Release Notes for Symantec™ Endpoint Protection and Symantec

Release Notes for Symantec™
Endpoint Protection and
Symantec Network Access
Control, version 11, Release
Update 7 MP1
Revision Date: Monday, September 19,
2011
Release Notes for Symantec
Endpoint Protection and
Symantec Network Access
Control, version 11, Release
Update 7 MP1
This document includes the following topics:
■
About this document
■
What's new in Symantec Endpoint Protection and Symantec Network Access
Control 11 Release Update 7, MP1
■
What's new in Symantec Endpoint Protection and Symantec Network Access
Control 11
■
Where to get more information
■
What you need to know before you install or update your software
■
User documentation changes summary
■
Known issues and additional information
■
Resolved issues in this release
■
Components in this release
■
Legal Notice
4
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
About this document
About this document
Please review this document in its entirety before you install or roll out Symantec
Endpoint Protection, Symantec Network Access Control, or call for technical
support. It describes known issues and provides additional information that is
not included in the standard documentation or the context-sensitive help.
You can find the latest version of this information by using the following link to
the PDF file of the Release Notes:
release_notes_sep_11.0_ru7_mp1
Localized versions of the release notes file
The release notes have been translated into other languages. Your browser may
automatically have switched to your chosen language. If it has not switched, click
one of the links below.
■
German
■
Italian
■
French
■
Brazilian Portuguese
■
Spanish
■
Japanese
■
Korean
■
Simplified Chinese
■
Traditional Chinese
■
Russian
■
Polish
■
Czech
What's new in Symantec Endpoint Protection and
Symantec Network Access Control 11 Release Update
7, MP1
This release contains all of the features that were delivered in version 11.0.7, plus
the following new features.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
What's new in Symantec Endpoint Protection and Symantec Network Access Control 11
Table 1-1
New features in this release
Feature
Benefit
FIPS 140-2 level 1 compliance
You can deploy Symantec Endpoint Protection with
a FIPS-compliant configuration to protect its
server-to-server communication and
console-to-server communication.
Group Update Provider support for
the HTTPS protocol
You can now configure the Group Update Provider
to use the HTTPS protocol as well as the HTTP
protocol to deliver content.
VeriSign support in Symantec
Protection Center
Symantec Protection Center is now configured to
manage three VeriSign hosted services: Managed
PKI, Managed PKI for SSL, and VeriSign Identity
Protection.
Updated tools on the product disc
Symantec Endpoint Protection includes the
following updated tools:
Symantec Endpoint Protection Integration
Component version 7.0 SP2 and version 7.1
The Symantec Endpoint Protection Integration
Component enables you to perform common
Symantec Endpoint Protection client operations
from the Symantec Management Console.
■ Symantec IT Analytics
You can install the Symantec Management
Platform, which enables you to share data
between Symantec Endpoint Protection and
other platform services.
■
See “ What's new in Symantec Endpoint Protection and Symantec Network Access
Control 11 ” on page 5.
See “Configuring Protection Center to manage VeriSign services” on page 19.
What's new in Symantec Endpoint Protection and
Symantec Network Access Control 11
The current release includes the following improvements that make Symantec
Endpoint Protection and Symantec Network Access Control easier and more
efficient to use.
5
6
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
What's new in Symantec Endpoint Protection and Symantec Network Access Control 11
New features in this version
Table 1-2
Feature
Benefit
A Web-based console provides a
single sign-on capability for
registered Symantec products
Symantec Protection Center is a Web-based console that enables you to access
and manage multiple, supported Symantec products. The console provides
visibility and analytics across products as well as useful security feedback
and attack statistics.
The console provides a single sign-on screen for the following registered
Symantec products:
■
Symantec Endpoint Protection
■
Symantec Critical System Protection
■
Symantec Web Gateway
■
Symantec Brightmail Gateway
■
Symantec IT Analytics
■
Symantec Data Loss Prevention
A Web-based console for Symantec You can access Symantec Endpoint Protection Manager remotely in a
Endpoint Protection Manager
Web-based console. The Java-based remote console is also still available.
provides easier remote management
access
Symantec Endpoint Protection
includes client software to run on a
Mac computer
You can use Symantec Endpoint Protection Manager to manage Mac clients
that run Symantec software to provide virus and spyware protection on Mac
OS X computers.
Scheduled scans can start at random You can specify a time interval during which scheduled scans start, and enable
times
the scans to start at different times within that time interval. By running
scans at random times, you can increase scan performance, especially in
virtualized environments.
Enhanced default Antivirus and
Antispyware security policies
For new product installations, changes in the default security policies make
Symantec Endpoint Protection more efficient at detecting malware.
Customers who upgrade to Symantec Endpoint Protection version 11 RU6
MP2 or MP3 do not receive new default policies. To see the new recommended
Antivirus and Antispyware security policies settings so that you can make
the settings changes in your policies manually, see Security Response
recommendations for Symantec Endpoint Protection settings.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Where to get more information
New features in this version (continued)
Table 1-2
Feature
Benefit
The Symantec Endpoint Recovery
Tool scans and removes malware
from severely infected computers
The Symantec Endpoint Recovery Tool provides an image that you can burn
on a disc, and then use to scan and remove malware from client computers.
You use this tool for the computers that are too infected for Symantec
Endpoint Protection to clean effectively.
You can download the tool from the following URL:
https://fileconnect.symantec.com/.
You need your Symantec Endpoint Protection serial number to download the
tool.
