Symantec Integration Guide
Symantec Integration Guide
Symantec Integration Guide
Legal Notice
Copyright © 2010 Symantec Corporation.
Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S and other countries. Other names may be
trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (“Third Party Programs”). Some of the Third Party
Programs are available under open source or free software licenses. The License
Agreement accompanying the Software does not alter any rights or obligations you may
have under those open source or free software licenses. Please see the Third Party Legal
Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec
product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
3
Technical support
n Network topology
n Router, gateway, and IP address information
n Problem description:
n Error messages and log files
n Troubleshooting that was performed before contacting Symantec
n Recent software configuration changes and network changes
Customer Service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with the following types of issues:
n Questions regarding product licensing or serialization
n Product registration updates such as address or name changes
n General product information (features, language availability, local dealers)
n Latest information about product updates and upgrades
n Information about upgrade assurance and maintenance contracts
n Information about the Symantec Buying Programs
n Advice about Symantec’s technical support options
n Nontechnical presales questions
n Issues that are related to CD-ROMs or manuals
Technical support
Chapter 1 Introducing Symantec AntiVirus™ for Network Attached
Storage
About Symantec AntiVirus for Network Attached Storage .......................... 11
About software components ...................................................................... 12
About Symantec Scan Engine .................................................................... 12
About the connector .................................................................................... 13
Supported storage devices ................................................................................. 13
How to use the Symantec AntiVirus for Network Attached Storage
documentation ............................................................................................. 14
About the Symantec Scan Engine Implementation Guide .................... 15
About the Symantec AntiVirus for Network Attached Storage Integration
Guide ...................................................................................................... 15
Why you need virus protection in a network attached storage environment 16
How the scan engine protects against viruses ........................................ 17
About Symantec Security Response ......................................................... 18
About preparing for installation ....................................................................... 18
Windows system requirements ................................................................. 19
Solaris system requirements ..................................................................... 20
Linux system requirements ....................................................................... 21
Post-installation tasks ........................................................................................ 22
Notifying the NetApp Filer when virus definitions are updated .......... 34
Notifying a requesting user that a virus was found ............................... 35
About quarantining unrepairable infected files ..................................... 36
Specifying which embedded files to scan ................................................ 37
Scheduling LiveUpdate to update virus definitions automatically ..... 40
Configuring Rapid Release updates to occur automatically ................. 41
About configuring the client NetApp Filer ...................................................... 42
About verifying that the scan engine is registered with the filer ........ 42
About activating virus scanning ............................................................... 43
About specifying the file extensions to be scanned on the NetApp Filer 43
About working with unresponsive scan engines .................................... 44
How virus scanning affects backups on NetApp Filer ........................... 44
About clearing the scanned files cache .................................................... 44
About notifying a requesting user that a virus was found .................... 45
66
How are files scanned ................................................................................. 66
How caching works ...................................................................................... 67
About specifying which file types are scanned ....................................... 67
About specifying the scan policy ............................................................... 68
About handling infected files on the NAS device ................................... 68
About preparing for installation ....................................................................... 69
About configuring Symantec Scan Engine ...................................................... 69
Configuring ICAP-specific options ............................................................ 69
Specifying which file types to scan on the scan engine ......................... 72
Specifying container handling limits ....................................................... 75
Scheduling LiveUpdate to update virus definitions automatically ..... 75
Configuring Rapid Release updates to occur automatically ................. 76
About configuring the Sun Storage 7000 Series NAS device ........................ 78
Registering Symantec Scan Engine .......................................................... 78
About configuring virus scanning on the Sun Storage 7000 Series NAS
device ..................................................................................................... 78
Recommendations while integrating multiple scan engines ....................... 80
Index
10 Contents
Chapter 1
Introducing Symantec
AntiVirus™ for Network
Attached Storage
This chapter includes the following topics:
n Post-installation tasks
Figure 1-1 Integration of a network attached storage device with the Symantec
Scan Engine
1. The client tries to access a file on the network attached storage device.
2. The network attached storage device, by means of a connector, sends the file to the
Symantec Scan Engine for scanning.
3. Symantec Scan Engine scans the file, repairs it if it is infected, and returns the clean file
to the network attached storage device.
4. The network attached storage device writes the cleaned file to disk, caches the fact that
the file has been cleaned, and sends the file to the client.
Symantec Scan Engine accepts scan requests from client applications that use
the following protocols:
n The Internet Content Adaptation Protocol (ICAP), version 1.0, as presented
in RFC 3507 (April 2003)
n A proprietary implementation of remote procedure call (RPC)
n Symantec Scan Engine native protocol
Symantec Scan Engine is included in the Symantec AntiVirus for Network
Attached Storage distribution package.
For more information about the scan engine, see the Symantec Scan Engine
Implementation Guide on the product CD.
Table 1-1 gives the list of storage devices, its supported versions, and the
protocol that Symantec Scan Engine uses to interface with these storage
devices.
Sun® StorageTek™ 5000 NAS Appliance ICAP Sun NAS Firmware 4.21
M1 or later
Note: If the scan engine uses RPC protocol to interface with your network
attached storage device, Symantec Scan Engine must be installed on Windows
2000 Server/Windows 2003 Server/Windows 2008 Server platforms only.
Information for configuring the This section discusses the configuration options on
scan engine to work with the NAS the scan engine that must be configured to work with
device the NAS device. It may highlight other options that
are important in setting up comprehensive virus
protection as well. This information does not replace
the Symantec Scan Engine Implementation Guide.
Consult the implementation guide for installation
information and for additional information on
configuring Symantec Scan Engine to meet your
needs.
Known issues This section describes the issues that can affect
operation between Symantec Scan Engine and the
NAS device.
extracting a file and its contents, the maximum file size for container files, and
the maximum number of nested levels to be decomposed for scanning.
Symantec Scan Engine also detects mobile code such as Java™, ActiveX®, and
standalone script-based threats. Symantec Scan Engine uses Symantec antivirus
technologies, including Bloodhound™, for heuristic detection of new or
unknown viruses; NAVEX™, which provides protection from new classes of
viruses automatically through LiveUpdate; and Striker, for the detection of
polymorphic viruses.
The scan engine can also be configured to send alerts when specific thresholds
are met or exceeded. For example, if the same type of virus has been detected ten
times in a 20-minute interval, the scan engine can be configured to send an alert
to any of the scan engine logging or alerting destinations.
Operating system n Windows 2000 Server with the latest service pack
n Windows Server 2003 (32-bit)
n Windows Server 2003 R2 (32-bit)
n Windows Server 2003 R2 (64-bit)
n Windows Server 2008 (32-bit)
n Windows Server 2008 (64-bit)
n Windows Server 2008 R2 (64-bit)
Processor SPARC®
Post-installation tasks
The Symantec AntiVirus for Network Attached Storage connectors do not
require licensing from Symantec. However, you must install the appropriate
licenses for Symantec Scan Engine. These licenses are required to activate
antivirus scanning functionality for the scan engine and to receive updated
virus definitions.
For more information about licensing, see the Symantec Scan Engine
Implementation Guide.
Introducing Symantec AntiVirus™ for Network Attached Storage 23
Post-installation tasks
After you install and configure the scan engine, you must configure the
connector for your network attached storage device to send files to the scan
engine.
For more information about integrating a specific connector with the scan
engine, see the appropriate chapter in this guide.
24 Introducing Symantec AntiVirus™ for Network Attached Storage
Post-installation tasks
Chapter 2
Configuring Symantec™
AntiVirus for NetApp®
Filer™
This chapter includes the following topics:
n How Symantec Scan Engine works with the NetApp Filer client
cannot be repaired, and the infected file is deleted from storage. Symantec Scan
Engine can be configured to quarantine these unrepairable files.
See “About quarantining unrepairable infected files” on page 36.
The filer caches scanning results for each clean file to avoid redundant scans of
those files that have already been scanned. The cache is purged when the virus
definitions on Symantec Scan Engine are updated, the “vscan reset” command is
run on the filer, or when the scan engine is restarted. If the cache is full and a
file that is not in the cache is accessed, the oldest information in the cache is
purged. This ensures that the scanning results for the newly scanned file can be
stored.
You can control the files that are The NetApp Filer lets you specify by file extension the
initially submitted to the scan files that are to be passed to Symantec Scan Engine for
engine by the NetApp Filer for scanning. You configure the file types that you want to
scanning submit for scanning through the NetApp Filer
interface in accordance with the product
documentation.
See “About specifying the file extensions to be
scanned on the NetApp Filer” on page 43.
