a Linux host, you must install language fonts on the host
machine using the Linux Package Manager application. Language font packages begin with
fonts-<language_name>. For example, fonts-japanese-0.20061016-4.el5.noarch
To use the Language Pack Utility, you must have Read, Write, and Execute permissions on
all of the \Program Files\Symantec\Data Loss Prevention\Enforce Server\15.1 folders
and subfolders. If you are running the utility on Linux, you must be a root user.
To display help for the utility, such as the list of valid options and their flags, enter
LanguagePackUtility without any flags.
Installing language packs 123
Using the Language Pack Utility
Note: Running the Language Pack Utility causes the SymantecDLPManager and
SymantecDLPIncidentPersister services to stop for as long as 20 seconds. Any users who
are logged on to the Enforce Server administration console will be logged out automatically.
When finished making its updates, the utility restarts the services automatically, and users can
log back on to the administration console.
Language packs for Symantec Data Loss Prevention can be obtained from Symantec File
Connect.
To add a language pack (Windows)
1 Advise other users that anyone currently using the Enforce Server administration console
must save their work and log off.
2 Run the Language Pack Utility with the -a flag followed by the name of the ZIP file for
that language pack. Enter:
LanguagePackUtility -a filename
where filename is the fully qualified path and name of the language pack ZIP file.
For example, if the Japanese language pack ZIP file is stored in c:\temp, add it by entering:
LanguagePackUtility -a c:\temp\Symantec_DLP_15.1_Japanese.zip
To add multiple language packs during the same session, specify multiple file names,
separated by spaces, for example:
LanguagePackUtility -a
c:\temp\Symantec_DLP_15.1_Japanese.zip
Symantec_DLP_15.1_Chinese.zip
3 Log on to the Enforce Server administration console and confirm that the new language
option is available on the Edit General Settings screen. To do this, go to System >
Settings > General > Configure > Edit General Settings.
To add a language pack (Linux)
1 Advise other users that anyone currently using the Enforce Server administration console
must save their work and log off.
2 Open a terminal session to the Enforce Server host and switch to the DLP_system_account
by running the following command:
su - DLP_system_account
Installing language packs 124
Using the Language Pack Utility
4 Log on to the Enforce Server administration console and confirm that the new language
option is available on the Edit General Settings screen. To do this, go to System >
Settings > General > Configure > Edit General Settings.
To remove a language pack
1 Advise users that anyone currently using the Enforce Server administration console must
save their work and log off.
2 Run the Language Pack Utility with the -r flag followed by the Java locale code of the
language pack you want to remove. Enter:
LanguagePackUtility -r locale
where locale is a valid Java locale code corresponding to a Symantec Data Loss Prevention
language pack.
For example, to remove the French language pack enter:
LanguagePackUtility -r fr_FR
To remove multiple language packs during the same session, specify multiple file names,
separated by spaces.
3 Log on to the Enforce Server administration console and confirm that the language pack
is no longer available on the Edit General Settings screen. To do this, go to System >
Settings > General > Configure > Edit General Settings.
Removing a language pack has the following effects:
■ Users can no longer select the locale of the removed language pack for individual use.
Note: If the locale of the language pack is supported by the version of Java required for
running Symantec Data Loss Prevention, the administrator can later specify it as an alternate
locale for any users who need it.
LanguagePackUtility -c locale
where locale is a valid locale code recognized by Java, such as pt_PT for Portuguese.
For example, to change the locale to Brazilian Portuguese enter:
LanguagePackUtility -c pt_BR
3 Log on to the Enforce Server administration console and confirm that the new alternate
locale is now available on the Edit General Settings screen. To do this, go to System >
Settings > General > Configure > Edit General Settings.
If you specify a locale for which there is no language pack, "Translations not available"
appears next to the locale name. This means that formatting and sort order are appropriate
for the locale, but the Enforce Server administration console screens and online Help are
not translated.
Note: Administrators can only make one additional locale available for users that is not based
on a previously installed Symantec Data Loss Prevention language pack.
Chapter 11
Post-installation tasks
This chapter includes the following topics:
Note: The Enforce Server administration console requires the use of cookies. Ensure that you
have enabled cookies in the web browser you use to access the Enforce Server administration
console.
Post-installation tasks 127
About post-installation security configuration
■ The sslkeytool utility generates new SSL server certificates to secure communications
between your Enforce Server and your detection servers. These certificates are unique to
your installation. The new certificates replace the single default certificate that comes with
all Symantec Data Loss Prevention installations. You store one certificate on the Enforce
Server, and one certificate on each detection server in your installation.
Note: Symantec recommends that you create dedicated certificates for communication with
your Symantec Data Loss Prevention servers. When you configure the Enforce Server to
use a generated certificate, all detection servers in your installation must also use generated
certificates. You cannot use the built-in certificate with some detection servers and the
built-in certificate with other servers.