Host Integrity policies check for
additional security software
You can run a Host Integrity check to see whether the client computers run
the following software:
■
Norton Antivirus 2010
■
Norton Internet Security 2010
■
Norton 360 Version 3.0
■
Symantec Endpoint Protection Version 11 Release Update 6, MP2 or MP3
■
McAfee Internet Security 2010
■
McAfee VirusScan Plus 2010
■
McAfee Total Protection 2010
■
McAfee VirusScan Enterprise 8.7i
Where to get more information
Sources of information include the following:
■
Getting Started with Symantec Endpoint Protection
■
Getting Started with Symantec Network Access Control
■
Installation Guide for Symantec Endpoint Protection and Symantec Network
Access Control
■
Administration Guide for Symantec Endpoint Protection and Symantec Network
Access Control
■
Client Guide for Symantec Endpoint Protection and Symantec Network Access
Control
■
Implementation Guide for Symantec Network Access Control Enforcement
■
LiveUpdate Administrator Getting Started Guide
■
LiveUpdate Administrator User's Guide
7
8
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Where to get more information
■
Symantec Central Quarantine Implementation Guide
■
Symantec Client Firewall Policy Migration Guide
■
Symantec Endpoint Protection Manager Database Schema Reference Guide
■
Symantec Endpoint Protection 11.0 Windows Small Business Server Best
Practices White Paper
■
Tool-specific documents, located in some subdirectories of the Tools folder
on the product disc
■
Readme file, located in the root folder of the installation product disc.
Note: You can find the latest version of this Readme file by using the following
link:
readme_11.0_ru6_mp3
■
Online Help that contains the information that is in the guides plus
context-specific content
The primary documentation is available in the Documentation folder on the
product disc. Updates to the documentation are available from the Symantec
Technical Support Web site.
Table 1-3
Symantec Web sites
Types of information
Web address
Symantec Endpoint Protection trial
version
http://www.symantec.com/business/products/downloads/
Public Knowledge Base
http://www.symantec.com/business/support/overview.jsp?pid=54619
Releases and updates
http://www.symantec.com/business/support/overview.jsp?pid=52788
Manuals and documentation updates
Contact options
Release notes and additional
post-release information
http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/
2007121216360648
Virus and other threat information and http://securityresponse.symantec.com
updates
Product news and updates
http://enterprisesecurity.symantec.com
Symantec Endpoint Protection forums https://forums.symantec.com/syment/board?
board.id=endpoint_protection11
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
What you need to know before you install or update your software
Table 1-3
Symantec Web sites (continued)
Types of information
Web address
Symantec Network Access Control
forums
http://www.symantec.com/connect/security/forums/
network-access-control
What you need to know before you install or update
your software
System requirements for Symantec Endpoint Protection and Symantec Network
Access Control and other material to consider before installation are located in
the Getting Started with Symantec Endpoint Protection and Getting Started with
Symantec Network Access Control documents, and in the Installation Guide.
See “ Latest documentation ” on page 17.
The Common Topics page of the Support site provides individual articles and
links that are designed to provide installation assistance, best practices, and FAQs.
Installing the product for the first time
You can use the following main steps to install the product on a computer on
which a version is not already installed.
Table 1-4
Process for installing the product
Step
Action
Description
Step 1
Review system and
installation requirements
Confirm that your network and the computers you plan to use meet the
requirements to install and run the software.
Step 2
Plan and prepare for the
installation
Decide which type of database to use, plan your deployment, and prepare
client computers.
Step 3
Install Symantec Endpoint Run the installation program from the product disc. The program first installs
Protection Manager
the management server software. It then configures the management server
and creates the database. Follow the procedure that corresponds to the type
of database you select.
See “Symantec Endpoint Protection Manager requires TCP port 9090 by
default” on page 11.
9
10
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
What you need to know before you install or update your software
Process for installing the product (continued)
Table 1-4
Step
Action
Description
Step 4
Create and deploy a client After you configure the database, you are asked if you want to run the
installation package
Migration and Deployment Wizard. This wizard creates and then pushes out
a default client software installation package.
Alternately, you can:
Use the Migration and Deployment Wizard from the Start menu at any
time.
■ Create and deploy client software at a later time using the Find Unmanaged
Computers utility in the console.
■
Note: If this installation is an upgrade deployment from Symantec Endpoint
Protection, there is no need to re-deploy the client. The installation of
Symantec Network Access Control activates the Symantec Network Access
Control features on the client without further deployment.
To view this topic with links to the procedures listed above, go to the following
URL:
http://seer.entsupport.symantec.com/docs/349171.htm
Upgrading to a new release of Symantec Endpoint Protection or
Symantec Network Access Control
You can upgrade to the latest release update of Symantec Endpoint Protection or
Symantec Network Access Control. To install a new version of the software, you
must perform certain tasks as part of your upgrade plan to ensure a successful
upgrade.
The information in this section is specific to upgrading software in environments
where a version of Symantec Endpoint Protection or Symantec Network Access
Control 11.x is already installed.
Table 1-5
Process for upgrading to the latest release update
Step
Action
Description
Step 1
Back up the database
Back up the database used by the Symantec Endpoint Protection Manager to
ensure the integrity of your client information.
Step 2
Turn off replication
Turn off replication on all sites that are configured as replication partners.
This avoids any attempts to update the database during the installation.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
What you need to know before you install or update your software
Table 1-5
Process for upgrading to the latest release update (continued)
Step
Action
Description
Step 3
If you have Symantec
Network Access Control
installed, enable local
authentication
Enforcers are not able to authenticate clients during an upgrade. To avoid
problems with client authentication, Symantec recommends that you enable
local authentication before you upgrade. After the upgrade is finished, you
can return to your previous authentication setting.
Step 4
Stop the Symantec
Endpoint Protection
Manager service
The Symantec Endpoint Protection Manager service must be stopped during
the installation.
Step 5
Upgrade the Symantec
Endpoint Protection
Manager software
Install the new version of the Symantec Endpoint Protection Manager on all
sites in your network. The existing version is detected automatically, and all
settings are saved during the upgrade.
Step 6
Turn on replication after
the upgrade
Turn on replication when the installation is complete to restore your
configuration.
Step 7
Upgrade Symantec client
software
Upgrade your client software to the latest version.
