Dell PowerStore 5200T Using the Common Event Enabler 8.x on Windows Platforms - Page 3

Contents, Configuring the Domain User Account

Page 3 highlights

Contents Preface...7 Chapter 1: Introduction...8 About CEE...8 System requirements...9 AntiVirus partners...9 Support for third-party applications ...10 Restrictions...10 Related information...11 Chapter 2: Installing Third-Party Application Antivirus Engines 12 Installation overview...12 Computer Associates eTrust...13 F-Secure AntiVirus...14 Kaspersky Anti-Virus...15 McAfee VirusScan...18 McAfee Endpoint Security Threat Prevention...19 Microsoft Forefront Endpoint Protection 2010...19 Microsoft System Center 2012 Endpoint Protection 20 Sophos Anti-Virus...20 Symantec Endpoint Protection ...22 Set Symantec Endpoint Protection options...22 Set Windows Service Control Manager options 23 Symantec Protection Engine...23 Setting exclusions...23 Setting container handling policies...24 Modifying LimitChoiceStop settings...24 Trend Micro ServerProtect...24 Install Trend Micro ServerProtect...25 Chapter 3: Installing the Common Event Enabler Framework 27 Install CEE...27 Verifying the CEE installation package...28 Complete the CEE installation for Windows Server 28 Uninstall CEE...29 Chapter 4: Configuring the Domain User Account 30 Domain user account overview...30 Determine the interface name on the Data Mover...31 Create a domain user account...32 Create with Active Directory on a Windows Server 32 Create from User Manager for Domains...32 Create a local group on each Data Mover or NAS server 33 Assign the EMC virus-checking right to the group 33 Contents 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84

Preface
.........................................................................................................................................
7
Chapter 1: Introduction
.................................................................................................................
8
About CEE
.............................................................................................................................................................................
8
System requirements
..........................................................................................................................................................
9
AntiVirus partners
................................................................................................................................................................
9
Support for third-party applications
............................................................................................................................
10
Restrictions
.........................................................................................................................................................................
10
Related information
............................................................................................................................................................
11
Chapter 2: Installing Third-Party Application Antivirus Engines
...................................................
12
Installation overview
..........................................................................................................................................................
12
Computer Associates
e
Trust
...........................................................................................................................................
13
F-Secure AntiVirus
.............................................................................................................................................................
14
Kaspersky Anti-Virus
.........................................................................................................................................................
15
McAfee VirusScan
.............................................................................................................................................................
18
McAfee Endpoint Security Threat Prevention
............................................................................................................
19
Microsoft Forefront Endpoint Protection 2010
..........................................................................................................
19
Microsoft System Center 2012 Endpoint Protection
...............................................................................................
20
Sophos Anti-Virus
.............................................................................................................................................................
20
Symantec Endpoint Protection
.....................................................................................................................................
22
Set Symantec Endpoint Protection options
..........................................................................................................
22
Set Windows Service Control Manager options
..................................................................................................
23
Symantec Protection Engine
..........................................................................................................................................
23
Setting exclusions
........................................................................................................................................................
23
Setting container handling policies
..........................................................................................................................
24
Modifying LimitChoiceStop settings
.......................................................................................................................
24
Trend Micro ServerProtect
.............................................................................................................................................
24
Install Trend Micro ServerProtect
...........................................................................................................................
25
Chapter 3: Installing the Common Event Enabler Framework
.......................................................
27
Install CEE
...........................................................................................................................................................................
27
Verifying the CEE installation package
........................................................................................................................
28
Complete the CEE installation for Windows Server
.................................................................................................
28
Uninstall CEE
......................................................................................................................................................................
29
Chapter 4: Configuring the Domain User Account
........................................................................
30
Domain user account overview
......................................................................................................................................
30
Determine the interface name on the Data Mover
....................................................................................................
31
Create a domain user account
.......................................................................................................................................
32
Create with Active Directory on a Windows Server
...........................................................................................
32
Create from User Manager for Domains
................................................................................................................
32
Create a local group on each Data Mover or NAS server
.......................................................................................
33
Assign the EMC virus-checking right to the group
..................................................................................................
33
Contents
Contents
3