28 Configuring Symantec™ AntiVirus for NetApp® Filer™
How Symantec Scan Engine works with the NetApp Filer client
You can control the files that are The scan engine lets you specify the file types and the
embedded in archival file formats file extensions that you do not want to scan. The file
(for example, .zip or .lzh files) that extensions exclusion list and the file type exclusion
are to be scanned by Symantec list achieve this purpose. You can also scan all file
Scan Engine types regardless of extension. You configure which
embedded files are scanned through the Symantec
Scan Engine administrative interface.
See “Specifying which embedded files to scan” on
page 37.
Scan and repair files Try to repair the infected file, and deny access
to any unrepairable file.
Scan and repair or delete Try to repair the infected file, and delete any
unrepairable file.
You can also configure the scan engine to quarantine unrepairable files.
See“About quarantining unrepairable infected files” on page 36.
Note: Symantec Scan Engine can obtain only the information that is made
available by the NetApp Filer. In some cases, all or some of this information is
not available. The information that is obtained is reported in the related log
entries. Any identification information that is not obtained from the NetApp
Filer is omitted from the log messages and from the user notification window.
You also can configure Symantec Scan Engine to notify the requesting user that
the retrieval of a file failed because a virus was found.The notification message
includes the following:
n Date and time of the event
n File name of the infected file
n Virus name and ID
n Virus definition date and revision number
n Manner in which the infected file was handled (for example, the file was
repaired or deleted)
n Scan policy
n Disposition of the file
n Duration of scan time and connection time
To use the user notification feature, the Windows Messenger service must be
running on the computer that is running Symantec Scan Engine, and on the
user’s computer.
See “Notifying a requesting user that a virus was found” on page 35.
After you install Symantec Scan Engine, configure the NetApp Filer to work with
the scan engine.
See “About configuring the client NetApp Filer” on page 42.
6 Click OK.
7 Stop and start the Symantec Scan Engine service.
For more information on stopping and starting the Symantec Scan Engine
service, see the Symantec Scan Engine Implementation Guide.
Option Description
RPC client list A single Symantec Scan Engine can support one or more NetApp
Filers. NetApp Filers must be located in the same domain as the
scan engine. You must provide the IP address of each NetApp Filer.
Note: Multiple scan engines can support a single NetApp Filer.
Configure the multiple scan engines through the NetApp Filer
interface.
Check RPC Symantec Scan Engine maintains a connection with the NetApp
connection every __ Filer. Symantec Scan Engine can be configured to check the
seconds connection with the NetApp Filer at a prescribed interval to
ensure that the connection is active. The default value is 20
seconds.
Maximum number You can configure the scan engine to make a specified number of
of reconnect tries to re-establish a lost connection with the NetApp Filer. By
attempts default, Symantec Scan Engine is configured to try to reconnect
with the NetApp Filer indefinitely.
Option Description
Antivirus scan You can configure Symantec Scan Engine to do one of the
policy following when an infected file is found:
n Scan only: Deny access to the infected file, but do nothing to
the infected file.
n Scan and repair files: Try to repair the infected file, and deny
access to any unrepairable file.
n Scan and repair or delete: Try to repair the infected file, and
delete any unrepairable file from archive files.
Note: You must select Scan and repair or delete if you plan to
quarantine the infected files that cannot be repaired. For more
information, see the Symantec Scan Engine Implementation Guide.
Automatically send You can configure Symantec Scan Engine to automatically notify
antivirus update the NetApp Filer when new virus definitions are used. This
notifications notification causes the NetApp filer to clear its cache of scanned
files.
5 To add a NetApp Filer to the list of RPC clients, type the IP address of the
NetApp Filer for which Symantec Scan Engine should provide scanning
services.
Type one entry per line.
6 To delete a NetApp Filer from the list of RPC clients, select and delete the IP
address of the NetApp Filer.
7 On the toolbar, select one of the following:
To automatically notify the NetApp Filer when virus definitions are updated
1 On the administrative interface, in the left pane, click Configuration.
2 Under Views, click Protocol.
3 Under RPC Configuration, check Automatically send AntiVirus update
notifications.
This option is disabled by default.
Configuring Symantec™ AntiVirus for NetApp® Filer™ 35
About configuring Symantec Scan Engine
To manually notify the NetApp Filer when virus definitions are updated
1 On the administrative interface, in the left pane, click Configuration.
2 Under Views, click Protocol.
3 In the left pane, under Tasks, click Send AntiVirus Update Notification.
You can enable the NetApp Filer to display warning messages to the requesting
user as well.
See “About notifying a requesting user that a virus was found” on page 45.
Note: You must select “Scan and repair or delete” as the RPC scan policy to
forward files to the quarantine. The original infected file is deleted when a copy
of an infected file is forwarded to the quarantine. If submission to the
quarantine is not successful, the original file is not deleted, and an error
message is returned to the NetApp Filer. Access to the infected file is denied.
When the scan engine receives an archive file (for example, a .zip or .lzh file)
that contains embedded files, it must break down the archive file and scan each
embedded file. You can control, through the scan engine administrative
interface, which embedded files are scanned by using a file extension and file
type exclusion list. You can also scan all files regardless of extension.
Symantec Scan Engine is configured by default to scan all files. The file type and
file extension exclusion list is prepopulated with the file types that are unlikely
to contain viruses, but you can edit this list.
Note: During virus outbreaks, you might want to scan all files even if you
normally control the file types that are scanned with the file type or file
extension exclusion list.
To scan all files except for those that are in the file extension exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
Configuring Symantec™ AntiVirus for NetApp® Filer™ 39
About configuring Symantec Scan Engine
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
On activating this option, both the file extension exclude list and the file
type exclude list gets activated automatically.
4 Type each file extension that you want to add to the list on a separate line.
Use a period with each extension in the list.
5 To remove a file extension from the list, select it and delete it from the File
extension exclude list.
6 To restore the default file extension exclude list, in the left pane, under
Tasks, click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
To scan all file types except those in the file type exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you activate this option, both the file type exclude list and the file
extension exclude list are activated automatically.
4 Type each file type you want to add to the list on a separate line.
To include all subtypes for a file type, use the wildcard character /*.
For more information on how to write the file types, see the Symantec Scan
Engine Implementation Guide.
5 To remove a file type from the list, select it and delete it from the File type
exclude list.
6 To restore the default file type exclude list, in the left pane, under Tasks,
click Reset Default List.
40 Configuring Symantec™ AntiVirus for NetApp® Filer™
About configuring Symantec Scan Engine
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
You can select from 2, 4, 8, 10, 12, or 24-hour intervals. The default
LiveUpdate interval is 2 hours.
5 On the toolbar, select one of the following:
Warning: Rapid Release definitions do not undergo the same rigorous quality
assurance tests as LiveUpdate and Intelligent Updater definitions. Symantec
encourages users to rely on the full quality-assurance-tested definitions
whenever possible. Ensure that you deploy Rapid Release definitions to a test
environment before you install them on your network.
If you use a proxy or firewall that blocks FTP communications, the Rapid
Release feature does not function. Your environment must allow FTP traffic for
the FTP session to succeed.
You can schedule Rapid Release updates to occur automatically at a specified
time interval to ensure that Symantec Scan Engine always has the most current
definitions. Scheduled Rapid Release updates are disabled by default.
3 In the content area under Rapid Release Content, check Enable scheduled
Rapid Release to enable automatic downloads of Rapid Release definitions.
This option is disabled by default.
4 In the Rapid Release interval box, to specify the interval between which you
want Symantec Scan Engine to download Rapid Release definitions, do any
of the following steps:
n Type the interval.
n Click the up arrow or down arrow to select the interval.
You can select any number between 5 minutes and 120 minutes. The default
value is 30 minutes.
5 On the toolbar, select one of the following:
About verifying that the scan engine is registered with the filer
You can verify that the scan engine is registered with the filer after you install
Symantec Scan Engine. Registration is automatic if you have provided the
correct information to Symantec Scan Engine for contacting the filer.
Registration occurs when the scan engine connects to the Filer. Use the “vscan”
Configuring Symantec™ AntiVirus for NetApp® Filer™ 43
About configuring the client NetApp Filer
command at the command line interface to check the list of registered scan
engines.
Note: The service startup properties for Symantec Scan Engine must be changed
to identify an account that has the appropriate permissions on the filer. If the
change has not been done, the scan engine cannot register with the filer because
it does not have sufficient permission.
See “Editing the service startup properties” on page 30.
file type need not be scanned. You can save bandwidth and time by limiting the
files to be scanned to only those file types that can contain viruses.
For more information, see the NetApp Filer documentation.