To view this topic with links to the procedures listed above, go to the following
URL:
http://seer.entsupport.symantec.com/docs/349111.htm
Symantec Endpoint Protection Manager requires TCP port 9090 by
default
Symantec Endpoint Protection Manager uses TCP 9090 to display the Symantec
Endpoint Protection Manager console. If other software is listening on this port,
you cannot log on to the Symantec Endpoint Protection Manager console. Note
that Symantec IM Manager uses TCP port 9090. If you are required to run Symantec
Endpoint Protection Manager console on a computer that also requires other
software that uses TCP port 9090, you can change the port for Symantec Endpoint
Protection Manager console.
To change TCP port 9090, edit the following file with WordPad (Notepad does not
correctly show the XML line feeds):
\Symantec\Symantec Endpoint Protection Manager\tomcat\conf\server.xml
Search for port=9090 and change 9090 to a different TCP port number. Save the
file, and then restart Symantec Endpoint Protection Manager with the
11
12
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
User documentation changes summary
Administrative Tools > Services utility. You can then log on to the Symantec
Endpoint Protection Manager console.
Be aware, however, that changing port 9090 partially disables the online Help
system. Every time you use Help, you will have to change 9090 in the URL to the
changed port number to display the Help text.
See “The default port for Enforcer communication with Symantec Endpoint
Protection Manager is 8014” on page 12.
The default port for Enforcer communication with Symantec Endpoint
Protection Manager is 8014
The default port for non-encrypted communication (HTTP) with the Symantec
Endpoint Protection Manager has been changed from 80 to 8014. Encrypted
communications (HTTPS) continue to use port 443. This port setting applies to
all types of Enforcers.
User documentation changes summary
This release includes some updates to the following documents:
■
Readme HTML file for Symantec Endpoint Protection and Symantec Network
Access Control
■
Read this first HTML file for Symantec Endpoint Protection
■
Release notes for Symantec Endpoint Protection and Symantec Network Access
Control
This release includes the following new document:
■
FIPS deployment guide: Symantec™ Endpoint Protection version 11, RU 6a, MP
2 and later FIPS 140-2 Deployment Guide, found here.
See “ Where to get more information ” on page 7.
See “ Latest documentation ” on page 17.
Known issues and additional information
The following items list the known issues in RU7 MP1.
Upgrade issues
The following upgrade issues exist.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Known issues and additional information
Upgrading Symantec Endpoint Protection Manager server from
version 11.0 RU7 to version 12.1 is not currently supported
Symantec Endpoint Protection Manager server version 11.0 RU7 cannot migrate
to Symantec Endpoint Protection Manager server 12.1 due to database schema
differences between the two products. This migration path is blocked with an
error message. If you plan to migrate to Symantec Endpoint Protection Manager
12.1 in the near future, stay with your existing Symantec Endpoint Protection
Manager version and migrate from that version. Symantec Endpoint Protection
Manager 11.0 RU7 supports migration to Symantec Endpoint Protection Manager
12.1 MP1.
Note: This limitation only applies to the Symantec Endpoint Protection Manager
server. Client migration from Symantec Endpoint Protection 11.0 RU7 to Symantec
Endpoint Protection 12.1 is fully supported.
[2341929]
Migration issues
The following migration issues exist.
Migrating unmanaged clients does not use a blank serdef.dat
file
Earlier versions of the Installation Guide for Symantec Endpoint Protection gave
instructions for using a blank Serdef.dat file. Those instructions are no longer
valid, and migration is done internally to the product.
[2083953]
Symantec Endpoint Protection Manager issues
The following issues exist with the management server.
Enhancements to filtering which clients you can view on the
Clients tab
You can display which clients in a group appear on the Clients tab, based on the
operating system or account type. You can display or hide which computers are
connected to the management server. You can also configure how many clients
appear on each page to make the list easier to manage.
13
14
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Known issues and additional information
There is now a new Client View Filter setting that is retained by the Management
Server and stored with the login name of the individual administrator or limited
administrator. If an administrator sets a filter condition, that condition is retained
for that administrator. Different administrators will see only the filters that they
have set themselves.
[2133533]
Symantec Endpoint Protection Manager policy issues
The following policy issues exist with the management server.
System Lockdown recovery instructions are unclear
System Lockdown works by blocking all files that you have not already deemed
as safe. Detailed instructions for setting up the File Fingerprint list for System
Lockdown appear on page 567 of the Administration Guide for Symantec™ Endpoint
Protection and Symantec Network Access Control. If you mistakenly did not include
a core Windows program on the File Fingerprint list, you need to correct the
omission before restarting your clients. You can either disable System Lockdown
on Symantec Endpoint Protection Manager, or add the file fingerprints that are
missing, following the instructions on page 567.
The next step is to restart the client computers in Safe Mode with Network
Support. This restart will correct the issue by allowing the clients to download
updated policies from Symantec Endpoint Protection Manager.
Restarting in Safe Mode with Network Support is only necessary in this case of
the computer being unable to restart. A Safe Mode with Network Support restart,
in that case, will resolve the issue. Otherwise, a simple restart is sufficient.
[2308524]
Prefix variables for centralized exceptions for Macs do not
appear in the glossary
If you add a centralized exception for a security risk file or folder for Mac, the
glossary for the prefix variables incorrectly displays an explanation of the prefix
variables for Windows exceptions. The prefix variables for Mac exceptions are
None, Home, Application, Library. The prefix variables are the top-level folders.
You can specify sub-folders or specific files in the File or folder text box.
[2289029]
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Known issues and additional information
Context-sensitive help for Risk Tracer is missing some
information
For the Symantec Endpoint Protection Manager console, the following information
should be included in the Risk Tracer help topic: Risk Tracer requires that the
Number of seconds to automatically block an attacker’s IP address option is
enabled in the Intrusion Prevention policy. The firewall must also be enabled.
For the Symantec Endpoint Protection client, the following information should
be included in the Auto-Protect Advanced Options help topic: Risk Tracer requires
that the Number of seconds to automatically block an attacker’s IP address
option is enabled on the Intrusion Prevention tab of the Network Threat Protection
settings dialog box. The firewall must also be enabled.
[2387378]
Reporting
The following reporting issues exist.
