Home

15 Endpoint Protector - Installation Guide 3.0.5.3 ENGLISH

image

Contents

1. w root ubuntu homey e root ubuntu home endpoint Downloads eppinstaller File Edit View Termina Help CoSoSys Ltd Endpoint Protector Servei This process will install or upgrade the required software automatically Do you wish to continue Y N lt Yes gt i root ubuntu home e 34 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller or ServerName Setting up php5 common 5 2 10 dfsg 1 2ubuntu6 3 Setting up Libapache2 mod php5 5 2 10 dfsg 1 2ubuntu6 3 Creating config file etc php5 apache2 php ini with new version Reloading web server config apache2 apache2 Could not reliably determine the server s fully qualified domain name using 127 0 1 1 f or ServerName I OK Setting up phpS 5 2 10 dfsg 1 2ubuntu6 3 Selecting previously deselected package php5 mysql Reading database 117534 files and directories currently installed Unpacking php5 mysql from php5 mysql 5 2 16 dfsg 1 2ubuntu6 3 i386 deb Setting up php5 mysql 5 2 10 dfsg 1 2ubuntu6 3 Selecting previously deselected package php5 xsl Reading database 117541 files and directories currently installed Unpacking php5 xsl from php5 xsl 5 2 10 dfsg 1 2ubuntu6 3 i386 deb Setting up phpS xsl 5 2 10 dfsg 1 2ubuntu6 3 Selecting previously deselected package php5 ldap Reading database 117544 files and directori
2. Gl root ubuntu fhome e root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer 3 3 3 The installation has completed successfully Zend Optimizer is now ready for use You must restart your Web server for the modifications to take effect w root ubuntu home e 42 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help w fs root ubuntu home e Zend Optimizer 3 3 3 Restart the Web server now root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Hi root ubuntu home e Zend Optimizer 3 3 3 Please specify the full path to the Apache configuration file httpd conf etc apache2 httpd conti lt OK gt lt Cancel gt 43 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help cend Optimizer 3 3 3 Apache has restarted successfully w root ubuntu fhomey e 2 3 3 Installation of Endpoint Protector files root ubuntu home endpoint Downloads eppinstalier File Edit View Terminal Help CoSoSys Ltd Endpoint Protector Server Please select option 1 4 or press lt Cancel gt to exit Install System Requirements Software Automated 2 Install System Requirements Software Advanced MiInstall Endpoint Protector Software Conf
3. Start gt Programs gt Microsoft SQL Server 2005 gt SQL Server Management Studio Express Connect to the Database Engine using Windows Authentication default settings lt Microsoft SQL Server Management Studie Express Ble Edt View Tools Window Community Help i D New Query D ae Gl al i BB Object Explorer 9 Endpoint Protector Installation Guide 2 1 8 Create a new database user To create a new database user follow these steps From the SQL Server Management Studio Express access the Security folder then right click Logins folder and select New Login RS Microsoft SQL Server Management Studio Express File Edit View Tools Window Community Help Dire Fa a DOBBS Object Explorer 1 XIE Has AY i W20035E 5QLEXPRESS SQL Server 9 0 3042 Ww Databases E 0a Security Logi WZ0035E SQLEXPRESS SecurityiLogins 5 Item s Serv AD nts l E Crec 2 eas Server C Refresh Name Created Replicati AE BUILTIN Administrators 7 18 2008 Management NS BUILTIN Users 7 18 2008 amp NT AUTHORITY SYSTEM 7 18 2008 Asa 4 3 2003 Anj W2003SE SQLServer2005MSSQLUser w20035E 5 7 18 2008 From the New Login window choose SQL Server authentication and type in the login name epp for this new user and the correspondent password for this database user Uncheck all options Enforce password expiration User must change password at next login etc 10 Endpoint Protect
4. Installation Guide epp localhost home epp Fle Edit View Terminal Tabs Help gt Running transaction check gt Package mysql libs x86 64 0 5 0 5la 1 fc9 set to be updated gt Package php pdo x86 64 0 5 2 6 2 fc9 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Version Repository Installing php mysgl x86 64 5 2 6 2 fc9 updates Installing for dependencies mysgl libs x86 64 php pdo x86 64 5 6 5la 1 fc3 fedora 5 2 6 2 fc9 updates Transaction Summary Install 3 Package s Update Package s Remove Package s Total download sive 1 7 M Is this ok y N yf yum install php soap epp localhost home epp File Edit View Terminal Tabs Help Loaded plugins refresh packagekit Setting up Install Process Parsing package install arguments Resolving Dependencies gt Running transaction check gt Package php soap x86 64 0 5 2 6 2 fc9 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Version Repository Installing php soap x86 64 5 2 6 2 7c9 updates Transaction Summary Install 1 Package s Update Package s Remove Package s Total download size 141 k Is this ok y N yj yum install php xml 58 Endpoint Protector Installation Guide epp localhost home epp File Edit View Terminal Tabs Help Loaded plugins refresh packagekit Setting up Install Process Parsing package install argumen
5. even though you have already connected devices to the client then please check you firewall settings See System Requirements for the Client 2 2 Login Credentials to Endpoint Protector Server The default username and password for the Endpoint Protector Server 2009 are USERNAME root PASSWORD epp2009 To change the user name and password and to create additional administrators please see paragraph Error Reference source not found in the Endpoint Protector User Manual 30 Endpoint Protector Installation Guide 2 3 Linux Server Installation Debian Ubuntu In order to install Endpoint Protector 2009 under Linux you will need an Internet connection The reason for this is that the installer downloads all needed components MySQL PHP OpenSSL etc directly from the Internet and also configures them automatically This saves space and time If you have already installed some components such as PHP then the installer will simply update your existing settings and register the required extensions needed for Endpoint Protector Please follow these detailed next steps for a successful install After you have received the ZIP file from your Endpoint Protector Customer representative Create a folder and name it eppInstaller and save the zip file inside Unzip the archive into the same folder unzip EndpointProtectoDebianServerSetup zip Run the shell script install sh located in that folder sudo insta