Note: Ensure that you have edited the service startup privileges appropriately,
or disable virus scanning before you initiate a backup of the NetApp Filer.
See “Editing the service startup properties” on page 30.
notification prompts the NetApp Filer to clear its cache of scanned files. Any
new requests for files causes the file to be sent to the scan engine again for
scanning.
See “Notifying the NetApp Filer when virus definitions are updated” on page 34.
You can manually clear the cache of scanned files by using the “vscan reset”
command at the command line interface.
n How Symantec Scan Engine works with the Sun StorageTek 5000 NAS
Appliance
the file to the scan engine for scanning. When scanning is complete, the NAS
Anti Virus Agent closes the connection with the scan engine.
The Symantec Scan Engine indicates the scanning results to the NAS Anti Virus
Agent after a file is scanned. The scan engine also returns the repaired file if a
file is infected and can be repaired.
After the NAS Anti Virus Agent receives the scanning results, the file is handled
in the following way: Only clean files are passed to the requesting user. The
repaired file is passed to the requesting user if the file is infected and can be
repaired. The stored version of the infected file is then replaced with the
repaired file. If the file is infected and cannot be repaired, the user is denied
access to the file, and the infected file is quarantined. The user can also
configure the Symantec Scan Engine to quarantine an unrepairable file.
See “About quarantining unrepairable files on Symantec Scan Engine” on
page 51.
You can control which files are scanned by using the exclusion or an inclusion
list, or you can scan all files regardless of extension. Configure the NAS
Anti Virus Agent to pass all file types to the scan engine except those that are
contained in the exclusion list. The exclusion list can include extensions for
those file types that are not likely to contain viruses and can be excluded from
scanning.
See “About configuring virus scanning on the Sun StorageTek 5000 NAS
Appliance” on page 61.
Note: Exclusion lists ensure that all file types are not scanned; therefore, new
types of viruses might not be detected. Scanning all files regardless of extension
and type is the most secure setting, but it imposes the heaviest demand on
resources. During virus outbreaks, you might want to scan all files even if you
normally control the file types that are scanned with the exclusion list.
For more information, see the Symantec Scan Engine Implementation Guide.
See “Specifying which file types to scan on the scan engine” on page 55.
Configuring Symantec AntiVirus™ for Sun StorageTek™ 5000 NAS Appliance 51
How Symantec Scan Engine works with the Sun StorageTek 5000 NAS Appliance
Scan and delete Scan files for viruses, and delete any infected files
that are embedded in archive or container files
without trying to repair
Scan and repair files Try to repair infected files, but do nothing to
unrepairable files (that is, do not delete the files
from archive or container files).
Scan and repair or delete Try to repair infected files, and delete
unrepairable files from archive or container files
Note: The configuration settings on each scan engine must be identical if you
use multiple scan engines to support scanning. LiveUpdate and Rapid Release
should be scheduled to occur at the same time on all scan engines so that virus
definitions are consistent at all times.
The scan engine must be configured to use ICAP as the communication protocol.
ICAP is the default protocol at installation. After you have selected ICAP, you
can configure ICAP-specific options.
Option Description
Bind address Symantec Scan Engine detects all of the available IP addresses
that are installed on the host. By default, Symantec Scan
Engine accepts scanning requests on (binds to) all of the
scanning IP addresses that it detects. You can configure up to
64 IP addresses as scanning IP addresses.
You can specify whether you want Symantec Scan Engine to
bind to all of the IP addresses that it detects, or you can
restrict access to one or more interfaces. If you do not specify
at least one IP address, Symantec Scan Engine binds to all of
the scanning IP addresses that it detects.
If Symantec Scan Engine fails to bind to any of the selected IP
addresses, an event is written to the log as a critical error.
Even if Symantec Scan Engine is unable to bind to any IP
address, you can access the console. However, scanning
functionality is unavailable.
Note: You can use 127.0.0.1 (the loopback interface) to let only
the clients that are running on the same computer connect to
Symantec Scan Engine.
Port number The port number must be exclusive to Symantec Scan Engine.
For ICAP, the default port number is 1344. If you change the
port number, use a number greater than 1024 that is not in
use by any other program or service.
Scan policy When an infected file is found, Symantec Scan Engine can do
any of the following:
n Scan only: Scan files for viruses, but do nothing to
infected files.
n Scan and delete: Scan files for viruses, and delete any
infected files that are embedded in archive or container
files without trying to repair.
n Scan and repair files: Try to repair infected files, but do
nothing to unrepairable files (that is, do not delete the
files from archive or container files).
n Scan and repair or delete: Try to repair infected files, and
delete unrepairable files from archive or container files.
Note: If you choose the data trickle feature, the virus scan
policy is automatically set to Scan only.
54 Configuring Symantec AntiVirus™ for Sun StorageTek™ 5000 NAS Appliance
About configuring Symantec Scan Engine
Option Description
Enable trickle This setting provides users with a quicker download response
and avoids possible session time-out errors. Data trickling is
disabled by default.
Time before trickle data You can specify how long the scan process should run before
starts data trickling begins.
Note: Symantec Scan Engine examines the first few bytes of every file to
determine whether the file could contain a virus. This action occurs even if the
file extension is not one that was identified for scanning. Based on this
examination, the scan engine may scan a file even though it has not been
identified for scanning.
For more information, see the Symantec Scan Engine Implementation Guide.
See “About configuring virus scanning on the Sun StorageTek 5000 NAS
Appliance” on page 61.
To scan all files except for those that are in the file extension exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
56 Configuring Symantec AntiVirus™ for Sun StorageTek™ 5000 NAS Appliance
About configuring Symantec Scan Engine
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file extension exclude list and the file
type exclude list are activated automatically.
4 Type each file extension that you want to add to the list on a separate line.
Use a period with each extension in the list.
5 To remove a file extension from the list, select it and delete it from the File
extension exclude list.
6 To restore the default file extension exclude list, in the left pane, under
Tasks, click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
To scan all file types except those in the file type exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file type exclude list and the file
extension exclude list are activated automatically.
4 Type each file type you want to add to the list on a separate line.
To include all subtypes for a file type, use the wildcard character /*.
For more information on how to write the file types, see the Symantec Scan
Engine Implementation Guide.
5 To remove a file type from the list, select it and delete it from the File type
exclude list.
6 To restore the default file type exclude list, in the left pane, under Tasks,
click Reset Default List.
Configuring Symantec AntiVirus™ for Sun StorageTek™ 5000 NAS Appliance 57
About configuring Symantec Scan Engine
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
n The maximum file size, in megabytes, for the individual files that are in a
container file
n The maximum number of nested levels to decompose for scanning
n The maximum number of bytes that are read when determining whether a
file is MIME-encoded
You can specify whether to allow or deny access to the file if any of these
specified limits is met or exceeded.
Symantec Scan Engine blocks container files based on their type, because only
certain file types contain virus or malicious code.You can configure Symantec
Scan Engine to block partial container files, malformed container files, and
encrypted container files as well.
For more information on container handling limits, see the Symantec Scan
Engine Implementation Guide.
Warning: Rapid Release definitions do not undergo the same rigorous quality
assurance tests as LiveUpdate and Intelligent Updater definitions. Symantec
encourages users to rely on the full quality-assurance-tested definitions
whenever possible. Ensure that you deploy Rapid Release definitions to a test
environment before you install them on your network.
If you use a proxy or firewall that blocks FTP communications, the Rapid
Release feature does not function. Your environment must allow FTP traffic for
the FTP session to succeed.
You can schedule Rapid Release updates to occur automatically at a specified
time interval to ensure that Symantec Scan Engine always has the most current
definitions. Scheduled Rapid Release updates are disabled by default.
5000 NAS Appliance. The NAS Anti Virus Agent handles load balancing across
multiple scan engines automatically.
Note: You do not need to register the same scan engine with each Sun
StorageTek 5000 NAS Appliance. You can register different scan engines to
different Sun StorageTek 5000 NAS Appliances. However, all of the scan engines
registered with a Sun StorageTek 5000 NAS Appliance must have identical
configurations.
You register Symantec Scan Engine through the Configure AntiVirus setup
screen for the NAS AntiVirus Agent. You must provide the IP address, the port
number, and the maximum number of simultaneous scan requests for each scan
engine that is used for scanning. The port number must match the port number
that was selected during the installation of Symantec Scan Engine.
Note: The virus scan functionality for each Sun StorageTek 5000 NAS Appliance
accessing a scan engine must be configured identically to avoid inconsistency.
The scan results and repair results for infected files will be inconsistent if the
settings differ for each appliance.