Audit report filter will have the domain name of "??" after
upgrading to RU7 if the domain name contains a non-English
character
To work around this issue, do the following after upgrading to RU7:
1.
Modify the audit filter with the correct domain name.
2.
Save the filter at the console.
[2378745]
Changes made to syslog display
The display of syslog events has changed in response to customer requests:
■
The source computer IP no longer shows "0.0.0.0" as its address. It now shows
a blank in the syslog.
■
The IP Address field has been added to syslog to contain the address of
computers on which risks are detected.
Both settings appear in exported syslogs.
[2130601]
15
16
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Known issues and additional information
The name of the server sending reports on the deployment of
Symantec Endpoint Protection is now
"SEPM_Server@symantec.com"
This corrects an earlier error, in which the server identified itself as
"SPC_Server@symantec.com" . The name currently in use,
"SEPM_Server@symantec.com", is correct.
[2525362]
Symantec Endpoint Protection Windows client issues
The following issues exist on the Windows client.
Some features / msi codes are only available on 32-bit systems
The table on page 194 of the Installation Guide for Symantec™ Endpoint Protection
and Symantec Network Access Control, entitled Symantec Endpoint Protection
client features, has omissions. It fails to specify that the following capabilities
are only available on 32-bit systems:
■
SymProtectManifest
■
POP3SMTP
[2037006]
Blocked device notifications on the client may be confusing
In Application and Device Control, there is a checkbox option: Notify users when
devices are blocked or unblocked.
The notification checkbox triggers a pop-up message that displays one of the
following messages on the client:
■
The device was disabled successfully.
■
The device was enabled successfully.
These messages correspond to blocked and unblocked on the server side.
[2183345]
In Client Control Mode, many log entries appear
When a client is in Client Control Mode, default firewall rules are in effect. The
last of these rules is to block all packets and write the action to the log. This is the
source of the log entries. It is normal behavior and enables users to examine what
traffic has been blocked and to take appropriate action.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Known issues and additional information
[2488412]
Automatic blocking of IP addresses does not work on an
unmanaged Symantec Endpoint Protection client
When you enable the Number of seconds to automatically block an attacker’s
IP address option on an unmanaged client computer, port scanners and other
attackers are not blocked. To enforce the automatic blocking, you should create
a firewall rule to block all other IP traffic.
[2328002]
Enforcer issues
The following Enforcer issues exist.
Wireless clients must use the same shared secret for 802.1x
authentication to the LAN Enforcer and the RADIUS server
The documentation for configuring shared secrets of a RADIUS server, appearing
on page 217 of the Implementation Guide for Symantec™ Network Access Control
Enforcement, only applies to wired clients.
Wireless clients cannot have different shared secrets for the RADIUS server and
for the LAN Enforcer. They must use the same shared secret for both servers.
[2317168]
Documentation issues
The following documentation issues exist.
Latest documentation
The user documentation might be updated between product releases. You can
locate the latest user documentation at the Symantec Technical Support Web
sites:
Symantec Endpoint Protection documentation
Symantec Network Access Control documentation
17
18
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Known issues and additional information
Note: Some documents refer to CDs. Beginning with Symantec Endpoint Protection
11.0 RU6, all delivery of software and documentation is on DVD. Please ignore
references to CDs.
[2054528]
Context-sensitive help fails to show 5000 clients as the
possible view filter
The online help for the Set Display Filter dialog box incorrectly states that only
1000 clients can be shown in the Results per Page. The correct number is 5000.
[2000545]
The Schema Reference Guide omits some EVENT_ID
descriptions
The Server Client Logs 1 and 2 schema should show the following descriptions
for the corresponding EVENT_ID values:
■
23 = Client downloaded globalindex.dax
■
24 = Client downloaded the Group Update Provider list
■
25 = Client computer is renamed
■
26 = When a new client registers, the client is added to the SEM_CLIENT table
[2413654]
Notification area icon appears despite command to close the
user interface
In the appendix "Using the command-line interface" to the Administration Guide
for Symantec Endpoint Protection and Symantec Network Access Control, it states
that using the command smc -dismissgui closes the user interface, including
the notification area icon.
This is incorrect. The notification area icon still appears. The client still runs and
protects the client computer.
[2401877]
Managing Symantec Protection Center
The Symantec Protection Center has been enhanced to manage several VeriSign
hosted services. Instructions appear in the following material.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Known issues and additional information
Configuring Protection Center to manage VeriSign services
Because VeriSign products are hosted services, the information that you provide
to configure Protection Center to manage them is slightly different.
■
See “To configure Protection Center to manage Managed PKI for SSL”
on page 19.
■
See “To configure Protection Center to manage Managed PKI” on page 20.
■
See “To configure Protection Center to manage VeriSign Identity Protection”
on page 21.
To configure Protection Center to manage Managed PKI for SSL
1
On the Symantec Protection Center Dashboard, or on the main Settings page,
click Add a product to manage.
2
Enter the following information in the specified fields:
New product display name
Type any string that you want to use to
identify this instance of Managed PKI for
SSL in Protection Center.
Product type
Select Managed PKI for SSL from the
drop-down list.
Product address
For access to a pilot (pre-production)
system, type
pilot-spc-ssl-admin.verisign.com.
For access to a production system, type
spc-ssl-admin.verisign.com.
Product user name
Type mpki.
Product password
Type mpki.
Do not change any other settings. Leave the defaults.
3
Click Test Connection to make sure that Protection Center can communicate
with your product.
4
Click Add Product.
19
20
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Known issues and additional information
To configure Protection Center to manage Managed PKI
1
On the Symantec Protection Center Dashboard, or on the main Settings page,
click Add a product to manage.
2
Enter the following information in the specified fields:
New product display name
Type any string that you want to use to
identify this instance of Managed PKI in
Protection Center.
Product type
Select Managed PKI from the drop-down
list.
Product address
For access to a pilot (pre-production)
system, type
pilotonsite-admin.verisign.com.
For access to a production system, type
onsite-admin.verisign.com.
Product user name
Type mpki.