6. http support microsoft com ph 2855 2 1 10 Install IIS version 6 0 on Windows Server 2003 Install IIS if not already present You can check if IIS is installed by going to Start gt Run and typing in inetmgr If the Internet Information Services IIS Manager opens than means you have IIS already installed In case IIS is not installed you will need the Windows Server 2003 CD DVD Follow these steps 15 Endpoint Protector Installation Guide Go to Start gt Settings gt Control Panel gt Add or Remove Programs gt Add Remove Windows Components From the Windows Components Wizard select Application Server and click on Details FS Add or Remove Programs 6 Currently installed programs Show updates Sort by Mame Change ot Windows Components Wizard l ef Remove a Programs windows Components anh You can add or remove components of Windows Ps Progrannis To add or remove a component click the checkbox A shaded box means that only cea part of the component aill be installed To see what s included i ina component click Details Components eee Size 266 00MB ie JMi A Accessories and Utilities a Size 4 18MB Components p E Application Server O A Cerificate Services E mail Services i ae Size 0 67MB 7 A Fas Services Di escription Includes ASP NET Intemet Information Services mis and the Applicat tion Server Console 7 Size 22 60ME Size 1 30M Si
7. 2 x Version 2 2 8 Installed Checking for Apache mod ssl module version 2 x Not installed Checking for MySQL Server Not installed Checking for PHP version 5 2 3 or higher Not installed Checking for OpenSSL version 0 9 8g Version 6 9 89 Installed Checking for PHP module mysql Not installed Checking for PHP module soap Not installed Checking for PHP module xml Not installed Checking for PHP module mbstring 50 Endpoint Protector Installation Guide 2 Installing the software required Automated recommended on systems where the installation update of the following software will not inflict existing application Apache Web Server 2 x PHP 5 2 3 php mysgl php soap php xml php mbstring php xmlrpc OpenSSL 0 9 8 g MySQL Server 5 x epp localhost home epp Desktop EndpointProtector RedHatz2 2 2 File Edit View Terminal Tabs Help i a a a a eS a a a a cs a a ca ce A Endpoint Protector Installation RedHat Edition i EEEE SS a Install System Requirements Software Automated Installing required software epp localhost home epp Desktop EndpointProtector RedHat 2 2 2 File Edit view Terminal Tabs Help Done Press lt ENTER gt key to continue 51 Endpoint Protector Installation Guide 3 Installing the software required Advanced recommended for users with advanced knowledge about Linux Admin
8. 3 Client Installation sssssassensensnnsenrnsrnnns 71 3 1 Client Installation on WiINdOWS siisiiiosstocriorncreternceranmncesoomes 71 3 2 Client instalation 0N Mac OS a ccseansecsuegnsraessengeceerensrceeeene 73 3 3 Remote Deployment of Endpoint Protector Client 80 3 4 Command line client installation sssssssssssssnsrssrnrsrrsrenens 90 4 Installing Root Certificate to your Internet DrOWGEl o arserewverseseervesenrvasdesaneavauaeseuse 91 4 1 FOr Microsoft Internet Explorer sscessdinnisinceesiuieduiiaceseaniumnns 91 4 2 For Mozilla Firefox ccccecceuceesccceueeeucceueeseuueueensuuuueensaggs 97 DSU DOE eeaeee ariar cries 99 6 Important Notice Disclaimer 05 100 Operating system x86 Windows 2003 Server SP1 or other Windows with IIS version 6 0 or higher Windows 2008 and Windows Small Business Edition 2008 Linux based Debian or Ubuntu are recommended since installation routines are optimized for this particular OS Other compatible Linux based systems are Red Hat Fedora and other distributions Unix based FreeBSD etc Administrative rights on the Server Apache web server with PHP version 5 2 3 or higher or IIS version 6 0 or higher PHP as ISAPI module PHP CLI MySQL database or MSSQL database MSSQL 2005 Express OpenSSL Net Framework 2 0 2 GHz processor or faster recommended Minimum of 512 MB RAM 2 Endpoint Protector Installation Guide Tota
9. Computer Hate ime 16 Seap 13 59 sandisk Conporation Us Gruzer Micro Widaets Address Book Gueho Calculator l FR erate Endpoint Protec ESPN Fliaht Tracker For Offline Device Authorization please enter the ID provided by your Administrator Based on this ID a temporary password will be generated inside the Endpoint Protector Server which will be sent to you by your Administrator This password must be entered in the Device Authorization window as shown in the screenshot below for being able to access offline the devices connected to your MAC Endpoint Devices Connected to this Computer Protector tins bevice AuTioreation Devine SanDisk Corporation US Gruzer Micro A440 Password Back Enter password Manage Widgets Widaets Address Book Business Calculator Dictionary Endpoint Protec ESPN Fliaht Tacker 80 Endpoint Protector Installation Guide 3 3 Remote Deployment of Endpoint Protector Client Info The following deployment of clients can be also done over the Endpoint Protector Reporting and Administration Tool web interface Please follow the user manual and the wizard instructions for this enhanced deployment feature You can automatically install Endpoint Protector Client for all your network computers through Active Directory and Group Policy Objects This can be done by following the next steps 1 Copy the files EPPClientSetup_x86_32 msi and EPPClientSetup_x86_64 msi
10. Enables th Coordinate Resolves a Collects st Enables ev Allows Files Enables He This servic Enables ge Enables thi Manages C Indexes co Enables me Provides e On domain Monitors 4 Detects an Configures Transmits Manages s Maintains 4 Enables NE Enables an Manages o Provides n Manages D Collects an Manages X Provides s Started Started Started Started Started Started Started Started Started Started Started Started Started Started Started Started Automatic Automatic Automatic Manual Automatic Disabled Automatic Automatic Automatic Automatic Manual Automatic Manual Disabled Automatic Disabled Disabled Disabled Automatic Disabled Disabled Automatic Manual Disabled Manual Manual Automatic Disabled Manual Disabled Disabled Manual Manual Manual Local System Local System Network 5 Local System Local System Local System Network 5 Network S Local System Local System Local System Local System Local System Local System Local System Local System Local System Local System Local System Local System Network S Local System Local System Local System Local System Local System Local System Local System Local System Local System Local System Local System Local System Local System I eS 2 Open a browser and go to https 1