Table 3-2 describes the settings that you should configure for virus scan
functionality.
Setting Description
Enable Anti Virus Activate the NAS AntiVirus Agent by enabling this option.
Scan Engine IP address and Type the IP address and the port number of each scan
port number engine to be used for scanning.
Ensure that the entered port number matches the one used
while installing the scan engine. Each Sun StorageTek 5000
NAS appliance can support up to four scan engines.
62 Configuring Symantec AntiVirus™ for Sun StorageTek™ 5000 NAS Appliance
About configuring the Sun StorageTek 5000 NAS Appliance
Setting Description
Maximum Connections Specify the number of concurrent scan requests that can be
handled by the scan engine. The default setting on the NAS
Anti Virus Agent is 2. The similar configurable option on
the Symantec Scan Engine defaults to 128.
Maximum scan size Select whether to specify an upper limit for the size of files
to be scanned.
Although you can choose a file size between 1 MB and 9999
MB, the Symantec Scan Engine can scan a maximum file
size of 2047 MB (or 2GB). The default setting is 1GB.
You can choose to allow or deny access to files that are
larger than the limit that is specified in Maximum scan size.
Extensions for scanning Select the file types to be passed to Symantec Scan Engine
(file types to be scanned) for scanning.
You can use either an exclusion or an inclusion list, or you
can scan all files regardless of extension. This setting is
similar to the Files to scan setting on Symantec Scan
Engine. You must configure this setting on both the Sun
StorageTek 5000 NAS Appliance and Symantec Scan
Engine.
The recommended setting is to pass all file types to the scan
engine except those that are contained in the exclusion list.
If the Symantec Scan Engine’s scanning results indicate that the file is
unrepairable and must be deleted, then the NAS AntiVirus Agent quarantines
the file. All access to the file is denied. If the file is infected but repairable, the
repaired file is passed to the requesting user. The stored version of the infected
file is replaced with the repaired file.
If one scan engine does not respond, the NAS AntiVirus Agent requests virus
scanning for a given file from other registered scan engines. If none respond,
then file access is denied.
Configuring Symantec AntiVirus™ for Sun StorageTek™ 5000 NAS Appliance 63
Recommendations while integrating multiple scan engines
n How Symantec Scan Engine works with the Sun Storage 7000 Series NAS
device
Based on the scan policy that you set on the Symantec Scan Engine, the
Symantec Scan Engine indicates the scanning results to the VSCAN service after
a file is scanned. After the VSCAN service receives the scanning results, the file
is handled in the following way: Only clean files are passed to the requesting
user. If the file is infected, the user is denied access to the file, and the infected
file is quarantined.
determines which files to scan upon receiving a file from the VSCAN service.
The scanned files are those contained in archive or container file formats. You
can control which embedded files are scanned by using the file type and
extension exclusion list, or you can scan all files regardless of extension.
Note: Exclusion lists ensure that all file types are not scanned; therefore, new
types of viruses might not be detected. Scanning all files regardless of extension
and type is the most secure setting, but it imposes the heaviest demand on
resources. During virus outbreaks, you might want to scan all files even if you
normally control the file types that are scanned with the exclusion list.
For more information, see the Symantec Scan Engine Implementation Guide.
See “Specifying which file types to scan on the scan engine” on page 72.
Scan and delete Scan files for viruses, and delete any infected files
that are embedded in archive or container files
without trying to repair
Scan and repair files Try to repair infected files, but do nothing to
unrepairable files (that is, do not delete the files
from archive or container files).
Scan and repair or delete Try to repair infected files, and delete
unrepairable files from archive or container files
The Sun Storage 7000 Series NAS device does not support the repair of infected
files. Hence, it is recommended that you select the “Scan only” scan policy on
the Symantec Scan Engine administrative interface.
See “Configuring ICAP-specific options” on page 69.
Note: The configuration settings on each scan engine must be identical if you
use multiple scan engines to support scanning. LiveUpdate should be scheduled
to occur at the same time on all scan engines so that virus definitions are
consistent at all times.
The scan engine must be configured to use ICAP as the communication protocol.
ICAP is the default protocol at installation. After you have selected ICAP, you
can configure ICAP-specific options.
Option Description
Bind address Symantec Scan Engine detects all of the available IP addresses
that are installed on the host. By default, Symantec Scan
Engine accepts scanning requests on (binds to) all of the
scanning IP addresses that it detects. You can configure up to
64 IP addresses as scanning IP addresses.
You can specify whether you want Symantec Scan Engine to
bind to all of the IP addresses that it detects, or you can
restrict access to one or more interfaces. If you do not specify
at least one IP address, Symantec Scan Engine binds to all of
the scanning IP addresses that it detects.
If Symantec Scan Engine fails to bind to any of the selected IP
addresses, an event is written to the log as a critical error.
Even if Symantec Scan Engine is unable to bind to any IP
address, you can access the console. However, scanning
functionality is unavailable.
Note: You can use 127.0.0.1 (the loopback interface) to let only
the clients that are running on the same computer connect to
Symantec Scan Engine.
Port number The port number must be exclusive to Symantec Scan Engine.
For ICAP, the default port number is 1344. If you change the
port number, use a number greater than 1024 that is not in
use by any other program or service.
Scan policy When an infected file is found, Symantec Scan Engine can do
any of the following:
n Scan only: Scan files for viruses, but do nothing to
infected files. This setting is recommended.
n Scan and delete: Scan files for viruses, and delete any
infected files that are embedded in archive or container
files without trying to repair.
n Scan and repair files: Try to repair infected files, but do
nothing to irreparable files (that is, do not delete the files
from archive or container files).
n Scan and repair or delete: Try to repair infected files, and
delete irreparable files from archive or container files.
Note: If you choose the data trickle feature, the virus scan
policy is automatically set to Scan only.
Configuring Symantec AntiVirus™ for Sun Storage 7000 Series 71
About configuring Symantec Scan Engine
Option Description
Enable trickle This setting provides users with a quicker download response
and avoids possible session time-out errors. Data trickling is
disabled by default.
Note: The Sun Storage 7000 Series does not support the trickle
feature.
Time before trickle data You can specify how long the scan process should run before
starts data trickling begins.
Note: The Sun Storage 7000 Series does not support the trickle
feature.
The scan policy is automatically set to Scan only. However, enabling data
trickle can compromise antivirus integrity. The data that is trickled to the
user might contain a virus. You also cannot use the Quarantine feature when
you enable data trickling.
Note: The Sun Storage 7000 Series does not support the trickle feature.
For more information, see the Symantec Scan Engine Implementation Guide.
8 Type the number of seconds that the scan process should run before data
trickling begins.
The setting defaults to 5 seconds and can be up to a maximum of 86400
seconds.
9 On the toolbar, select one of the following:
Note: Symantec Scan Engine examines the first few bytes of every file to
determine whether the file could contain a virus. This action occurs even if the
file extension is not one that was identified for scanning. Based on this
examination, the scan engine may scan a file even though it has not been
identified for scanning.
For more information, see the Symantec Scan Engine Implementation Guide.
Configuring Symantec AntiVirus™ for Sun Storage 7000 Series 73
About configuring Symantec Scan Engine
See “About configuring virus scanning on the Sun Storage 7000 Series NAS
device” on page 78.
To scan all files except for those that are in the file extension exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file extension exclude list and the file
type exclude list are activated automatically.
4 Type each file extension that you want to add to the list on a separate line.
Use a period with each extension in the list.
5 To remove a file extension from the list, select it and delete it from the File
extension exclude list.
6 To restore the default file extension exclude list, in the left pane, under
Tasks, click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
To scan all file types except those in the file type exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
74 Configuring Symantec AntiVirus™ for Sun Storage 7000 Series
About configuring Symantec Scan Engine
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file type exclude list and the file
extension exclude list are activated automatically.
4 Type each file type you want to add to the list on a separate line.
To include all subtypes for a file type, use the wildcard character /*.
For more information on how to write the file types, see the Symantec Scan
Engine Implementation Guide.
5 To remove a file type from the list, select it and delete it from the File type
exclude list.
6 To restore the default file type exclude list, in the left pane, under Tasks,
click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
You can change the LiveUpdate base time. If you change the scheduled
LiveUpdate interval, the interval adjusts based on the LiveUpdate base time.
For more information on changing the base time, see the Symantec Scan Engine
Implementation Guide.
Warning: Rapid Release definitions do not undergo the same rigorous quality
assurance tests as LiveUpdate and Intelligent Updater definitions. Symantec
encourages users to rely on the full quality-assurance-tested definitions
whenever possible. Ensure that you deploy Rapid Release definitions to a test
environment before you install them on your network.