Product password
Type mpki.
Do not change any other settings. Leave the defaults.
3
Click Test Connection to make sure that Protection Center can communicate
with your product.
4
Click Add Product.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Resolved issues in this release
To configure Protection Center to manage VeriSign Identity Protection
1
On the Symantec Protection Center Dashboard, or on the main Settings page,
click Add a product to manage.
2
Enter the following information in the specified fields:
New product display name
Type any string that you want to use to
identify this instance of Verisign Identity
Protection in Protection Center.
Product type
Select VIP Manager from the drop-down
list.
Product address
Type vipmanager.verisign.com.
Product user name
The user name for the VIP Manager
account to use in Protection Center.
Product password
The password for the VIP Manager
account.
Do not change any other settings. Leave the defaults.
3
Click Test Connection to make sure that Protection Center can communicate
with your product.
4
Click Add Product.
Resolved issues in this release
You can view a list of the issues that have been resolved in this release at the
following location:
http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2007121216360648
Components in this release
You can view a list of the components in this release at the following location:
http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2007121216360648
Legal Notice
Copyright © 2011 Symantec Corporation. All rights reserved.
21
22
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
Symantec, the Symantec Logo, LiveUpdate, Sygate, Symantec AntiVirus,
Bloodhound, Confidence Online, Digital Immune System, and Norton are
trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective
owners.
The Licensed Software and Documentation are deemed to be commercial computer
software as defined in FAR 12.212 and subject to restricted rights as defined in
FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and
DFARS 227.7202, “Rights in Commercial Computer Software or Commercial
Computer Software Documentation”, as applicable, and any successor regulations.
Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be
solely in accordance with the terms of this Agreement.
SYMANTEC CORPORATION AND/OR ITS AFFILIATES (“SYMANTEC”) IS WILLING
TO LICENSE THE LICENSED SOFTWARE TO YOU AS THE INDIVIDUAL, THE
COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE LICENSED
SOFTWARE (REFERENCED BELOW AS “YOU” OR “YOUR”) ONLY ON THE
CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE
AGREEMENT (“LICENSE AGREEMENT”). READ THE TERMS AND CONDITIONS
OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE LICENSED
SOFTWARE. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU
AND SYMANTEC. BY OPENING THE LICENSED SOFTWARE PACKAGE, BREAKING
THE LICENSED SOFTWARE SEAL, CLICKING THE “I AGREE” OR “YES” BUTTON,
OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE
LICENSED SOFTWARE OR OTHERWISE USING THE LICENSED SOFTWARE, YOU
AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF
YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE “I DO
NOT AGREE” OR “NO” BUTTON OR OTHERWISE INDICATE REFUSAL AND MAKE
NO FURTHER USE OF THE LICENSED SOFTWARE. UNLESS OTHERWISE DEFINED
HEREIN, CAPITALIZED TERMS WILL HAVE THE MEANING GIVEN IN THE
“DEFINITIONS” SECTION OF THIS LICENSE AGREEMENT AND SUCH
CAPITALIZED TERMS MAY BE USED IN THE SINGULAR OR IN THE PLURAL, AS
THE CONTEXT REQUIRES.
1. DEFINITIONS. “Content Updates” means content used by certain Symantec
products which is updated from time to time, including but not limited to: updated
anti-spyware definitions for anti-spyware products; updated antispam rules for
antispam products; updated virus definitions for antivirus and crimeware products;
updated URL lists for content filtering and antiphishing products; updated firewall
rules for firewall products; updated intrusion detection data for intrusion detection
products; updated lists of authenticated web pages for website authentication
products; updated policy compliance rules for policy compliance products; and
updated vulnerability signatures for vulnerability assessment products.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
“Documentation” means the user documentation Symantec provides with the
Licensed Software. “License Instrument” means one or more of the following
applicable documents which further defines Your license rights to the Licensed
Software: a Symantec license certificate or a similar license document issued by
Symantec, or a written agreement between You and Symantec, that accompanies,
precedes or follows this License Agreement. “Licensed Software” means the
Symantec software product, in object code form, accompanying this License
Agreement, including any Documentation included in, or provided for use with,
such software or that accompanies this License Agreement. “Support Certificate”
means the certificate sent by Symantec confirming Your purchase of the applicable
Symantec maintenance/support for the Licensed Software. “Upgrade” means any
version of the Licensed Software that has been released to the public and which
replaces the prior version of the Licensed Software on Symantec’s price list
pursuant to Symantec’s then-current upgrade policies. “Use Level” means the
license use meter or model (which may include operating system, hardware system,
application or machine tier limitations, if applicable) by which Symantec measures,
prices and licenses the right to use the Licensed Software, in effect at the time an
order is placed for such Licensed Software, as indicated in this License Agreement
and the applicable License Instrument.
2. LICENSE GRANT. Subject to Your compliance with the terms and conditions
of this License Agreement, Symantec grants to You the following rights: (I) a
non-exclusive, non-transferable (except as stated otherwise in Section 16.1) license
to use the Licensed Software solely in support of Your internal business operations
in the quantities and at the Use Levels described in this License Agreement and
the applicable License Instrument; and (ii) the right to make a single uninstalled
copy of the Licensed Software for archival purposes which You may use and install
for disaster-recovery purposes (i.e. where the primary installation of the Licensed
Software becomes unavailable for use). 2.1 TERM. The term of the Licensed
Software license granted under this License Agreement shall be perpetual (subject
to Section 14) unless stated otherwise in Section 17 or unless You have obtained
the Licensed Software on a non-perpetual basis, such as, under a subscription or
term-based license for the period of time indicated on the applicable License
Instrument. If You have obtained the Licensed Software on a non-perpetual basis,
Your rights to use such Licensed Software shall end on the applicable end date as
indicated on the applicable License Instrument and You shall cease use of the
Licensed Software as of such applicable end date.
