Read SymantecTM Endpoint Protection Virtual Image Exception User Guide text version

SymantecTM Endpoint Protection Virtual Image Exception User Guide

Symantec Endpoint Protection Virtual Image Exception User Guide

The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 12.01.00.00

Legal Notice

Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System, LiveUpdate, Norton, Sygate, and TruScan are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ("Third Party Programs"). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com

Technical Support

Symantec Technical Support maintains support centers globally. Technical Support's primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec's support offerings include the following:

A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services

For information about Symantec's support offerings, you can visit our Web site at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy.

Contacting Technical Support

Customers with a current support agreement may access Technical Support information at the following URL: www.symantec.com/business/support/ Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available:

Product release level

Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description:

Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes

Licensing and registration

If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/business/support/

Customer service

Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues:

Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs, DVDs, or manuals

Support agreement resources

If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows:

Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America [email protected] [email protected] [email protected]

Contents

Technical Support ............................................................................................... 4 Chapter 1 Implementing SymantecTM Endpoint Protection Virtual Image Exception ................................................ 9

Using the Virtual Image Exception tool on a base image ........................ 9 System requirements for the Virtual Image Exception tool .................. 10 Running the Virtual Image Exception tool ........................................ 11

Appendix A

Command line ...................................................................... 13

vietool ....................................................................................... 14

8

Contents

Chapter

1

Implementing SymantecTM Endpoint Protection Virtual Image Exception

This chapter includes the following topics:

Using the Virtual Image Exception tool on a base image System requirements for the Virtual Image Exception tool Running the Virtual Image Exception tool

Using the Virtual Image Exception tool on a base image

To increase performance and security in your virtual desktop infrastructure (VDI) environment, you can leverage base images to build virtual machines. The Symantec Virtual Image Exception tool lets your clients bypass scanning base image files for threats, which reduces the resource load on disk I/O. It also improves CPU scanning process performance in your VDI environment. Note: Symantec Endpoint Protection supports the Virtual Image Exception tool for managed clients and unmanaged clients. Table 1-1 describes the process for using the Virtual Image Exception tool on a base image.

10

Implementing SymantecTM Endpoint Protection Virtual Image Exception System requirements for the Virtual Image Exception tool

Table 1-1 Step

Step 1

Process to use the Virtual Image Exception tool Action

On the base image, perform a full scan all of the files to ensure that the files are clean. If the Symantec Endpoint Protection client quarantines infected files, you must repair or delete the quarantined files to remove them from quarantine.

Step 2 Step 3

Ensure that the client's quarantine is empty. Run the Virtual Image Exception tool from the command line to mark the base image files. See "Running the Virtual Image Exception tool" on page 11. See vietool on page 14.

Step 4

Enable the feature in Symantec Endpoint Protection Manager so that your clients know to look for and bypass the marked files when a scan runs. Remove the Virtual Image Exception tool from the base image.

Step 5

The Virtual Image Exception tool supports fixed, local drives. It works with the files that conform to the New Technology File System (NTFS) standard. See "System requirements for the Virtual Image Exception tool" on page 10.

System requirements for the Virtual Image Exception tool

Table 1-2 describes the system requirements for the Virtual Image Exception tool. Table 1-2 Requirement

Virtual environment

System requirements Description

The Virtual Image Exception tool must run on one of the following supported virtual environments:

VMware ESX 4.0 Update 1 or later Microsoft Hyper-V 2008 Citrix XenServer 5.6

Implementing SymantecTM Endpoint Protection Virtual Image Exception Running the Virtual Image Exception tool

11

Table 1-2 Requirement

System requirements (continued) Description

Symantec The client must meet all of the following requirements: Endpoint Installed on one of the supported virtual environments Protection client The Symantec Endpoint Protection client software must be version 12.1

See "Using the Virtual Image Exception tool on a base image" on page 9.

Running the Virtual Image Exception tool

Before you run the Virtual Image Exception tool, ensure that you have met all of the system requirements. See "System requirements for the Virtual Image Exception tool" on page 10. To run the Virtual Image Exception tool

1

From the Symantec Endpoint Protection product disc, download the following file to the base image: /Tools/VirtualImageException/vietool.exe

2 3

Open a command prompt with administrative privileges. Run the Virtual Image Exception tool with the proper arguments. For example, type: vietool c: --generate

See vietool on page 14.

12

Implementing SymantecTM Endpoint Protection Virtual Image Exception Running the Virtual Image Exception tool

Appendix

A

Command line

This appendix includes the following topics:

vietool

14

Command line vietool

vietool

vietool ­ Runs the Virtual Image Exception tool

SYNOPSIS

vietool.exe volume: --generate|clear|verify|hash [options ...]

DESCRIPTION

The vietool command marks the base image files on the volume that you specify by adding an attribute.

OPTIONS

--generate

Runs the Virtual Image Exception tool on all files on the volume specified. You cannot use this option with --clear. For example: vietool c: --generate

--verify

Verifies that the Virtual Image Exception is set on all files on the specified volume. You cannot use this option with --clear. For example: vietool c: --verify

--clear

Removes the Virtual Image Exception on all files on the volume specified. For example: vietool.exe c: --clear To delete a specific file: vietool.exe c:\Users\Administrator\target.file

--clear

You can use a fully qualified path in place of the volume identifier to clear the Virtual Image Exception on a single file or the contents of a folder. Only one file name, folder name, or volume identifier per command line is allowed. You cannot use this command with --generate, --verify, or --hash. You must restart the client after you run the --clear command.

--hash

Generates the hash value on all files on the volume specified.

Command line vietool

15

The client shares the hash value with the Shared Insight Cache. The Virtual Image Exception tool does not generate the hash value unless it needs it. You cannot use this option with --clear. For example: vietool.exe c: --generate --hash

--volume arg

Specifies the volume the tool scans. This option can be a file when you use the --clear option. You must specify the volume, and it can be specified either with the volume flag or alone. For example, with the flag vietool.exe --volume c: --generate, or alone vietool.exe c: --generate.

--verbose

Outputs to the console the maximum amount of program execution information.

--stop

Stops on the first error that the tool encounters. Otherwise the tool writes error information to the console and continues.

--help

Displays this help message.

16

Command line vietool

Information

SymantecTM Endpoint Protection Virtual Image Exception User Guide

16 pages

Report File (DMCA)

Our content is added by our users. We aim to remove reported files within 1 working day. Please use this link to notify us:

Report this file as copyright or inappropriate

1003590


You might also be interested in

BETA
BESR Error Codes Reference Guide
Release Notes for SymantecTM Endpoint Protection v12.1, Symantec Endpoint Protection Small Business Edition v12.1, Symantec Network Access Control v12.1: Updated: Friday, June 24, 2011