VSE 880 Installation Guide en-us

  • View
    376

  • Download
    0

Embed Size (px)

DESCRIPTION

Virus Scan Enterprise 8.8 Installation Guide

Text of VSE 880 Installation Guide en-us

  • McAfee VirusScan Enterprise 8.8 softwareInstallation Guide

  • COPYRIGHT

    Copyright 2010 McAfee, Inc. All Rights Reserved.

    No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any formor by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.

    TRADEMARK ATTRIBUTIONS

    AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCEEXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN,WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red inconnection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole propertyof their respective owners.

    LICENSE INFORMATION

    License Agreement

    NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED,WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICHTYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTSTHAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOUDO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURNTHE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.

    McAfee VirusScan Enterprise 8.8 software Installation Guide2

  • ContentsIntroducing VirusScan Enterprise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

    Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

    Finding product documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    Pre-Installation Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

    Preparation for installing the software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    Product upgrade and preserving settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    Options for preconfiguring, deploying, updating, and managing VirusScan Enterprise. . . . . . . . . . . . . . . . . . 11

    Product license and performing an upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

    Installing VirusScan Enterprise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

    Using the Setup utility to install the software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Using the command line to install the software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    Installation scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

    Installation options and properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    Installing using an Administrative Installation Point. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

    Placing the product under ePolicy Orchestrator management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

    Migrating the ePolicy Orchestrator policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    Post-Installation Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

    Testing your installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Testing for malware detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Testing for potentially unwanted programs detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    Location of installed files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    Location of 32-bit operating system installed files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    Location of 64-bit operating system installed files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    Maintenance Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

    Modifying installed features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    Using the Setup utility to modify installed features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    Using the command line to modify installed features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    Reinstalling or repairing program files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    Using the Setup utility to reinstall or repair program files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    3McAfee VirusScan Enterprise 8.8 software Installation Guide

  • Using the console to reinstall or repair program files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    Using the command line to reinstall or repair program files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    Removing program files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    Using the Setup utility to remove program files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    Using the command line to remove program files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    Using the Add/Remove Programs utility to remove program files. . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    McAfee VirusScan Enterprise 8.8 software Installation Guide4

    Contents

  • Introducing VirusScan EnterpriseMcAfee VirusScan Enterprise software protects your system from viruses, worms, Trojanhorses, and potentially unwanted code and programs.

    This guide provides system requirements for VirusScan Enterprise software, and informationabout installing it as a standalone and as a managed product, as well as modifying, repairing,removing, and reinstalling the software.

    Contents

    Audience

    Conventions

    Finding product documentation

    AudienceMcAfee documentation is carefully researched and written for the target audience.

    The information in this guide is intended primarily for:

    Administrators People who implement and enforce the company's security program.

    Users People who are responsible for configuring the product options on their system,or for updating the product on their systems.

    ConventionsThis guide uses the following typographical conventions.

    Title of a book, chapter, or topic; introduction of a new term; emphasis.Book title or Emphasis

    Text that is strongly emphasized.Bold

    Commands and other text that the user types; the path of a folder orprogram.

    User input or Path

    A code sample.Code

    Words in the user interface including options, menus, buttons, and dialogboxes.

    User interface

    A live link to a topic or to a website.Hypertext blue

    Additional information, like an alternate method of accessing an option.Note

    Suggestions and recommendations.Tip

    Valuable advice to protect your computer system, software installation,network, business, or data.

    Important/Caution

    Critical advice to prevent bodily harm when using a hardware product.Warning

    5McAfee VirusScan Enterprise 8.8 software Installation Guide

  • Finding product documentationMcAfee provides the information you need during each phase of product implementation, frominstalling to using and troubleshooting. After a product is released, information about the productis entered into the McAfee online KnowledgeBase.

    1 Go to the McAfee Technical Support ServicePortal at http://mysupport.mcafee.com.

    2 Under Self Service, access the type of information you need:

    Do this...To access...

    User Documentation 1 Click Product Documentation.