3. LICENSE RESTRICTIONS. You may not, without Symantec’s prior written
consent, conduct, cause or permit the: (I) use, copying, modification, rental, lease,
sublease, sublicense, or transfer of the Licensed Software except as expressly
provided in this License Agreement; (ii) creation of any derivative works based
on the Licensed Software; (iii) reverse engineering, disassembly, or decompiling
of the Licensed Software (except that You may decompile the Licensed Software
23
24
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
for the purposes of interoperability only to the extent permitted by and subject
to strict compliance under applicable law); (iv) use of the Licensed Software in
connection with service bureau, facility management, timeshare, service provider
or like activity whereby You operate or use the Licensed Software for the benefit
of a third party; (v) use of the Licensed Software by any party other than You; (vi)
use of a later version of the Licensed Software other than the version that
accompanies this License Agreement unless You have separately acquired the
right to use such later version through a License Instrument or Support Certificate;
nor (vii) use of the Licensed Software above the quantity and Use Level that have
been licensed to You under this License Agreement or the applicable License
Instrument.
4. OWNERSHIP/TITLE. The Licensed Software is the proprietary property of
Symantec or its licensors and is protected by copyright law. Symantec and its
licensors retain any and all rights, title and interest in and to the Licensed
Software, including in all copies, improvements, enhancements, modifications
and derivative works of the Licensed Software. Your rights to use the Licensed
Software shall be limited to those expressly granted in this License Agreement.
All rights not expressly granted to You are retained by Symantec and/or its
licensors.
5. CONTENT UPDATES. If You purchase a Symantec maintenance/support offering
consisting of or including Content Updates, as indicated on Your Support
Certificate, You are granted the right to use, as part of the Licensed Software,
such Content Updates as and when they are made generally available to Symantec’s
end user customers who have purchased such maintenance/support offering and
for such period of time as indicated on the face of the applicable Support
Certificate. This License Agreement does not otherwise permit You to obtain and
use Content Updates.
6. UPGRADES/CROSS-GRADES. Symantec reserves the right to require that any
upgrades (if any) of the Licensed Software may only be obtained in a quantity
equal to the number indicated on the applicable License Instrument. An upgrade
to an existing license shall not be deemed to increase the number of licenses which
You are authorized to use. Additionally, if You upgrade a Licensed Software license,
or purchase a Licensed Software license listed on the applicable License Instrument
to cross-grade an existing license (i.e. to increase its functionality, and/or transfer
it to a new operating system, hardware tier or licensing meter), then Symantec
issues the applicable Licensed Instrument based on the understanding that You
agree to cease using the original license. Any such license upgrade or cross-grade
is provided under Symantec's policies in effect at the time of order. This License
Agreement does not separately license You for additional licenses beyond those
which You have purchased, and which have been authorized by Symantec as
indicated on the applicable License Instrument.
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
7. LIMITED WARRANTY. 7.1. MEDIA WARRANTY. If Symantec provides the
Licensed Software to You on tangible media, Symantec warrants that the magnetic
media upon which the Licensed Software is recorded will not be defective under
normal use, for a period of ninety (90) days from delivery. Symantec will replace
any defective media returned to Symantec within the warranty period at no charge
to You. The above warranty is inapplicable in the event the Licensed Software
media becomes defective due to unauthorized use of the Licensed Software. THE
FOREGOING IS YOUR SOLE AND EXCLUSIVE REMEDY FOR SYMANTEC’S BREACH
OF THIS WARRANTY. 7.2. PERFORMANCE WARRANTY. Symantec warrants that
the Licensed Software, as delivered by Symantec and when used in accordance
with the Documentation, will substantially conform to the Documentation for a
period of ninety (90) days from delivery. If the Licensed Software does not comply
with this warranty and such non-compliance is reported by You to Symantec
within the ninety (90) day warranty period, Symantec will do one of the following,
selected at Symantec’s reasonable discretion: either (i) repair the Licensed
Software, (ii) replace the Licensed Software with software of substantially the
same functionality, or (iii) terminate this License Agreement and refund the
relevant license fees paid for such non-compliant Licensed Software. The above
warranty specifically excludes defects resulting from accident, abuse, unauthorized
repair, modifications or enhancements, or misapplication. THE FOREGOING IS
YOUR SOLE AND EXCLUSIVE REMEDY FOR SYMANTEC’S BREACH OF THIS
WARRANTY.
8. WARRANTY DISCLAIMERS. TO THE MAXIMUM EXTENT PERMITTED BY
APPLICABLE LAW, THE WARRANTIES SET FORTH IN SECTIONS 7.1 AND 7.2
ARE YOUR EXCLUSIVE WARRANTIES AND ARE IN LIEU OF ALL OTHER
WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY
QUALITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT
OF INTELLECTUAL PROPERTY RIGHTS. SYMANTEC MAKES NO WARRANTIES
OR REPRESENTATIONS THAT THE LICENSED SOFTWARE, CONTENT UPDATES
OR UPGRADES WILL MEET YOUR REQUIREMENTS OR THAT OPERATION OR
USE OF THE LICENSED SOFTWARE, CONTENT UPDATES, AND UPGRADES WILL
BE UNINTERRUPTED OR ERROR-FREE. YOU MAY HAVE OTHER WARRANTY
RIGHTS, WHICH MAY VARY FROM STATE TO STATE AND COUNTRY TO
COUNTRY.