Note: If you install a Network Prevent detection server in a hosted environment, you must
generate unique certificates for your Symantec Data Loss Prevention servers. You cannot
use the built-in certificate to communicate with a hosted Network Prevent server.
See “About the sslkeytool utility and server certificates” on page 55.
See “Using sslkeytool to generate new Enforce and detection server certificates” on page 58.
See “About post-installation tasks” on page 126.
You may also need to secure communications between Symantec Data Loss Prevention
servers and other servers such as those used by Active Directory or a Mail Transfer Agent
(MTA). See the Symantec Data Loss Prevention Administration Guide for details.
Where:
■ The -alias parameter specifies the name of this certificate key. This name is used
to identify this certificate when you run other keytool commands. The value for the
-alias parameter must be tomcat.
■ The -keystore parameter specifies the name and location of the keystore file which
must be .keystore located in this directory. This is specified by using -keystore
.keystore
■ The -keyalg parameter specifies the algorithm to be used to generate the key pair.
In this case, the algorithm to specify is RSA.
■ The -keysize parameter specifies the size of each key to be generated. For example,
1024.
■ The -validity parameter specifies the number of days the certificate is good for. For
example, -validity 365 specifies that the certificate is good for 365 days (or one
year). The number of days you choose to specify for the -validity parameter is up
to you. If a certificate is used for longer than the number of days specified by -validity,
an "Expired" message appears by the browser when it accesses the Enforce Server
administration console. The best practice is to replace an expired certificate with a
new one.
■ The -storepass parameter specifies the password used to protect the integrity of the
keystore. The value for the -storepass parameter must be protect.
■ The dname parameter specifies the X.500 Distinguished Name to be associated with
this alias. It is used as the issuer and subject fields in a self-signed certificate. The
parameters that follow are the value of the dname parameter.
■ The -CN parameter specifies your name. For example, CN=linda wu
■ The O parameter specifies your organization's name. For example, O=Acme Inc.
■ The Ou parameter specifies your organization's unit or division name. For example,
Ou=Engineering Department
■ If you are asked for a keypass password, hit Return to make the keypass password
the same as the storepass password.
An updated .keystore file is generated.
5 (Optional) Rename or move the existing .keystore file from the \Protect\tomcat\conf
directory.
6 Copy the updated .keystore file into the c:\Program Files\Symantec\Data Loss
Prevention\Enforce Server\15.1\protect\tomcat\conf directory.
Using your antivirus software, remove the following Enforce Server directories from antivirus
scanning:
■ \Program Files\Symantec\Data Loss Prevention\Enforce
Server\15.1\protect\incidents
Using your antivirus software, remove the following detection server directories from antivirus
scanning:
■ \drop
■ \drop_pcap
■ \icap_spool
■ \packet_spool
■ C:\app\Administrator\product\11.2.0.4\dbhome_1
Most of the Oracle files to be excluded are located in these directories, but additional files are
located in other directories. Use the Oracle Enterprise Manager (OEM) to check for additional
files and exclude their directories from antivirus scanning. Use OEM to view the location of
the following database files:
■ Data files, which have the file extension *.DBF
■ Control files, which have the file extension *.CTL
■ The REDO.LOG file
Exclude all the directories with these files from antivirus scanning.
See “About Symantec Data Loss Prevention and antivirus software” on page 131.
See “Symantec Data Loss Prevention directory and file exclusion from antivirus scans”
on page 131.
See “About post-installation tasks” on page 126.
Table 11-1 Security settings > Account Policies > Account Lockout Policy
Table 11-2 Security settings > Account Policies > Password Policy
Table 11-3 Security settings > Local Policies > Audit Policy
Table 11-4 Security settings > Local Policies > User rights assignment
Access this computer from the network Everyone, Administrators, Users, Power Users,
Backup Operators
Table 11-4 Security settings > Local Policies > User rights assignment (continued)
Table 11-5 Security settings > Local Policies > Security options
Table 11-5 Security settings > Local Policies > Security options (continued)
Table 11-5 Security settings > Local Policies > Security options (continued)
Table 11-5 Security settings > Local Policies > Security options (continued)
Network access: Named Pipes that can be COMNAP, COMNODE, SQL\QUERY, SPOOLSS,
accessed anonymously EPMAPPER, LOCATOR, TrkWks, TrkSvr
See the Symantec Data Loss Prevention System Maintenance Guide for more information
about using a syslog server.
Post-installation tasks 142
Enforce Servers and unused NICs
Note: As an alternative to syslog logging, you can configure Symantec Data Loss Prevention
to send email notifications of severe system events. See the online Help for details.
model.notification.host=IP
model.notification.serverobject.host=IP
model.notification.host=IP
\Program Files\Symantec\Data Loss Prevention\Enforce Server\15.1\protect\bin\Notificat
lax.command.line.args=IP:37328
Symantec DLP Manager Provides the centralized reporting and management services for Symantec
Data Loss Prevention.