If you use a proxy or firewall that blocks FTP communications, the Rapid
Release feature does not function. Your environment must allow FTP traffic for
the FTP session to succeed.
You can schedule Rapid Release updates to occur automatically at a specified
time interval to ensure that Symantec Scan Engine always has the most current
definitions. Scheduled Rapid Release updates are disabled by default.
Note: You do not need to register the same scan engine with each Sun Storage
7000 Series NAS device. You can register different scan engines to different Sun
Storage 7000 Series NAS devices. However, all of the scan engines registered
with a Sun Storage 7000 Series NAS device must have identical configurations.
You register Symantec Scan Engine through the Virus Scan setup screen for the
VSCAN service. You must provide the IP address, the port number, and the
maximum number of simultaneous scan requests for each scan engine that is
used for scanning. The port number must match the port number that was
selected during the installation of Symantec Scan Engine.
Note: The virus scan functionality for each Sun Storage 7000 Series NAS device
accessing a scan engine must be configured identically to avoid inconsistency.
The scan results for infected files will be inconsistent if the settings differ for
each appliance.
Table 4-2 describes the settings that you should configure for virus scan
functionality.
Setting Description
Maximum file size to scan Select an upper limit for the size of files to be scanned.
The default setting is 1 GB.
Symantec Scan Engine can scan a maximum file size of
2048 MB (or 2GB).
Allow access to files that You can choose to allow or deny access to files that are
exceed maximum file size larger than the limit that is specified in Maximum file size
to scan.
Allowing access to files that have not been scanned can
make your network vulnerable to virus attacks.
Virus Scanning Engines In the fields Host and Port, type the IP address and the port
number of each scan engine to be used for scanning. Ensure
that the entered port number matches the one used while
installing the scan engine.
In the field Maximum Connections, specify the number of
concurrent scan requests that the scan engine can handle.
The default setting on the VSCAN service is 32. The similar
configurable option on the Symantec Scan Engine defaults
to 128.
Put a check mark against a Symantec Scan Engine under
the Enable field to activate it for scanning.
Each Sun Storage 7000 Series NAS device can support up to
four scan engines.
80 Configuring Symantec AntiVirus™ for Sun Storage 7000 Series
Recommendations while integrating multiple scan engines
Setting Description
File extensions scanned Select the file types to be passed to Symantec Scan Engine
for scanning.
You can use either an exclusion or an inclusion list, or you
can scan all files regardless of extension. This setting is
similar to the Files to scan setting on Symantec Scan
Engine. You must configure this setting on both the Sun
Storage 7000 Series NAS device and Symantec Scan Engine.
To add an extension to the exclusion list, select “Don’t Scan”
from the Action drop-down menu and specify the extension
in the “Pattern” field. To add an extension to the inclusion
list, select “Scan” from the Action drop-down menu and
specify the extension in the “Pattern” field.
The default setting “*” sends all file types regardless of
extension to the Symantec Scan Engine for scanning.
If the Symantec Scan Engine’s scanning results indicate that the file is infected,
then the VSCAN service quarantines the file. All access to the file is denied. You
can only view and delete the quarantined file in a file browser.
If one scan engine does not respond, the VSCAN service requests virus scanning
for a given file from other registered scan engines. If none respond, then file
access is denied.
n How Symantec Scan Engine works with BlueArc Storage System and
Hitachi High-performance NAS Platform
You have the following levels of control over which files are scanned:
You can control the files that are The NAS Server lets you specify by file extension the
initially submitted to the scan files that are to be passed to Symantec Scan Engine
engine by BlueArc Storage System for scanning. You configure the file types that you
or Hitachi High-performance NAS want to submit for scanning through the NAS Server
Platform for scanning. interface in accordance with the product
documentation.
See “About specifying the file extensions to be
scanned on the NAS Server” on page 98.
You can control the files that are The file extension exclusion list and the file type
embedded in archival file formats exclusion lists let you specify the file types and the file
(for example, .zip or .lzh files) that extensions that you do not want to scan. The file
are to be scanned by Symantec extensions exclusion list and the file type exclusion
Scan Engine. list achieve this purpose. You can also scan all file
types regardless of extension. You configure which
embedded files are scanned through the Symantec
Scan Engine administrative interface.
See “Specifying which embedded files to scan” on
page 92.
Scan and repair files Try to repair the infected file, and deny access
to any unrepairable file.
Scan and repair or delete Try to repair the infected file, and delete any
unrepairable file.
You can also configure the scan engine to quarantine unrepairable files.
See“About quarantining unrepairable infected files” on page 91.
includes the security identifier of the user and the IP address and host name of
the requesting computer.
The identification information supplements the information that is contained in
Infection Found log messages that are logged to the local logs, the Windows
Event Log, and SMTP. This information does not appear in the Infection Found
messages that are logged to SNMP or SSIM.
Note: Symantec Scan Engine can obtain only the information that is made
available by the NAS Server. In some cases, all or some of this information is not
available. The information that is obtained is reported in the related log entries.
Any identification information that is not obtained from the NAS Server is
omitted from the log messages and from the user notification window.
You also can configure Symantec Scan Engine to notify the requesting user that
the retrieval of a file failed because a virus was found. The notification message
only appears if the user uses a Windows computer.
The notification message includes the following:
n Date and time of the event
n File name of the infected file
n Virus name and ID
n Virus definition date and revision number
n Manner in which the infected file was handled (for example, the file was
repaired or deleted)
n Scan policy
n Disposition of the file (for example, infected)
n Duration of scan time and connection time
The Windows Messenger service must be running on the computer that is
running the Symantec Scan Engine and on the user’s computer to use the user
notification feature.
See “Notifying a requesting user that a virus was found” on page 90.
which the scan engine is to provide scanning and repair services meets this
requirement.
To use RPC, Symantec Scan Engine must be installed on a computer that is
running Windows 2000 Server/Windows 2003 Server/Windows 2008 Server.
The computer on which you plan to install Symantec Scan Engine must meet the
system requirements that are listed in the Symantec Scan Engine
Implementation Guide.
After you install Symantec Scan Engine, configure the NAS Server to work with
the scan engine.
See “About configuring BlueArc Storage System or Hitachi High-performance
NAS Platform” on page 97.
Option Description
RPC client list A single Symantec Scan Engine can support one or more EVSs.
Each EVS must be located in the same domain as Symantec Scan
Engine. You must provide the IP address of each EVS.
Check RPC Symantec Scan Engine maintains a connection with the EVS on
connection every __ the NAS Server. Symantec Scan Engine can be configured to check
seconds the connection with the EVS at a prescribed interval to ensure that
the connection is active. The default value is 20 seconds.
88 Configuring Symantec™ AntiVirus for BlueArc® Storage System and Hitachi® High-performance NAS Platform™, powered
by BlueArc®
Option Description
Maximum number You can configure Symantec Scan Engine to make a specified
of reconnect number of tries to re-establish a lost connection with the EVS. By
attempts default, Symantec Scan Engine is configured to try to reconnect
with the EVS indefinitely.
Antivirus scan You can configure Symantec Scan Engine to do one of the
policy following when an infected file is found:
n Scan only: Deny access to the infected file, but do nothing to
the infected file.
n Scan and repair files: Try to repair the infected file, and deny
access to any unrepairable file.
n Scan and repair or delete: Try to repair the infected file, and
delete any unrepairable file.
Note: You must select Scan and repair or delete if you plan to
quarantine the infected files that cannot be repaired. For more
information, see the Symantec Scan Engine Implementation Guide.
Automatically send You can configure Symantec Scan Engine to automatically notify
antivirus update BlueArc Storage System and Hitachi High-performance NAS
notifications Platform when new virus definitions are used.
5 To add an EVS to the list of RPC clients, type the IP address of the EVS for
which Symantec Scan Engine should provide scanning services.
Type one entry per line.
6 To delete an EVS from the list of RPC clients, select and delete the IP address
of the EVS.
7 On the toolbar, select one of the following:
3 In the right pane, under Log Windows Messenger, check Enable Windows
Messenger Logging.
User notification is disabled by default.
4 On the toolbar, select one of the following:
Note: You must select “Scan and repair or delete” as the RPC scan policy to
forward files to the quarantine. The original infected file is deleted when a copy
of an infected file is forwarded to the quarantine. If submission to the
quarantine is not successful, the original file is not deleted, and an error
message is returned to the NAS Server. Access to the infected file is denied.
See “Configuring RPC protocol options” on page 87
Symantec Scan Engine is configured by default to scan all files. The file type and
file extension exclusion lists are prepopulated with the file types that are
unlikely to contain viruses, but you can edit this list.