11. Management Studio Express Setup i x Feature Selection Select the program Features you want installed Click an icon in the Following list bo change how a Feature is installed Management Studio Ex Dress Feature description Installs interactive management tools For running SQL Server including SOL Server Management Studio Express Installation path C Program Files Microsoft SQL Server Browse Disk Cost cok meas cael Leave default settings When the installation is completed click Finish 2 1 6 Modify the settings for MS SQL connections Attention Please assure TCP IP and Named Pipes are enabled in the SQL Configuration tool To do this go to Start gt Programs gt Microsoft SQL Server 2005 gt Configuration Tools gt SQL Server Configuration Manager Er SOL Server Configuration Manager File Aton view Help eI From the list on the left side select Protocols for SQLEXPRESS then set Named Pipes and TCP IP to enabled 8 Endpoint Protector Installation Guide 3 SOL Server Configuration Manager SQL Server Configuration Manager Local SQL Server 2005 Services E H SQL Server 2005 Network Configuration He Protocols for Enabled H E SQL Native Client Configuration x Die abled B Generat i Enabled No j Pipe Name Create a new user EPP and a database EPP by following these steps 2 1 7 Launch the SQL Server Management Studio
12. THE ZEND OPTIMIZER AS INSTALLED BY THIS INSTALLATION PROCESS IN MACHINE EXECUTABLE FORM ONLY AND ANY RELATED DOCUMENTATION COLLECTIVELY THE SOFTWARE BY INSTALLING OR OTHERWISE USING THIS SOFTWARE YOU THE LICENSEE ACKNOWLEDGE THAT YOU HA E READ THIS AGREEMENT AND THAT YOU AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT YOU ARE NOT AN AUTHORIZED USER OF THE SOFTWARE AND IT IS YOUR RESPONSIBILITY TO EXIT THIS INSTALLATION PROGRAM WITHOUT INSTALLING THE SOFTWARE OR TO DELETE THE SOFTWARE FROM YOUR COMPUTER 1 License Subject to the terms and conditions of this Agreement including without Limitation Section 2 hereof Zend hereby grants to Licensee during the Term as defined below a Limited a non exclusive license the License to i install and operate the Software on a computer or a computer network owned or operated by Licensee ii make copies of the Software and iii sublicense and distribute a Limited non exclusive sublicense to install use and sublicense such copies of the Software provided that any sub license granted hereunder shall be subject TIE w root ubuntu homez e 37 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer IMPORTANT BY SELECTING THE YES OPTION BELOW DOWNLOADING INSTALLING OR OTHERWISE USING T
13. localhost home epp Desktop EndpointProtector RedHat2 2 2 File Edit View Terminal Tabs Help eo oe ee oe Endpoint Protector Installation RedHat Edition ERR EREREREREEE Configure Endpoint Protector Configuring the application database access and creating the database Database parameters Host 53 Endpoint Protector Installation Guide e g Host localhost User root Password administrator Port 3306 default 3306 After this point you will be asked to introduce company related data such as company name address country e mail contact etc After you have verified this information you entered sing the certificate created by Endpoint Protector Note The Security Enhanced Linux SELinux feature will prevent the loading of Zend Optimizer components Please follow these commands to remedy the situation chcon t texrel_shlib_t usr local Zend lib Optimizer 3 3 3 php 5 2 x ZendOptimizer so chcon t texrel_shlib_t usr local Zend lib ZendExtensionManager so execstack c usr local Zend lib Optimizer 3 3 3 php 5 2 xX ZendOptimizer so execstack c usr local Zend lib ZendExtensionManager so After executing the commands please restart the httpd service using the following command etc init d httpd restart Note The MySQL and httpd components are not installed as a service and therefore they will not start automatically after reboot Please follow these commands to remedy the sit
14. to a shared network folder Be sure to set the sharing and security permissions for the folder to Everyone Read Only 2 Copy the supplied Install_EPP_Client Visual Basic script file found in Tools folder of Endpoint Protector Installation kit into the same shared folder This script queries the registry to see if Endpoint Protector Client is installed on the computer and also for the version of operating system targeted 32 or 64 bit Windows If it s not it will run the proper installer and if it is installed it will check if the installed version is older than the version of the installer itself msiexec command runs with the i option for installation and the qn option for silent installation meaning that the user will not be prompt for any information during install time You will need to edit the script prior to using it in the deployment of clients To do this simply right click the script file and select Edit This will open your text editor by default Notepad and will allow you to make changes to the file 81 Endpoint Protector Installation Guide f Install_EPP_Client vbs Notepad g alol x File Edit Format view Help on error resume next HHH HHH HHH W MODIFY HERE THE PATH TO THE MSI INSTALLER AND THE IP ADDRESS OF THE EPP SERVER shared location EpPClientSetup_x86_32 msi shared location EPPClientSetup_x86_64 ms7 Endoint Protector Server IP Address OHHH HOC
15. to the SOL Server System Administrator role By default users on Microsoft Windows ista operating system are not members of the SOL Server System Administrator role Help lt Back Cancel Click Next iis Microsoft SOL Server 2005 Express Edition Setup i x Error and Usage Report Settings Help Microsoft improve some of the SOL Server 2005 components and services d Automatically send Error reports For SQL Server 2005 to Microsoft or your corporate error reporting server Error reports include information regarding the condition of SOL Server 2005 when an error occurred your hardware configuration and other data Error reports may unintentionally include zerana information which will not be used by Microsoft Automatically send Feature Usage data For SOL Server 2005 to Microsoft Usage data includes anonymous information about your hardware configuration and how you use our software and services By installing Microsoft SOL Server 2005 SOL Server and its components will be configured to automatically send Fatal service error reports bo Microsoft or a Corporate Error Reporting Server Microsoft uses error reports to improve SQL Server Functionality and treats all information as confidential Help lt Back Cancel 7 Endpoint Protector Installation Guide Click Next and proceed with the installation 2 1 5 Install MS SQL Server Management Studio neem ie Microsoft SOL Server
