16

Planning the installation

System requirements

along with a few agents, and become familiar with Symantec Critical System Protection operations. When you are ready to roll out policies to your production environment, you can roll out different policies that are based on computing needs, and prevention and detection levels.

Areas where computing needs and prevention and detection levels might differ include the following:

Local workstations

Remote annex workstations

Computers that run production databases

Computers that are located in demilitarized zones (DMZ) such as Web servers, mail proxy servers, public DNS servers

Prevention policies pushed to local and remote workstations would most likely be less restrictive than prevention policies pushed to production databases and DMZ servers.

Detection policies pushed to local workstations, production databases, and DMZ servers would also differ. Detection policies pushed to production databases and DMZ servers are more likely to offer more signatures than policies pushed to workstations.

You can distribute different policies to different computers by creating agent groups with the management console and then associating the agents with one or more groups during agent installation. You first create the groups using the management console, set the different policies for the groups, and then associate the agents with the groups during installation. It is not necessary, however, to associate an agent with a group during installation. You can perform this operation after installation.

See the Symantec Critical System Protection Administration Guide for details on how to create agent groups.

System requirements

System requirements fall into the following categories:

Operating system requirements

Hardware requirements

Page 16
Image 16
Symantec Critical System manual System requirements