9. LIMITATION OF LIABILITY. TO THE MAXIMUM EXTENT PERMITTED BY
APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH
HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC
OR ITS LICENSORS, RESELLERS, SUPPLIERS OR AGENTS BE LIABLE TO YOU
FOR (i) ANY COSTS OF PROCUREMENT OF SUBSTITUTE OR REPLACEMENT
GOODS AND SERVICES, LOSS OF PROFITS, LOSS OF USE, LOSS OF OR
CORRUPTION TO DATA, BUSINESS INTERRUPTION, LOSS OF PRODUCTION,
25
26
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
LOSS OF REVENUES, LOSS OF CONTRACTS, LOSS OF GOODWILL, OR
ANTICIPATED SAVINGS OR WASTED MANAGEMENT AND STAFF TIME; OR (ii)
ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES
WHETHER ARISING DIRECTLY OR INDIRECTLY OUT OF THIS LICENSE
AGREEMENT, EVEN IF SYMANTEC OR ITS LICENSORS, RESELLERS, SUPPLIERS
OR AGENTS HAS BEEN ADVISED SUCH DAMAGES MIGHT OCCUR. IN NO CASE
SHALL SYMANTEC’S LIABILITY EXCEED THE FEES YOU PAID FOR THE LICENSED
SOFTWARE GIVING RISE TO THE CLAIM. NOTHING IN THIS AGREEMENT
SHALL OPERATE SO AS TO EXCLUDE OR LIMIT SYMANTEC’S LIABILITY TO
YOU FOR DEATH OR PERSONAL INJURY ARISING OUT OF NEGLIGENCE OR
FOR ANY OTHER LIABILITY WHICH CANNOT BE EXCLUDED OR LIMITED BY
LAW. THE DISCLAIMERS AND LIMITATIONS SET FORTH ABOVE WILL APPLY
REGARDLESS OF WHETHER OR NOT YOU ACCEPT THE LICENSED SOFTWARE,
CONTENT UPDATES OR UPGRADES.
10. MAINTENANCE/SUPPORT. Symantec has no obligation under this License
Agreement to provide maintenance/support for the Licensed Software. Any
maintenance/support purchased for the Licensed Software is subject to Symantec’s
then-current maintenance/support policies.
11. SOFTWARE EVALUATION. If the Licensed Software is provided to You for
evaluation purposes and You have an evaluation agreement with Symantec for
the Licensed Software, Your rights to evaluate the Licensed Software will be
pursuant to the terms of such evaluation agreement. If You do not have an
evaluation agreement with Symantec for the Licensed Software and if You are
provided the Licensed Software for evaluation purposes, the following terms and
conditions shall apply. Symantec grants to You a nonexclusive, temporary,
royalty-free, non-assignable license to use the Licensed Software solely for internal
non-production evaluation. Such evaluation license shall terminate (i) on the end
date of the pre-determined evaluation period, if an evaluation period is
pre-determined in the Licensed Software or (ii) sixty (60) days from the date of
Your initial installation of the Licensed Software, if no such evaluation period is
pre-determined in the Licensed Software (“Evaluation Period”). The Licensed
Software may not be transferred and is provided “AS IS” without warranty of any
kind. You are solely responsible to take appropriate measures to back up Your
system and take other measures to prevent any loss of files or data. The Licensed
Software may contain an automatic disabling mechanism that prevents its use
after a certain period of time. Upon expiration of the Licensed Software Evaluation
Period, You will cease use of the Licensed Software and destroy all copies of the
Licensed Software. All other terms and conditions of this License Agreement shall
otherwise apply to Your evaluation of the Licensed Software as permitted herein.
12. U.S. GOVERNMENT RESTRICTED RIGHTS. The Licensed Software is deemed
to be commercial computer software as defined in FAR 12.212 and subject to
restricted rights as defined in FAR Section 52.227-19 "Commercial Computer
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
Licensed Software - Restricted Rights" and DFARS 227.7202, “Rights in Commercial
Computer Licensed Software or Commercial Computer Licensed Software
Documentation”, as applicable, and any successor regulations. Any use,
modification, reproduction release, performance, display or disclosure of the
Licensed Software by the U.S. Government shall be solely in accordance with the
terms of this License Agreement.
13. EXPORT REGULATION. You acknowledge that the Licensed Software and
related technical data and services (collectively "Controlled Technology") are
subject to the import and export laws of the United States, specifically the U.S.
Export Administration Regulations (EAR), and the laws of any country where
Controlled Technology is imported or re-exported. You agree to comply with all
relevant laws and will not to export any Controlled Technology in contravention
to U.S. law nor to any prohibited country, entity, or person for which an export
license or other governmental approval is required. All Symantec products,
including the Controlled Technology are prohibited for export or re-export to
Cuba, North Korea, Iran, Syria and Sudan and to any country subject to relevant
trade sanctions. You hereby agree that You will not export or sell any Controlled
Technology for use in connection with chemical, biological, or nuclear weapons,
or missiles, drones or space launch vehicles capable of delivering such weapons.
14. TERMINATION. This License Agreement shall terminate upon Your breach
of any term contained herein. Upon termination, You shall immediately stop using
and destroy all copies of the Licensed Software.
15. SURVIVAL. The following provisions of this License Agreement survive
termination of this License Agreement: Definitions, License Restrictions and any
other restrictions on use of intellectual property, Ownership/Title, Warranty
Disclaimers, Limitation of Liability, U.S. Government Restricted Rights, Export
Regulation, Survival, and General.
16. GENERAL. 16.1. ASSIGNMENT. You may not assign the rights granted
hereunder or this License Agreement, in whole or in part and whether by operation
of contract, law or otherwise, without Symantec’s prior express written consent.
16.2. COMPLIANCE WITH APPLICABLE LAW. You are solely responsible for Your
compliance with, and You agree to comply with, all applicable laws, rules, and
regulations in connection with Your use of the Licensed Software. 16.3. AUDIT.
An auditor, selected by Symantec and reasonably acceptable to You, may, upon
reasonable notice and during normal business hours, but not more often than
once each year, inspect Your records and deployment in order to confirm that
Your use of the Licensed Software complies with this License Agreement and the
applicable License Instrument. Symantec shall bear the costs of any such audit,
except where the audit demonstrates that the Manufacturer’s Suggested Reseller
Price (MSRP) value of Your non-compliant usage exceeds five percent (5%) of the
MSRP value of Your compliant deployments. In such case, in addition to purchasing
27
28
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
appropriate licenses for any over-deployed Licensed Software, You shall reimburse
Symantec for the auditor’s reasonable actual fees for such audit. 16.4. GOVERNING
LAW; SEVERABILITY; WAIVER. If You are located in North America or Latin
America, this License Agreement will be governed by the laws of the State of
California, United States of America. If you are located in China, this License
Agreement will be governed by the laws of the Peoples Republic of China.