16. type in services msc without quote marks Look for the IIS Admin Service select it and click restart oh Services File Action View Help e m EBET gt atm Ry Services Local Services Local IIS Admin Service Stop the service Pause the service Eu the service Description Enables this server to administer Web and FTP services IF this service is stopped the server will be unable to run Web FTP NNTP or SMTP sites or configure IIS If this service is disabled any services that explicitly depend on it will Fail to start Cryptographic Serv Sa DCOM Server Proc DHCP Client Sy Distributed File Sys Sy Distributed Link Tra Sa Distributed Link Tra SRy Distributed Transac Sa DNS Client Sa Error Reporting Ser By Event Log Sy File Replication Sy Help and Support SRyHTTP SSL Sa Human Interface D IIS Admin Service Sa IMAPT CD Burning Sa Indexing Service Sa Intersite Messaging Sy IPSEC Services Sa Kerberos Key Distri Ss License Logging Sy Logical Disk Manager Sa Logical Disk Manag Sa Messenger a Microsoft Software By Net Logon Ry NET Service Sa NetMeeting Remot Sa Network Connections Sa Network DDE Sa Network DDE DSDM Sa Network Location 4 Sa Network Provisionin SANT LM Security Sup Extended A Standard Description Provides th Provides la Registers 4 Integrates Enables cli
17. you need to enter the IP of the Endpoint Protector Server Example 192 168 0 35 or 35 74 254 98 Save the changes after finishing editing this file 82 Endpoint Protector Installation Guide 3 Choose Start gt Programs gt Administrative Tools and click Active Directory Users and Computers You should see the following window 4 Active Directory Users and iron Active Directory Users and Computer ad cososys com it objects Saved oome oe cososy scam Ja ate EA Builtin Clean builkinDornain Ga Computers Computers Container Default container for upgrade E Domain Controllers i Organizational Unit Default container for domain H E ForeignSecurityPrincipals ES i ityPrinci Container Default container For security Organizational Unit1 A Organizational Unit HEA Organizational Unit z Organizational Unikz Organizational Unit H E test computers test computers Organizational Unit Fl 3 Test GPO P Organizational Unik EE test users 2 test users Organizational Unit Es Users users Container Default container for upgrade Ea Virtual Users 4 virtual Users Organizational Unik Description 4 Right click the Organizational Unit you want to assign the policy to and select Properties 83 Endpoint Protector Installation Guide 5 Select the Group Policy tab and if you don t have the Group Policy Management Console installed you should see the following window Click the New
18. 27 0 0 1 index php We recommend that you add this page to Internet Explorer s trusted sites The steps for adding this a described in detail in the Endpoint Protector User Manual in the paragraph Installing Root Certificate to your Internet Browser 27 Endpoint Protector Installation Guide 1 Once the final step is complete you will be able to see the Endpoint Protector Login window Endpoint Protector Reporting and Administration Tool Microsoft Internet Explorer E l jx File Edit view Favorites Tools Help ae Oik O i 2 search Serate O O7 Se Address https 127 0 0 1 Eco Links Welcome Guest Login Endpoint Reporting and Administration Tool English x Protector 2009 Please provide the necessary credentials Username Password es gt Login j Endpoint Protector 2009 Enterprise Edition CoSoSys LTD version 3 0 alpha Done Po BQ tocatintranet 2 Access the Tools option from Internet Explorer s menu bar and select Internet Options Endpoint Protector Reporting and Administration Tool Microsoft Internet Explorer Fie Edit view Favorites Tools Help Back x 2 7 Maland News k 6l G 4B rn ee gt Address https 127 0 0 1 aes ee Ige me Synchronize Windows Update Welcome Guest Login Endpo Internet Options nd Administrati on Tool English 7 Protector 250 Please provide the necessary
19. 43 In case you are behind a router consult the device s user Manual or contact the manufacturer of your device about setting up port forwarding 2 Server Installation Routines 2 1 Windows OS Server Installation 2 1 1 Download locations of required applications All 3rd party software that is required for the installation can be downloaded for free from the following locations MSSQL http www microsoft com sql downloads trial software mspx MSSQL 2005 Express and Microsoft SQL Server Management Studio Express http www microsoft com express 2005 saql register http www microsoft com downloads details aspx FamilyID c243a5ae 4bd1 4e3d 94b8 5a0f62bf7 796 amp displaylang en NET Framework 2 0 x86 version http www microsoft com downloads details aspx FamilyID 08 56EACB 4362 4BOD 8EDD AAB15C5E04F5 amp displaylang en x64 version http www microsoft com downloads details aspx familyid b44a0000 acf8 4fal affb 40e78d 788b008 amp displaylang en Additional information regarding the installation of these applications can be found on their respective websites 5 Endpoint Protector Installation Guide Adobe Flash Player http get adobe com flashplayer promoid DXLUJ This is required to display the Graphical reports in Endpoint Protector 2 1 2 Server Installation Prerequisites These components MUST be installed before you can proceed with the installation of the Endpoint Protector Se
20. Client Note It may take some time for your policy to apply depending on the Domain configuration If you want to apply the policy immediately run gpupdate from your command prompt 90 Endpoint Protector Installation Guide cy CS WINDOWS systems cmd exe Microsoft Windows Version 5 2 3796 MC Copyright 19785 2083 Microsoft Corp T N Documents and Settings Administrator gt qpupdate Refreshing Policy User Policy Hefresh has completed Computer Policy Refresh has completed To check for errors in policy processing review the event log C N Documents and Settings Administrator gt gpupdate Refreshing Policy User Policy Refresh has completed Computer Policy Refresh has completed To check for errors in policy processing review the event log Gi Documents and Settings Administrator gt _ 3 4 Command line client installation The Endpoint Protector client can be installed or uninstalled by using the command line or command prompt Commands The format should be gt msiexec i EPPSetup x x x x msi qn WSIP server IP Where i install EPPSetup version EPPSetup 2 3 2 8 msi is the current latest version qn silent mode installation This means that you won t be asked to introduce any information during the installation procedure Also you won t see any of the setup steps WSIP IP address insert the IP address of the Endpoint Protector Server E g msiexec i EPPSet