See “To increase memory for the Symantec DLP Manager service”
on page 145.
Starting and stopping Symantec Data Loss Prevention services 145
About Symantec Data Loss Prevention services
See “To increase memory for the Symantec DLP Detection Server Controller
service” on page 145.
■ Linux: /opt/Symantec/DataLossPrevention/Enforce
Server/15.1/Protect/services
wrapper.java.maxmemory = 4096
■ Linux: /opt/Symantec/DataLossPrevention/Enforce
Server/15.1/Protect/services
wrapper.java.maxmemory = 2048
■ SymantecDLPManager
■ SymantecDLPIncidentPersister
Note: Start the SymantecDLPNotifier service first before starting other services.
Starting and stopping Symantec Data Loss Prevention services 147
About starting and stopping services on Windows
■ SymantecDLPIncidentPersister
■ SymantecDLPManager
■ SymantecDLPNotifier
■ SymantecDLPManager
■ SymantecDLPIncidentPersister
■ SymantecDLPDetectionServer
■ SymantecDLPIncidentPersister
■ SymantecDLPManager
■ SymantecDLPNotifier
3 Open the Add or Remove Programs control from the Windows Control Panel, select the
Symantec Data Loss Prevention entry, and then click Change/Remove.
The Symantec Data Loss Prevention Uninstall panel appears.
4 Click Next to uninstall Symantec Data Loss Prevention.
5 Click Finish to complete the uninstall process.
You can also use the following commands to uninstall Symantec Data Loss Prevention in
Silent Mode:
■ Run the following command to uninstall the Enforce Server:
C:\msiexec /x EnforceServer.msi /qn /Lv c:\uninstall.log
Run the following command to uninstall the detection server:
C:\msiexec /x DetectionServer.msi /qn /Lv c:\uninstall.log
Removing DLP Agents from Windows endpoints using system management software
Removing DLP Agents from Mac endpoints using system management software
msiexec /x AgentInstall_15_1.msi
msiexec /x {guid}
msiexec /x AgentInstall_15_1.msi
4 Click OK.
You can add options to the uninstall command such as SilentMode or Logname.
SilentMode allows the Symantec DLP Agent to uninstall without displaying a user interface
on the desktop. The installation takes place in the background of the workstation and is
not visible to the user. Logname Lets you set any log file you want. However, this option
is only available if you have the original installer present. If you do not have the original
installer, you must use the product code.
The code for a silent install is:
/QN:silentmode
/Lv _logname
msi.exe has several other options. For further options, see your MSI guide.
Note: You uninstall Windows 7/8.1 agents in Elevated Command Prompt mode. See “Using
the Elevated Command Prompt with Windows” on page 93.
/rm -f /tmp/uninstall_agent
Replace /tmp with the location where the uninstall_agent command is located.
3 Identify agents to be uninstalled and run the uninstallation.
Note: You can review uninstall logs on the Terminal application by running this command:
sudo ./uninstall_agent -prompt=no -log=console. By default, logs are saved to the
uninstall_agent.log file.
Appendix A
Installing Symantec Data
Loss Prevention with the
FIPS encryption option
This appendix includes the following topics:
Note: You must install all Symantec Data Loss Prevention servers with the same encryption
option; you cannot mix encryption options. If the Endpoint Prevent Server is installed with FIPS
enabled, no additional configuration is required to enable FIPS encrypted communication with
your DLP Agents.
If your organization uses Internet Explorer to access the Enforce Server, then you must ensure
that Internet Explorer is configured to use FIPS.
See “Configuring Internet Explorer when using FIPS” on page 156.
EnforceServer.msi FIPS_OPTION=Enabled
DetectionServer.msi FIPS_OPTION=Enabled
SingleTierServer.msi FIPS_OPTION=Enabled
When this command is entered correctly, the first panel of the Installation Wizard notifies
you that the system is being installed with FIPS encryption enabled.
See “Installing an Enforce Server” on page 28.
See “Installing a single-tier server” on page 79.
If your organization uses Internet Explorer to access the Enforce Server administration console,
you must ensure that Internet Explorer is configured to use FIPS.
See “Configuring Internet Explorer when using FIPS” on page 156.
Note: Firefox is already FIPS compatible. You do not need to perform the steps in this section
to access Symantec Data Loss Prevention with Firefox.
You must first enable TLS 1.0 protocol support in Internet Explorer, and then enable FIPS
compliance in Windows. This procedure must be done on all Windows computers in your
organization that access the Symantec Data Loss Prevention Enforce Server administration
console.