Note: During virus outbreaks, you might want to scan all files even if you
normally control the file types that are scanned with the file type or file
extension exclusion list.
To scan all files except for those that are in the file extension exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
On activating this option, both the file extension exclude list and the file
type exclude list gets activated automatically.
4 Type each file extension that you want to add to the list on a separate line.
Use a period with each extension in the list.
94 Configuring Symantec™ AntiVirus for BlueArc® Storage System and Hitachi® High-performance NAS Platform™, powered
by BlueArc®
5 To remove a file extension from the list, select it and delete it from the File
extension exclude list.
6 To restore the default file extension exclude list, in the left pane, under
Tasks, click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
To scan all file types except those in the file type exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you activate this option, both the file type exclude list and the file
extension exclude list are activated automatically.
4 Type each file type that you want to add to the list on a separate line.
To include all subtypes for a file type, use the wildcard character /*.
For more information on how to write the file types, see the Symantec Scan
Engine Implementation Guide.
5 To remove a file type from the list, select it and delete it from the File type
exclude list.
6 To restore the default file type exclude list, in the left pane, under Tasks,
click Reset Default List.
This option restores the default file type exclude list and the file extension
exclude list.
Configuring Symantec™ AntiVirus for BlueArc® Storage System and Hitachi® High-performance NAS Platform™, powered 95
by BlueArc®
Warning: Rapid Release definitions do not undergo the same rigorous quality
assurance tests as LiveUpdate and Intelligent Updater definitions. Symantec
encourages users to rely on the full quality-assurance-tested definitions
whenever possible. Ensure that you deploy Rapid Release definitions to a test
environment before you install them on your network.
If you use a proxy or firewall that blocks FTP communications, the Rapid
Release feature does not function. Your environment must allow FTP traffic for
the FTP session to succeed.
You can schedule Rapid Release updates to occur automatically at a specified
time interval to ensure that Symantec Scan Engine always has the most current
definitions. Scheduled Rapid Release updates are disabled by default.
The main virus scanning parameters that you should configure can be found in
the “Virus Scanning” window under the Data Protection section in the Home
page.
About verifying that the scan engine is registered with the NAS
Server
You can verify that the scan engine is registered with the NAS Server after you
install Symantec Scan Engine. Registration is automatic if you have provided
the correct information to Symantec Scan Engine for contacting the EVS.
Registration occurs when Symantec Scan Engine connects to the EVS. The
“Registered Virus Scanners” field in the NAS Server’s administrative interface
contains the names of the registered scan engines. Ensure that at least one
registered scan engine is present to be assured of virus protection for each EVS.
Note: The service startup properties for Symantec Scan Engine must be changed
to identify an account that has the appropriate permissions on the EVS. If the
change has not been done, the scan engine cannot register with the EVS because
it does not have sufficient permission.
See “Editing the service startup properties” on page 86.
To rollback to the default inclusion list, click “Reset Defaults.” To scan all file
types irrespective of extensions, check “Scan All File Types.” The highest level
of protection is achieved by scanning all file types; however, viruses are found
only in those file types that contain executable code. So, every file type need not
be scanned. You can save bandwidth and time by limiting the files to be scanned
to only those file types that can contain viruses.
For more information, see the appropriate NAS Server documentation.
n How Symantec Scan Engine works with the Hitachi Essential NAS Platform
Scan and delete Scan files for viruses, and delete any infected
files that are embedded in archive or container
files without trying to repair
Scan and repair files Try to repair the infected file, and deny access
to any irreparable file.
Scan and repair or delete Try to repair the infected file, and delete any
irreparable file.
You can also configure the scan engine to quarantine irreparable files.
Note: If you use multiple scan engines to support scanning, the configuration
settings on each scan engine must be identical. LiveUpdate and Rapid Release
should be scheduled to occur at the same time on all scan engines so that virus
definitions are consistent at all times.
The scan engine must be configured to use ICAP as the communication protocol.
ICAP is the default protocol at installation. After you have selected ICAP, you
can configure ICAP-specific options.
Option Description
Bind address Symantec Scan Engine detects all of the available IP addresses
that are installed on the host. By default, Symantec Scan Engine
accepts scanning requests on (binds to) all of the scanning IP
addresses that it detects. You can configure up to 64 IP addresses
as scanning IP addresses.
You can specify whether you want Symantec Scan Engine to bind
to all of the IP addresses that it detects, or you can restrict access
to one or more interfaces. If you do not specify at least one IP
address, Symantec Scan Engine binds to all of the scanning IP
addresses that it detects.
If Symantec Scan Engine fails to bind to any of the selected IP
addresses, an event is written to the log as a critical error. Even if
Symantec Scan Engine is unable to bind to any IP address, you can
access the console. However, scanning functionality is
unavailable.
You can use 127.0.0.1 (the loopback interface) to let only the
clients that are running on the same computer connect to
Symantec Scan Engine.
Port number The port number must be exclusive to Symantec Scan Engine. The
default port number for ICAP is 1344. If you change the port
number, use a number greater than 1024 that is not in use by any
other program or service.
Scan policy When an infected file is found, Symantec Scan Engine can do any
of the following:
n Scan only: Scan files for viruses, but do nothing to infected
files.
n Scan and delete: Scan files for viruses, and delete any
infected files that are embedded in archive or container files
without trying repair.
n Scan and repair files: Try to repair infected files, but do
nothing to irreparable files (that is, do not delete the files
from archive or container files).
n Scan and repair or delete: Try to repair infected files, and
delete irreparable files from archive or container files.
Note: If you choose the data trickle feature, the virus scan policy is
automatically set to Scan only.
Configuring Symantec™ AntiVirus for Hitachi® Essential NAS Platform™ 105
About configuring Symantec Scan Engine
Option Description
Enable trickle This setting provides users with a quicker download response and
avoids possible session timeout errors. Data trickling is disabled
by default.
Time before trickle You can specify how long the scan process should run before data
data starts trickling begins.
Note: Symantec Scan Engine examines the first few bytes of every file to
determine whether the file could contain a virus. This action occurs even if the
file extension is not one that was identified for scanning. Based on this
examination, the scan engine may scan a file even though it has not been
identified for scanning.
For more information, see the Symantec Scan Engine Implementation Guide.
To scan all files except for those that are in the file extension exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
Configuring Symantec™ AntiVirus for Hitachi® Essential NAS Platform™ 107
About configuring Symantec Scan Engine
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file extension exclude list and the file
type exclude list are activated automatically.
4 Type each file extension that you want to add to the list on a separate line.
Use a period with each extension in the list.
5 To remove a file extension from the list, select it and delete it from the File
extension exclude list.
6 To restore the default file extension exclude list, in the left pane, under
Tasks, click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
To scan all file types except those in the file type exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file type exclude list and the file
extension exclude list are activated automatically.
4 Type each file type you want to add to the list on a separate line. To include
all subtypes for a file type, use the wildcard character /*.
For more information on how to write the file types, see the Symantec Scan
Engine Implementation Guide.
5 To remove a file type from the list, select it and delete it from the File type
exclude list.
6 To restore the default file type exclude list, in the left pane, under Tasks,
click Reset Default List.
108 Configuring Symantec™ AntiVirus for Hitachi® Essential NAS Platform™
About configuring Symantec Scan Engine
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
n The maximum file size, in megabytes, for the individual files that are in a
container file
n The maximum number of nested levels to decompose for scanning
n The maximum number of bytes that are read when determining whether a
file is MIME-encoded
You can specify whether to allow or deny access to the file if any of these
specified limits is met or exceeded.
Symantec Scan Engine blocks container files based on their type, because only
certain file types contain virus or malicious code. You can configure Symantec
Scan Engine to block partial container files, malformed container files, and
encrypted container files as well.
For more information on container handling limits, see the Symantec
ScanEngine Implementation Guide.
You can select from 2, 4, 8, 10, 12, or 24-hour intervals. The default
LiveUpdate interval is 2 hours.
5 On the toolbar, select one of the following:
Scan and delete Scan files for viruses, and delete any infected
files that are embedded in archive or container
files without trying to repair
Scan and repair files Try to repair the infected file, and deny access
to any irreparable file.
Scan and repair or delete Try to repair the infected file, and delete any
irreparable file.
You can also configure the scan engine to quarantine irreparable files.
Note: If you use multiple scan engines to support scanning, the configuration
settings on each scan engine must be identical. LiveUpdate and Rapid Release
should be scheduled to occur at the same time on all scan engines so that virus
definitions are consistent at all times.