21. ENDPOINT PROTECTOR 2009 cososys I Endpoint Protector Installation Guide Table of Contents 1 System ReEQUIFEMENTS ccceecee eee eee eee 1 1 1 Server System Requirements ccc cce eee eee ee sete eeeeeeeeeeaeeees 1 1 2 Client System RequIreMeNts ccccecesscccsennreeessecusnnaresenses 3 2 Server Installation ROUtINGS cceeeeeeees 4 2 1 Windows OS Server Installation sacetanintmoretesnmateneutancneunmaceses 4 2 1 1 Download locations of required applications sssssssrsess 4 2 1 2 Server Installation PrerequiSitesS ccccccceeeeeeeeeseeeeeeeeeeeees 5 2 1 3 Install INET Framework 2 0 s sesssssssssssssssrenrerrererrrrenrrrennne 5 2 1 4 Install MS SQL or MS SQL 2005 Express Server and Server Management SEUNG seirreerrriirrerirrieneiid di berrak keii AEN EEN Eey 5 2 1 5 Install MS SQL Server Management Studio Express 7 2 1 6 Modify the settings for MS SQL CONNECTIONS ccc eee eee 7 2 1 7 Launch the SQL Server Management Studio cccee ees 8 2 1 8 Create a new database user s ssssssnsnsnssnsnnnsnnnnnnnsnnnannnnn 9 2 1 9 Create a new database sssssrssrsrsnnrrrnrrnrerenrrrrnrrrrerene 10 2 1 10 Install IIS version 6 0 on Windows Server 2003 0005 14 2 1 11 Install IIS version 7 0 on Windows Server 2008 or install additional necessary Web Server roles ccccccsecesseuueeusecuueuueeuresnnes 17 Dt dees MMS aU PAP a
22. ES COSOSYS IS WILLING TO LICENSE THE LICENSED SOFTWARE TO YOU AS THE INDIVIDUAL THE COMPANY OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE LICENSED SOFTWARE REFERENCED BELOW AS YOU OR Y OUR ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS END USER LICENSE AGREEMENT LICENSE AGREEMENT READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE LICENSED SOFTWARE THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND COSOSY S BY OPENING THE LICENSED SOFTWARE PACKAGE BREAKING THE LICENSED SOFTWARE SEAL CLICKING THE I AGREE OR YES BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY OR LOADING THE LICENSED SOFTWARE OR OTHERWISE USING THE LICENSED SOFTWARE YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS CLICK THE DO NOT AGREE OR NO BUTTON OR OTHERWISE __INDICATE REFUSAL AND MAKE NO FURTHER USE OFTHE 7 Print Save Go Back C Continue E om A A S GoBack _Continue 75 Endpoint Protector Installation Guide Next inside the Server Configuration window please enter the IP Address of your Endpoint Protector Server and continue with the next step Introduction oho Configure Server Destination Sel Continue 76 Endpoint Protector Installation Guide At the Destination Select step please select the disk where you want to install Endpoi
23. H HOO AHHH OOH AAO er re DO NOT MODIFY FROM HERE BELOW cososys DOES NOT TAKE RESPONSABILITY FOR THE LINES MODIFIED FROM HERE BELLOW OHHH HUA Set wshshell CreateobjectC wScript shell osType wshshell ReqReadC HKLM SYSTEM Currentcontrolset control session Manager Environment PROCESSOR_ARCHITECTURE If ape x86 Then ja teee aes msiPath64 Call MsgBoxC msipath HHH HHH HHH W DO NOT MODIFY FROM HERE BELOW cososys DOES NOT TAKE RESPONSABILITY FOR THE LINES MODIFIED FROM HERE BELLOW installedversion ExtractVersionnumberFromRegistry SE rOnMGer Bk GetmsiversionNumber msiPath im x x CompareversionNumbers instal ledversion versionNumbermsI Function GetmsiIversionnumber msi on Error Resume Next GetmMsiversionnumber if msi then exit Function end if Dim FS TS wI DB View Rec Set wI CreateobjectC windowsInstaller Installer Set DB wI OpenDatabase msi 0 if Err number lt gt O then Dim message errorRec message Err Source amp amp HexCerr Number amp amp Err Description ss 4l i e E ea sae roses BP r arnar ea eee mmr There are only two values which need to be edited in this script file shared location here you need to enter the path to the shared folder which contains both 32 and 64 bit Endpoint Protector client Example server Shared Folder EPPClient Endpoint Protector Server IP Address here
24. HIS SOFTWARE YOU ACKNOWLEDGE THAT YOU HAVE READ THE LICENSE AGREEMENT AND THAT YOU AGRELsTO BE BOUND BY ITS TERMS AND CONDITIONS IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF SUCH AGREEMENT YOU ARE NOT AN AUTHORIZED USER OF THE SOFTWARE AND IT IS YOUR RESPONSIBILITY TO EXIT THIS DOWNLOADING INSTALLATION PROCESS WITHOUT DOWNLOADING OR INSTALLING THE SOFTWARE BY SELECTING THE NO OPTION BELOW AND TO DELETE THE SOFTWARE FROM YOUR COMPUTER Do you accept the terms of this license Yes w root ubuntu home e root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer 3 3 3 Please specify the tation for installing Zend Optimizer usr tocat zend lt Cancel gt w root ubuntu home e 38 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer 3 Enter the location of your php ini file ete phps apache2 ae lt cancel gt w root ubuntu fhome e root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer 3 3 3 Are you using Apache Web server lt No gt w root ubuntu homeye 39 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help a a root ubuntu home e Zend Optimizer Specify the full
25. Is this ok y N J Apache mod_ssl module To install this manually your can issue the command yum install mod_ssl 55 Endpoint Protector Installation Guide epp localhost home epp File Edit View Terminal Tabs Help gt Processing Dependency Libdistcache so 1 64bit for package mod ssl gt Processing Dependency Libnal so 1 64bit for package mod ssl gt Running transaction check gt Package distcache x86 64 1 4 5 17 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Version Repository Installing mod ssl x86 64 1 2 2 9 1 fc3 updates Installing for dependencies distcache x86 64 1 4 5 17 fedora Transaction Summary Install 2 Package s Update Package s Remove Package s Total download size 211 k Is this ok y N y MySQL Database Server To install this manually use the command yum install mysql server epp localhost home epp Desktop EndpointProtector RedHat2 2 2 File Edit View Terminal Tabs Help Remove Package s Total download size 14 M Is this ok y N y Downloading Packages 1 4 mysql 5 0 51a 1 fc9 x86 64 rpm 2 4 mysql server 5 0 5la 1 fc9 x86 64 rpm 3 4 perl DBD MySQL 4 005 8 fc9 x86 64 rpm 4 4 perl DBI 1 607 1 fc9 x86 64 rpm Running rpm check debug Running Transaction Test Finished Transaction Test Transaction Test Succeeded Running Transaction Installing perl DBI HHeHHHH HHH 1 4 Instal
26. SQL_Latini_General_CP1_CI_AS from the list of collations 14 Endpoint Protector Installation Guide f Database Properties epp Selectapage CR Senpt 4 Help Collation SQL Latin General CPT Cl AS Recovery model Simple T Compatibility level SOL Server 2005 90 Other options El Automatic Auto Close False Auto Create Statistics True Auto Shrink False Auto Update Statistics True Auto Update Statistics 4synchronously False E Cursor Close Cursor on Commit Enabled False Default Cursor GLOBAL El Miscellaneous ANSI NULL Default False ANSI NULLS Enabled False ANSI Padding Enabled False Server ANSI Warmings Enabled False WEDUSSESSQLEXPRESS Arithmetic Abort Enabled False E E Concatenate Null vtelds Hull False Vat SOOSS E Administrator Crose databate Ownership Chaining Enabled False Date Correlation Optimization Enabled False Numeric Found Abort False Parameterization Simple Progress seater ANSI NULL Default ay View connection properties Test your configuration by disconnecting from the current connection File gt Disconnect Object Explorer and reconnecting again File gt Connect Object Explorer this time using the SQL Server Authentication the user and password you just created If you have successfully created your database and login you should see the epp tag in the server name For further information on setting up MS SQL Server please consult Microsoft Support