To enable TLS 1.0 protocol support in Internet Explorer
1 Go to Tools > Internet Options.
2 Go to the Advanced tab.
3 Scroll down to the Security settings.
4 Make sure that the following check boxes are selected: Use SSL 2.0, Use SSL 3.0, and
Use TLS 1.0.
5 Click Apply.
6 Click OK.
Internet Explorer on all computers that access the Enforce Server must be configured to
use the TLS 1.0 protocol.
All Windows computers that access the Enforce Server administration console with an Internet
Explorer browser must be configured for FIPS compliance.
To enable FIPS compliance in Windows
1 Open the Windows Control Panel.
2 Double-click Administrative Tools.
3 Double-click Local Security Policy.
4 In the Local Security Settings, double-click Local Policies.
5 Double-click Security Options.
6 In the Policy pane on the right, double-click System cryptography: Use FIPS compliant
algorithms for encryption, hashing, and signing.
7 Choose the Enabled radio button and then click Apply.
Index
A Endpoint Server
Additional Locale panel 32 redundancy 93
AL32UTF8 character set 31 endpoint tools 107
antivirus software logdump.exe tool 111
scan exclusions, DLP 131 Service_Shutdown.exe tool 109
scan exclusions, Oracle 133 using on Windows Vista 109
vontu_sqlite3.exe tool 110
Enforce Server
B choosing a non-English language for 121
browser certificates 128 Enforce Server installation
creating 129 System Account panel 33
Enforce server installation 28
C Additional Locale panel 32
certificates initial setup tasks 142
browser 128 installation steps 29
browser, creating 129 Oracle Database panel 31
self-signed, creating 129 Oracle Listener Port 31
server, generating 58 System Account panel 30, 47
SSL/TLS 127 verifying 33
sslkeytool 55, 58 EnforceServer.msi 22, 30
D F
database. See Oracle database FIPS encryption 27, 155–156
detection server installation 44 Internet Explorer, configuration 156
permissions 42 VJCEProviderType=FIPS parameter 156
preparations 42 firewall configuration 133
registering 51
remote indexers 42 H
types of 40 hosts file 24
verifying 50
DLPDownloadHome directory 14
domain controller agent I
74 initial setup tasks 142
excluding IP addresses from event collection 73 installation 11
installing 70 See also detection server installation
post-installation tasks 73 See also Enforce server installation
See also single-tier installation
See also three-tier installation
E See also two-tier installation
Endace cards FIPS encryption 155–156
dagsnap command 25 logs 34, 82
SPAN tap 24
Index 159
installation (continued) P
materials, required 14 ports
presintallation steps 21 10026 (telnet) 25
servers, verifying before installation 23 25 (SMTP) 25
system requirements 13 8100 (Enforce - detection) 52
uninstalling 149 Enforce - detection connection range 52
VJCEProviderType=FIPS parameter 156 Oracle Listener 31
post-installation tasks 126
K initial system setup 142
keystore 131 security configuration 127
keytool command 129 syslog servers 141
options 130 unused NIC cards 142
preinstallation steps 21
L
Language Pack Utility 122 R
language packs registering a detection server 51
about 120 remote desktop connections 25
Language Pack Utility 122 requirements 13
languages and character sets materials 14
choosing a non-English language 121
language packs, about 120 S
language packs, working with 122 security configuration 127
license files 14 antivirus software 131
licenses 34 auditing 136
logdump.exe tool 111 browser certificates 128
logs 34, 82 browser certificates, creating 129
certificate, self-signed 129
N firewall configuration 133
Napatech cards self-signed certificate 129
SPAN tap 24 SSL/TLS certificates 127
NFS Client for Windows 15 virus scan exclusions 131
NIC cards 24 virus scan exclusions, Oracle 133
unused 142 Windows hardening 134
Windows password policies 136
Windows policies 136
O Windows security options 141
Oracle database Windows settings 135
AL32UTF8 character set 31 Windows users 138
NLS_LANGUAGE setting 121 Service_Shutdown.exe tool 109
NLS_TERRITORY setting 121 single-tier installation 11, 79
OracleOraDb11g_home1TNSListener service 33 high-level steps 20
OracleServicePROTECT service 33 verifying 81
required character set 31 64-bit installer 22
software 14 solution packs 36
Oracle Database panel 31 importing 37
Oracle Listener Port 31 list of 37
OracleOraDb11g_home1TNSListener service 33 SolutionPackInstaller.exe 38
OracleServicePROTECT service 33 SolutionPackInstaller.exe 38
Index 160
T
three-tier installation 11
high-level steps 15
tiers, installation 11
two-tier installation 11
high-level steps 18
U
uninstallation passwords
using 117
uninstalling 149
upgrading agents
uninstallation passwords 118
V
verification
detection server installation 50