The scan engine must be configured to use ICAP as the communication protocol.
ICAP is the default protocol at installation. After you have selected ICAP, you
can configure ICAP-specific options.
Option Description
Bind address Symantec Scan Engine detects all of the available IP addresses
that are installed on the host. By default, Symantec Scan Engine
accepts scanning requests on (binds to) all of the scanning IP
addresses that it detects. You can configure up to 64 IP addresses
as scanning IP addresses.
You can specify whether you want Symantec Scan Engine to bind
to all of the IP addresses that it detects, or you can restrict access
to one or more interfaces. If you do not specify at least one IP
address, Symantec Scan Engine binds to all of the scanning IP
addresses that it detects.
If Symantec Scan Engine fails to bind to any of the selected IP
addresses, an event is written to the log as a critical error. Even if
Symantec Scan Engine is unable to bind to any IP address, you can
access the console. However, scanning functionality is
unavailable.
You can use 127.0.0.1 (the loopback interface) to let only the
clients that are running on the same computer connect to
Symantec Scan Engine..
Port number The port number must be exclusive to Symantec Scan Engine. The
default port number for ICAP is 1344. If you change the port
number, use a number greater than 1024 that is not in use by any
other program or service.
Scan policy When an infected file is found, Symantec Scan Engine can do any
of the following:
n Scan only: Scan files for viruses, but do nothing to infected
files.
n Scan and delete: Scan files for viruses, and delete any
infected files that are embedded in archive or container files
without trying repair.
n Scan and repair files: Try to repair infected files, but do
nothing to irreparable files (that is, do not delete the files
from archive or container files).
n Scan and repair or delete: Try to repair infected files, and
delete irreparable files from archive or container files.
Note: If you choose the data trickle feature, the virus scan policy is
automatically set to Scan only.
Configuring Symantec™ AntiVirus for ONStor EverON 115
About configuring Symantec Scan Engine
Option Description
Enable trickle This setting provides users with a quicker download response and
avoids possible session timeout errors. Data trickling is disabled
by default.
Time before trickle You can specify how long the scan process should run before data
data starts trickling begins.
Note: Symantec Scan Engine examines the first few bytes of every file to
determine whether the file could contain a virus. This action occurs even if the
file extension is not one that was identified for scanning. Based on this
examination, the scan engine may scan a file even though it has not been
identified for scanning.
For more information, see the Symantec Scan Engine Implementation Guide.
To scan all files except for those that are in the file extension exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
Configuring Symantec™ AntiVirus for ONStor EverON 117
About configuring Symantec Scan Engine
When you enable this option, both the file extension exclude list and the file
type exclude list are activated automatically.
4 Type each file extension that you want to add to the list on a separate line.
Use a period with each extension in the list.
5 To remove a file extension from the list, select it and delete it from the File
extension exclude list.
6 To restore the default file extension exclude list, in the left pane, under
Tasks, click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
To scan all file types except those in the file type exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file type exclude list and the file
extension exclude list are activated automatically.
4 Type each file type you want to add to the list on a separate line. To include
all subtypes for a file type, use the wildcard character /*.
For more information on how to write the file types, see the Symantec Scan
Engine Implementation Guide.
5 To remove a file type from the list, select it and delete it from the File type
exclude list.
6 To restore the default file type exclude list, in the left pane, under Tasks,
click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
118 Configuring Symantec™ AntiVirus for ONStor EverON
About configuring Symantec Scan Engine
Table 7-2 describes the directory containing the VirusScan applet executable
and its associated files.
File Description
ONStorVirusScanApplet.exe Application
The VirusScan applet file is an XML file that enables you to specify the
Symantec Scan Engine IP address and ICAP port number for the applet to use. If
no alternate configuration file is available, the applet uses the Symantec Scan
Engine on the designated default machine, 127.0.0.1, and it uses the default
ICAP port, 1344. The following example shows the applet with the default IP and
ICAP port specified:
Note: If you do not use the default port for ICAP, you need to specify the port
number in the applet configuration file.
<ONStorVirusScanApplet>
<LogFile mode="disable" name="VScanApplet.log" />
<Resource MaxNumberofParallelFileScanning="100" />
<ScanEngine>
<Symantec>
<Engine IP="127.0.0.1" Port="1344" />
</Symantec>
</ScanEngine>
</ONStorVirusScanApplet>
122 Configuring Symantec™ AntiVirus for ONStor EverON
About configuring the ONStor VirusScan Applet
n You can configure the applet so that Symantec Scan Engine writes a scan log
to a log file in the same directory in which the applet is installed. The applet
shown previously includes a log-file entry that is disabled.
n If you specify the log file mode by replacing disable in the shown code with
enable, the applet creates a log file or writes to the existing log file either in the
current directory or in a path you provide within the applet.
n If the log file mode is set to disable, the applet sends output to the console only.
If the current log file reaches the maximum size of 5MB, the file is automatically
renamed (for example, from applet.log to an older version log file, such as
applet.log.old). If an older version already exists, the newer version
overwrites the older version, and new incoming messages are written to the
active log file.
n You can configure the applet to scan a number of files concurrently. The
MaxNumberOfParallelScanning parameter in the configuration file
specifies the maximum number of files the applet can scan concurrently.
The default is 100.
n If you want the applet to use more than one Symantec Scan Engine, add the
IP addresses for each into the configuration file so the client library can
automatically load balance over the virus scan engines. The following
example shows an applet using two Symantec Scan Engines, 10.2.14.150
and 10.2.14.151. Both use the default port, 1344.
<ONStorVirusScanApplet>
<LogFile mode="enable" name="VScanApplet.log" />
<Resource MaxNumberofParallelFileScanning="100" />
<ScanEngine>
<Symantec>
<Engine IP="10.2.14.150" Port="1344" />
<Engine IP="10.2.14.151" Port="1344" />
</Symantec>
</ScanEngine>
</ONStorVirusScanApplet>
Chapter 8
Configuring Symantec
AntiVirus™ for EMC®
Celerra™ Network Server
This chapter includes the following topics:
n How Symantec Scan Engine works with EMC Celerra Network Server
Symantec Scan Engine Provides the virus scanning and repair services.
For more information, see the Symantec Scan Engine
Implementation Guide.
CAVA or Celerra Anti Virus Agent Provides the virus scanning functionality and ensures
the seamless integration of Symantec Scan Engine
with EMC Celerra Network Server.
See “About installing the Celerra Anti Virus Agent” on
page 136
Use the CAVA calculator to estimate the number of
Celerra Anti Virus Agents for your network.
For more information on the CAVA calculator, see the
appropriate EMC Celerra documentation.
Virus-checking client (VC client) Queues file names to the Celerra Anti Virus Agent. It
is the agent component on EMC Celerra Network
Server.
See “About configuring virus scanning on EMC
Celerra Network Server” on page 137.
For more information on the CAVA sizing tool, see the appropriate EMC Celerra
documentation.
EMC Celerra Network Server handles load balancing across multiple scan
engines and Celerra Anti Virus Agents automatically.
When the user tries to open a file, the Celerra Anti Virus Agent compares the
file’s access time with a reference time. This reference time is stored in the virus
checker configuration file found on EMC Celerra Network Server. If the file
access time is before the reference time, then the file is scanned on read. The
reference time can be set or disabled by the “server_viruschk” command.
The Celerra Anti Virus Agent informs the Celerra Network Server to set the
access time each time the virus definition files are updated on Symantec Scan
Engine.
For more information, see the appropriate EMC Celerra documentation.
using the file type and extension exclusion list, or you can scan all files
regardless of extension.
Note: Exclusion lists ensure that all file types are not scanned; therefore, new
types of viruses might not be detected. Scanning all files regardless of extension
and type is the most secure setting, but it imposes the heaviest demand on
resources. During virus outbreaks, you might want to scan all files even if you
normally control the file types that are scanned with the exclusion list.
For more information, see the Symantec Scan Engine Implementation Guide.
See “Specifying which file types to scan on the scan engine” on page 131.
Scan and delete Scan files for viruses, and delete any infected files
that are embedded in archive or container files
without trying to repair
Scan and repair files Try to repair infected files, but do nothing to
unrepairable files (that is, do not delete the files
from archive or container files).
Scan and repair or delete Try to repair infected files, and delete
unrepairable files from archive or container files
Note: The configuration settings on each scan engine must be identical if you
use multiple scan engines to support scanning. LiveUpdate and Rapid Release
should be scheduled to occur at the same time on all scan engines so that virus
definitions are consistent at all times.
The scan engine must be configured to use ICAP as the communication protocol.