27. U AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF SUCH AGREEMENT YOU ARE NOT AN AUTHORIZED USER OF THE SOFTWARE AND IT IS YOUR RESPONSIBILITY TO EXIT THIS DOWNLOADING INSTALLATION PROCESS WITHOUT DOWNLOADING OR INSTALLING THE SOFTWARE BY SELECTING THE NO OPTION BELOW AND TO DELETE THE SOFTWARE FROM YOUR COMPUTER Do you accept the terms of this License 62 Endpoint Protector Installation Guide epp localhost home epp File Edit View Terminal Tabs Help Zend Optimizer 3 3 3 Please specify the Location for installing Zend Optimizer usr tocatyzend lt Cancel gt 63 Endpoint Protector Installation Guide epp localhost home epp File Edit View Terminal Tabs Help Zend Optimizer Installation fend Optimizer 3 3 3 Confirm the Location of your php ini fite fusr local Zend etc lt Cancel gt epp localhost home epp File Edit View Terminal Tabs Help Zend Optimizer Installation Zend Optimizer 3 3 3 Are you using Apache Web server 64 Endpoint Protector Installation Guide epp localhost home epp File Edit View Terminal Tabs Help Zend Optimizer Installation Zend Optimizer 3 3 3 Specify the full path to the Apache control utility apachectl fusr sbin apachectL lt OK gt lt Cancel gt epp localhost home epp File Edit View Terminal Tabs Help Zend Optimizer Installation fend Optimizer 3 3 3 The installati
28. button and then continue with step 7 84 Endpoint Protector Installation Guide 6 If you have the Group Policy Management Console installed click the Open button Test GPO Properties he f gip EP 85 Endpoint Protector Installation Guide 7 In the Organizational Unit tree view on the left select the desired OU Organizational Unit right click it and choose Create and Link a GPO here 1S Group Policy Management i F ana SE ple Action wew window Help ad cososys com Linked Group Policy Objects Group Policy Inheritance Delegation R Default Poea Policy es Hga Domain Controllers Eee Organizational Unit1 E ni gay Organizational Unit Ag Fl ea best eee 5a H EA test i iee PE N y Here H 3 vire Link an Exisl ting H 3 Gra Block Trenance E WM Group Policy Modeling Wizard z sites Mew Organizational Unit PUR A Group Policy TE Group Folic Mew Window From Here Belete Rena me Refresh Properties Help Create a GPO in this domain and link it to this container 8 Name your Group Policy Object accordingly right click it and then select Edit The Group Policy Object Editor console is started 86 Endpoint Protector Installation Guide 9 Go to Computer Configuration Windows Settings Scripts Startup Shutdown Right click on Startup and choose Properties joj x ja Group Pol
29. camaatnnaiuae E 20 2 1 13 Using a database from another location ccccee eee ees 21 2 1 14 Endpoint Protector Server installation sesesssseeeeeenneees 22 2 1 15 Endpoint Protector Server Configurator ccccceeeeeeeeeeees 24 Zade dos I lel SUC eE ERSTER 26 2 2 Login Credentials to Endpoint Protector Server s ssssssss 29 2 3 Linux Server Installation Debian Ubuntu s ssssssessssssss 30 2 3 1 Installation of required software ssssssesssrersrrrrenrsrrerene 33 2 3 2 Installation of Zend Optimizer 3 3 0 ssssssssrsrssrsrsersresrsn 35 2 3 3 Installation of Endpoint Protector fileS ccceessseeeeeeereees 43 2 3 4 Configuration of the Endpoint Protector systemM ssssss 44 2 4 Linux Server Installation Red Hat Fedora ceesseeeeees 46 2 4 1 Endpoint Protector Automated Installation cccceee ees 47 2A ld PreparatiONS ageteaehe ceeeuee one oea wee xece sates el oeahec cesses ens oeeseenetecase 47 Fe Me MISE ale LOW E E E A E N T 47 2 4 2 Endpoint Protector Manual Installation cccceee eee ees 54 II Endpoint Protector Installation Guide De odes Prepar atiON S erisir EA aaa 54 2 4 2 2 Installation of required software ssssssesssrsrsrrrrrnrrrrsrene 54 2 4 2 3 Installation of Endpoint Protector fileS cccceeee cence eee ees 66 2 4 2 4 Configuration of Endpoint Protector s isivaisiivssiverieieasdarenwanne 69
30. credentials Username Password pi ke phogin _ Endpoint Protector 2009 Enterprise Edition CoSoSys LTD version 3 0 alpha Enables you to change settings 28 Endpoint Protector Installation Guide 3 From Internet Options click the Security tab select Trusted sites and click on Sites uting and Ad la x Internet Options Intemet Local intranet Trusted sites e provide the necessary credentials tame Endpoint Protector 2009 Enterprise Edition CoSoSys LTD version 3 0 alph 29 Endpoint Protector Installation Guide 4 If the current site https 127 0 0 1 does not appear in the text box a H l in AMANU aa Add and finally Close Ln a siaii EET ia You can add and remove Web sites from tis zone All Web stes in this zone will use the zone s security settings Welcome Guest Login 4dd this Web site to the zone n Tool Engish x https 127 0 0 1 Web sites http iwww adobe com htto twww aoogle ra zi I Require server verification https for all sites in this zone Close Custom Level Default Level e provide the necessary credentials ord OK Cancel Kenly agin Endpoint Protector 2009 Enterprise Edition CoSoSys LTD version 3 0 alpha CEANA earn Attention If you installed a client after setting up the server but no connected devices are reported
31. credentials Username Password es 127 0 0 1 63 3 1 Client Installation on Windows Please make sure that the NET Framework 2 0 is installed on your client PC before installing the Endpoint Protector Setup msi In case you see the following message you do not have installed NET Framework 2 0 or there was an error during the install process is Endpoint Protector Setup Welcome to Endpoint Protector Setup Wizard Endpoint Protector can not be installed on systems with NET Framework version smaller than 2 0 If this is the case please install NET Framework or repair the already existing installation Please assure that your client PC has full internet access network connectivity without any interference from firewalls etc 72 Endpoint Protector Installation Guide You will have received an MSI for your installation EPPClientSetup msi The MSI requires you to include the correct Server Settings to connect to the Endpoint Protector Server Launch the MSI and follow the steps through the installation process i Endpoint Protector Setup Welcome to the Endpoint Protector Setup Wizard The Setup Wizard will allow you bo change the way Endpoint Protector Features are installed on your computer or even ta remove Endpoint Protector From your computer Click Mext to continue or Cancel to exit the Setup wizard i Endpoint Protector Setup Server inf