Otherwise, this License Agreement will be governed by the laws of England. Such
governing laws are exclusive of any provisions of the United Nations Convention
on Contracts for Sale of Goods, including any amendments thereto, and without
regard to principles of conflicts of law. If any provision of this License Agreement
is found partly or wholly illegal or unenforceable, such provision shall be enforced
to the maximum extent permissible, and remaining provisions of this License
Agreement shall remain in full force and effect. A waiver of any breach or default
under this License Agreement shall not constitute a waiver of any other subsequent
breach or default. 16.5. THIRD PARTY PROGRAMS. This Licensed Software may
contain third party software programs (“Third Party Programs”) that are available
under open source or free software licenses. This License Agreement does not
alter any rights or obligations You may have under those open source or free
software licenses. Notwithstanding anything to the contrary contained in such
licenses, the disclaimer of warranties and the limitation of liability provisions in
this License Agreement shall apply to such Third Party Programs. 16.6. CUSTOMER
SERVICE. Should You have any questions concerning this License Agreement, or
if You desire to contact Symantec for any reason, please write to: (i) Symantec
Enterprise Customer Care, 555 International Way, Springfield, Oregon 97477,
U.S.A., (ii) Symantec Enterprise Customer Care Center, PO BOX 5689, Dublin 15,
Ireland, or (iii) Symantec Enterprise Customer Care, 1 Julius Ave, North Ryde,
NSW 2113, Australia. 16.7. ENTIRE AGREEMENT. This License Agreement and
any related License Instrument are the complete and exclusive agreement between
You and Symantec relating to the Licensed Software and supersede any previous
or contemporaneous oral or written communications, proposals, and
representations with respect to its subject matter. This License Agreement prevails
over any conflicting or additional terms of any purchase order, ordering document,
acknowledgement or confirmation or other document issued by You, even if signed
and returned. This License Agreement may only be modified by a License
Instrument that accompanies or follows this License Agreement.
17. ADDITIONAL TERMS AND CONDITIONS. Your use of the Licensed Software
is subject to the terms and conditions below in addition to those stated above.
17.1. You may use the Licensed Software for the number of licensed User(s) and
at the Use Levels as have been licensed to You by Symantec herein and as indicated
in the applicable License Instrument. Your License Instrument shall constitute
proof of Your right to make and use such copies. For purposes of this License
Agreement, “User(s)” means an individual person and/or device authorized by
You to use and/or benefits from the use of the Licensed Software, or is the person
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
and/or device who actually uses any portion of the Licensed Software. 17.2.
Notwithstanding anything to the contrary contained in this License Agreement,
if the Licensed Software is Symantec Endpoint Protection, each running instance
(physical and/or virtual) of such Software must be licensed. You create an
“instance” of software by executing the software’s setup or install procedure. You
also create an “instance” of software by duplicating an existing instance.
References to software include “instances” of the software. You “run an instance”
of software by loading it into memory and executing one or more of its instructions.
Once running, an instance is considered to be running (whether or not its
instructions continue to execute) until it is removed from memory. 17.3. Privacy;
Data Protection. From time to time, the Licensed Software may collect certain
information from the device on which it is installed, which may include: (i)
Information regarding installation of the Licensed Software. This information
indicates to Symantec whether installation of the Licensed Software was
successfully completed and is collected by Symantec for the purpose of evaluating
and improving Symantec’s product installation success rate. This information
will not be correlated with any personally identifiable information. (ii) Information
on potential security risks as well as URLs of websites visited that the Licensed
Software deems potentially fraudulent. This information is collected by Symantec
for the purpose of evaluating and improving the ability of Symantec’s products
to detect malicious behavior, potentially fraudulent websites and other Internet
security risks. This information will not be correlated with any personally
identifiable information. (iii) Portable executable files that are identified as
malware. These files are submitted to Symantec using the Licensed Software’s
automatic submission function. The collected files could contain personally
identifiable information that has been obtained by the malware without your
permission. Files of this type are being collected by Symantec only for the purpose
of improving the ability of Symantec’s products to detect malicious behavior.
Symantec will not correlate these files with any personally identifiable information.
Such automatic submission function may be deactivated after installation by
following the instructions in the Documentation for applicable products. (iv) The
name given during initial setup to the device on which the Licensed Software is
being installed. If collected, the name will be used by Symantec as an account
name for such device under which you may elect to receive additional services
and/or under which you may use certain features of the Licensed Software. You
may change the account name at any time after installation of the Licensed
Software (recommended). (v) The International Mobile Equipment Identity (IMEI)
and International Mobile Subscriber Identity (IMSI) for the mobile
telecommunications device used with the Licensed Software. This information is
being collected for the purpose of being able to identify the telecommunications
device eligible to receive Content Updates for the Licensed Software. This
information will not be correlated with any other personally identifiable
information. (vi) Other information used for purposes of analyzing and improving
29
30
Release Notes for Symantec Endpoint Protection and Symantec Network Access Control, version 11, Release Update 7 MP1
Legal Notice
the functionality of Symantec’s products. This information will not be correlated
with any personally identifiable information. The collected information as set out
above is necessary for the purpose of optimizing the functionality of Symantec’s
products and may be transferred to the Symantec group in the United States or
other countries that may have less protective data protection standards than the
region in which You are situated (including the European Union), but Symantec
has taken steps so that the collected information, if transferred, receives an
adequate level of protection. Symantec may disclose the collected information if
asked to do so by a law enforcement official as required or permitted by law or in
response to a subpoena or other legal process. In order to promote awareness,
detection and prevention of Internet security risks, Symantec may share certain
information with research organizations and other security software vendors.
Symantec may also use statistics derived from the information to track and publish
reports on security risk trends. By using the Licensed Software, you acknowledge
and agree that Symantec may collect, transmit, store, disclose and analyze such
information for these purposes.
Download PDF
Similar pages