ICAP is the default protocol at installation. After you have selected ICAP, you
can configure ICAP-specific options.
Option Description
Bind address Symantec Scan Engine detects all of the available IP addresses
that are installed on the host. By default, Symantec Scan
Engine accepts scanning requests on (binds to) all of the
scanning IP addresses that it detects. You can configure up to
64 IP addresses as scanning IP addresses.
You can specify whether you want Symantec Scan Engine to
bind to all of the IP addresses that it detects, or you can
restrict access to one or more interfaces. If you do not specify
at least one IP address, Symantec Scan Engine binds to all of
the scanning IP addresses that it detects.
If Symantec Scan Engine fails to bind to any of the selected IP
addresses, an event is written to the log as a critical error.
Even if Symantec Scan Engine is unable to bind to any IP
address, you can access the console. However, scanning
functionality is unavailable.
Note: You can use 127.0.0.1 (the loopback interface) to let only
the clients that are running on the same computer connect to
Symantec Scan Engine.
Port number The port number must be exclusive to Symantec Scan Engine.
For ICAP, the default port number is 1344. If you change the
port number, use a number greater than 1024 that is not in
use by any other program or service.
Scan policy When an infected file is found, Symantec Scan Engine can do
any of the following:
n Scan only: Scan files for viruses, but do nothing to
infected files.
n Scan and delete: Scan files for viruses, and delete any
infected files that are embedded in archive or container
files without trying to repair.
n Scan and repair files: Try to repair infected files, but do
nothing to unrepairable files (that is, do not delete the
files from archive or container files).
n Scan and repair or delete: Try to repair infected files, and
delete unrepairable files from archive or container files.
Note: If you choose the data trickle feature, the virus scan
policy is automatically set to Scan only.
130 Configuring Symantec AntiVirus™ for EMC® Celerra™ Network Server
About configuring Symantec Scan Engine
Option Description
Enable trickle This setting provides users with a quicker download response
and avoids possible session time-out errors. Data trickling is
disabled by default.
Time before trickle data You can specify how long the scan process should run before
starts data trickling begins.
Note: Symantec Scan Engine examines the first few bytes of every file to
determine whether the file could contain a virus. This action occurs even if the
file extension is not one that was identified for scanning. Based on this
examination, the scan engine may scan a file even though it has not been
identified for scanning.
For more information, see the Symantec Scan Engine Implementation Guide.
See “About configuring virus scanning on EMC Celerra Network Server” on
page 137.
To scan all files except for those that are in the file extension exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
132 Configuring Symantec AntiVirus™ for EMC® Celerra™ Network Server
About configuring Symantec Scan Engine
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file extension exclude list and the file
type exclude list are activated automatically.
4 Type each file extension that you want to add to the list on a separate line.
Use a period with each extension in the list.
5 To remove a file extension from the list, select it and delete it from the File
extension exclude list.
6 To restore the default file extension exclude list, in the left pane, under
Tasks, click Reset Default List.
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
To scan all file types except those in the file type exclusion list
1 On the Symantec Scan Engine administrative interface, in the left pane,
click Policies.
2 Under Views, click Scanning.
3 In the right pane, under Files to Scan, click Scan all files except those in the
extension or type exclude lists.
When you enable this option, both the file type exclude list and the file
extension exclude list are activated automatically.
4 Type each file type you want to add to the list on a separate line.
To include all subtypes for a file type, use the wildcard character /*.
For more information on how to write the file types, see the Symantec Scan
Engine Implementation Guide.
5 To remove a file type from the list, select it and delete it from the File type
exclude list.
6 To restore the default file type exclude list, in the left pane, under Tasks,
click Reset Default List.
Configuring Symantec AntiVirus™ for EMC® Celerra™ Network Server 133
About configuring Symantec Scan Engine
This option restores the default file-type exclude list and the file-extension
exclude list.
7 On the toolbar, select one of the following:
n The maximum file size, in megabytes, for the individual files that are in a
container file
n The maximum number of nested levels to decompose for scanning
n The maximum number of bytes that are read when determining whether a
file is MIME-encoded
You can specify whether to allow or deny access to the file if any of these
specified limits is met or exceeded.
Symantec Scan Engine blocks container files based on their type, because only
certain file types contain virus or malicious code. You can configure Symantec
Scan Engine to block partial container files, malformed container files, and
encrypted container files as well.
For more information on container handling limits, see the Symantec Scan
Engine Implementation Guide.
Warning: Rapid Release definitions do not undergo the same rigorous quality
assurance tests as LiveUpdate and Intelligent Updater definitions. Symantec
encourages users to rely on the full quality-assurance-tested definitions
whenever possible. Ensure that you deploy Rapid Release definitions to a test
environment before you install them on your network.
If you use a proxy or firewall that blocks FTP communications, the Rapid
Release feature does not function. Your environment must allow FTP traffic for
the FTP session to succeed.
You can schedule Rapid Release updates to occur automatically at a specified
time interval to ensure that Symantec Scan Engine always has the most current
definitions. Scheduled Rapid Release updates are disabled by default.
Note: You do not need to register the same scan engine to each EMC Celerra
Network Server in the group. You can register different scan engines to different
EMC Celerra Network Servers in the group. All of the scan engines in the same
group must have identical configurations.
Table 8-2 describes some parameters that you should configure in the
viruschecker.conf file for virus scan functionality.
Parameter Description
excl= Specify the file types that should not be passed to Symantec
Scan Engine for scanning. This parameter defines the
exclusion list.
This setting is similar to the Files to scan setting on
Symantec Scan Engine. You must configure this setting on
both EMC Celerra Network Server and Symantec Scan
Engine.
highWaterMark=<n> Specify the upper limit for the number of scan requests
occurring concurrently.
Once this limit is reached, a log event is sent to EMC Celerra
Network Server. The default value is 200.
lowWaterMark=<n> Specify the lower limit for the number of scan requests
occurring concurrently.
If the number of scan requests goes below the
lowWaterMark value, a log event is sent to EMC Celerra
Network Server. The default value is 50.
Configuring Symantec AntiVirus™ for EMC® Celerra™ Network Server 139
About configuring EMC Celerra Network Server
Parameter Description
Note: The virus scan functionality for each EMC Celerra Network Server in a
group must be configured identically to avoid inconsistency. The scan results
and repair results for infected files will be inconsistent if the settings differ for
each EMC Celerra Network server in the group. Thus, it is necessary that the
same viruschecker.conf file be copied to the correct directory and to each EMC
Celerra Network Server in the group.
Install the Celerra Anti Virus Agent on each server that functions as the scan
engine in the domain.
For more information on installing the Celerra Anti Virus Agent, see the
appropriate EMC Celerra documentation.
Virus Agent for scanning. The VC client also informs Symantec Scan Engine
what should be done with an infected file, based on user- configured options.
A RPC 86
RPC client list 87
antivirus scan policy
scan all file types 99
configure 33, 89
software components 82
RPC option 32
specify file extensions 98
scan and repair files 32
specifying files to scan 92
scan and repair or delete 32
system requirements 85
scan only 32
unavailable scan engines 99
antivirus scanning 17
unresponsive scan engines 99
antivirus update notification
user notification of infection found 84, 90
automatic 32
verify scan engine registration 98
B C
Bloodhound 18
CAVA 124
BlueArc
CAVA sizing tool 124
Storage System 13
Celerra Anti Virus Agent
BlueArc Storage System 13
installing 136
BlueArc Storage System and Hitachi High-
sending files for scanning 131
performance NAS Platform
virus-checking rights 136
activate virus scanning 98
Celerra Network Server 13, 14
add antivirus scanning 82
CIFS 26, 102
antivirus scan policy 88
Common Internet File System 26, 102
automatically send antivirus update
configure AntiVirus setup screen 61
notifications 88
connector
check RPC connection 87
about 12, 13
configuring for virus scanning 97
container files 17
configuring scan engine 86
container handling limits 57, 75, 133
connecting to Symantec Scan Engine 83
edit NAS Server list 88
editing service startup properties 86 D
enable virus scanning 98 Data ONTAP 26, 29, 42
file scanning 83 decomposer 17
file type scanning 83 denial-of-file access 137
firmware version 85, 97 denial-of-service attack 17, 57, 75
full file system scan 99 documentation
handling infected files 84 Symantec AntiVirus for Network Attached
maximum number of reconnect attempts 88 Storage Integration Guide 14
overview of virus scanning 82 Symantec Scan Engine Implementation
protocol 82 Guide 14
quarantining infected files 91
registered virus scanners 98
reset defaults 99
142 Index
V
VC client 137
146 Index