32. e IE address bar as shown By clicking the Certificate Error button a pop up window appears Just click the View certificates in that pop up window Another pop up Certificate window will appear with three tabs namely General Details and Certification Path Certificate x General Details Certification Path Certificate Information This certificate cannot be verified up to a trusted certification authority Issued t 1927 168 0 225 Issued by CoSoSys LTD Endpoint Protector CA Valid from 7 8 2010 to 5 16 2020 Learn more about ee Select the General tab and then click Install Certificate button as shown above 93 Endpoint Protector Installation Guide Another Welcome to the Certificate Import Wizard pops up Just click the Next button Certificate Import Wizard 94 Endpoint Protector Installation Guide In Certificate Import Wizard window select Place all certificates in the following store radio button Certificate Import Wizard Certificate stores are system areas where certificates are kept Windows can automatically select a certificate store or you can specify a location for the certificate Automatically select the certificate store based on the type of certificate Place all certificates in the following store Certificate store Trusted Root Certification Authorities Learn more about certificate store
33. es currently installed Unpacking php5 ldap from php5 ldap 5 2 10 dfsg 1 2ubuntu6 3 i386 deb Setting up php5 ldap 5 2 10 dfsg 1 2ubuntu6 3 root ubuntu home endpoint Downloads eppinstalier _ i Configuring mysql server 5 1 i gt While not mandatory it is highly recommended that you set a password for the MySQL administrative root user If this field is left blank the password will not be changed New password for the MySQL root user s L SSS SSE 35 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstalier 2 3 2 Installation of Zend Optimizer 3 3 0 root ubuntu home endpoint Downloads eppinstalier nstal ing Zend Optimizer 3 3 0 press key to continue l fa 36 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer 3 3 3 Welcome to the Zend Optimizer 3 3 3 Installation For more information regarding this procedure please see Zend Optimizer Installation Guide lt OK w root ubuntu home e A root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer 3 3 3 A ZEND LICENSE AGREEMENT Zend Optimizer ZEND TECHNOLOGIES LTD ZEND SOFTWARE LICENSE AGREEMENT AGREEMENT IMPORTANT READ THESE TERMS CAREFULLY BEFORE INSTALLING THE SOFTWARE KNOWN AS
34. es how a Webserver passes information to an external program Typical uses mightinclude using a Web form to collect information and then passing that information to a CGI script to be emailed somewhere else Because CGlis a standard CG scripts can be written using a variety of programming languages The downsideto using EGI isthe performance overhead 2i Previous next gt Install Cancel 19 Endpoint Protector Installation Guide Add Roles Wizard Er S Select Role Services fv c Client Certificate Mapping Authentication K A 1 Aek aai eiai E URL Authorization ii D n a Ba e X Static Content Compressio E Dynanic Content Compression E iv al f5 6 Manegement oe Ei J TIS 6 Metabase Compatibility V 115 6 WMI Compatibility X 1S 6 Scripting Tools _ 115 6 Management Console 5 Install the Role with the required services and restart the server 20 Endpoint Protector Installation Guide 2 1 12 Install PHP PHP is installed automatically during the setup process of Endpoint Protector Server If you would like to install PHP manually we recommend using the following command msiexec exe i php 5 2 6 win32 installer msi INSTALLDIR c php ADDLOCAL MainExecutable tis4ISAPL ext_php_mssql ext_php_mbstring ext_php _ openssl ext_php_soap ext_php_xmlrpc ext_php_xsl ext_php_Idap ext_php_curl ext_php_gd2 ext_php_smtp ext_php_sockets ext_php_zip qn You can insta
35. icy Object Editor Ele Action View Help e Amere 3 deploy_epp 5erv ad cososys com Fry eee Computer Configuration o H E Software Settings een Windows Settings Startup eet m sE a E S Security Settings Display Properties E E Administrative Templates i User Configuration H E Software Settings aE Windows Settings H a Administrative Templates Description Contains computer startup scripts Extended Standard Opens the properties dialog box for the current selection 87 Endpoint Protector Installation Guide 10 From the Startup Properties window select Add A new window will be displayed Select Browse to search for the script you want to use i a kere A aged aa Pe cer eh ee A gee erage ie tea Pal eee T karli m Arne For qe I ence Li Limhi EAL EP Pe p ee See da Script ees Tig di jaj oe 88 Endpoint Protector Installation Guide 11 Do not use the Look tn browser to search for the file but write the full UNC path of the script My Recent Bocuments My Documents ie i nae fli Com pater g i PR Mi Network jE ile pal 1E J fsserv sharesIinstall_E PP_Client vba j a P N Places Note The client computers are required to have Windows Installer 2 0 installed 89 Endpoint Protector Installation Guide 12 If your client computers are running Windo
36. ign the certificate Click Y when asked 1 out of 1 certificate request certified commit Enter once again the password set above when you are prompt for Please input After configuring Endpoint Protector please choose Cancel from the Installation Menu in order to Exit the Installation After finishing the installation please follow also these two steps Add the following line to the file etc hosts file 127 0 0 1 endpointprotector Access https endpointprotector index php from the web browser 46 Endpoint Protector Installation Guide 2 4 Linux Server Installation Red Hat Fedora In order to install Endpoint Protector 2009 under Linux you will need an Internet connection The reason for this is that the installer downloads all needed components MySQL PHP OpenSSL etc directly from the Internet and also configures them automatically This saves space and time If you have already installed some components such as PHP then the installer will simply update your existing settings and register the required extensions needed for Endpoint Protector The Red Hat installation of Endpoint Protector has the following requirements Yum utility installed and correctly configured Default port 443 open and not used by another application Internal firewall either disabled or configured to allow traffic through 443 The installation for Red Hat Fedora can be done automatically using the in
37. igure Endpoint Protector Software lt Cancel gt w root ubuntu homeje 44 Endpoint Protector Installation Guide 2 3 4 Configuration of the Endpoint Protector system root ubuntu home endpoint Downloads eppinstalier CaSoSya Ltd Endpoint Frotector Server Please select sudan 1 4 or press lt Cancel gt to exit i 2 2 sen i root ubuntu home endpoint Downloads eppinstaller SeURaDSEaeteeaeseaceeaasnasaTeaenenses Endpoint Protector Installation version 3 0 3 8 2009 Debian Edition gt titititi SASS SETA HSS SASSER Configure Endpoint Protector Configuring the application database access and creating the database Database parameters I Host K Ty When configuring Endpoint Protector paragraph 2 4 2 4 you will be asked to enter certain information In order to configure Endpoint Protector correctly please see below what information is required 45 Endpoint Protector Installation Guide Host localhost User user from SQL database Password password for the username from SQL database Port leave it default Click Y when asked Do you want to create a new database and load Enter any password to Enter PEM pass phrase Your will now be asked to enter your credentials country name location etc Enter the password you have set above when you are asked the following Enter pass phrase for Click Y when asked S
38. iles for OpenSSL PHP 5 2 6 for Windows and also configures the IIS and PHP settings for you Please extract them to a temporary folder and launch EndpointProtectorServeriInstaller exe This Wizard allows you to install all necessary components simply and easily Endpoint Protector 7009 Server Installer Additional Help This wizard will guide you through all the necessary steps For a successful installation For additional help information please use the Endpoint Protector Install Sheet Get Install Sheet Installation Process 1 Endpoint Protector Prerequisite Software 2 Endpoint Protector Installation 3 Endpoint Protector Configuration Statkus Ready forinstallation of Endpoint Protector Seryer Cancel In case you are not sure that you have all necessary requirements you can consult the Install Sheet by clicking on the Get Install Sheet button Please note that this is a PDF document and you require a PDF reader to open it Click Start to proceed Simply follow the on screen instructions for each setup wizard and install all components with default settings Please note that after the Prerequisite Software and Endpoint Protector Installation you will need to click on Continue to proceed with the installation When the installation finishes with the Prerequisite Software and Endpoint Protector Server setup a configuration wizard will open and ask for some parameters The
39. ion Server DHCP Server E DNS Server Fax Server J File Services Installed Network Policy and Access Services E Print Services Terminal Services E UDDI Services FUR eb Server 15 T eer Windows Deployment Services Windows Server Update Services More about server roles 2 Previous oye m c 4 Select the Role Services Static Content Default Document Directory Browsing HTTP Errors CGI HTTP Logging Request Monitor Windows Authentication Client Certificate Mapping Authentication IIS Client Certificate Mapping Authentication Request Filtering Static Content Compression IIS Management Console IIS Management Scripts and Tools and all files from IIS 6 Management Compatibility as presented below Add Roles Wizard ES Description Relect Role Services Before You Begin Select the role services to install for Web Server IIS Server Roles Role services Web Server 15 E Web Server f l Common HTTP Features v Static Content d Default Document Progress i Directory Browsing Results v HTTP Errors HTF Redirection El Application Development ASP NET NET Extensibility ASP iJ ten ISAPI Extensions ISAPI Filters Server Side Indudes E Gl Health and Diagnostics fd HTTP Logging Logging Tools z Request Monitor Traing Custom Logging oA anniina More about role services Role Services Confirmation EGI defin
40. istration epp localhost home epp Desktop EndpointProtector RedHat 2 2 2 File Edit view Terminal Tabs Help REREREREEREERERRERRRREREREEEERERREREEEREEEEEE Endpoint Protector Installation RedHat Edition ce i a a a E a E a e E a a E E E E E E E E E E E E E E E E E E E Install System Requirements Software Advanced Please wait Do you want to install Apache mod ssl at this point Command yum install mod ssl q y y n y Do you want to install PHP version 5 x at this point Command yum install php q y y n Yy Do you want to install PHP mysgl extension version 5 x at this point Command yum install php mysgl q y y n Yy Do you want to install PHP soap extension version 5 x at this point Command yum install php soap q y y n y Do you want to install PHP xml extension version 5 x at this point Command yum install php xml q y y n Yy 52 Endpoint Protector Installation Guide 4 Installation of Endpoint Protector Server files The Endpoint Protector Server files will be installed in var www EPPServer epp localhost home epp Desktop EndpointProtector RedHat2 2 2 File Edit View Terminal Tabs Help eee TELE SEE EEE EEE EEE EEEE EEE EE EEE SE Endpoint Protector Installation RedHat Edition EERE ERER ERR ERE RRR SEE Installing Endpoint Protector Server Files Done Press lt ENTER gt key to continue 5 Configuration of Endpoint Protector files epp
41. l of 50 MB of available memory on the Hard Drive for the application files Additional space required by the MySQL or MSSQL database depending on the number of clients and the activity on the network Sufficient Hard Drive space available for file tracing shadowing module option 10GB up to 500GB This space is related to the number of client computers and their activity We recommend using a separate storage HDD for shadow storage Attention In case you are using an internal or external firewall please assure that the port you assign to the server is open By default this is port 443 3 Endpoint Protector Installation Guide 1 2 Client System Requirements Operating system Windows 7 all versions 32bit 64bit Windows Vista all versions 32bit 64bit Windows XP Home or Professional Service Pack 2 is recommended Windows Server 2003 Mac OS X 10 4 and 10 5 Administrative rights on the PC to install the MSI package Microsoft NET Framework 2 0 needs to be preinstalled on the PC Fully functional internet network connection 1 GHz processor or faster recommended Minimum of 256 MB RAM 32 MB of available memory on the hard drive plus additional space for optional offline file tracing and file shadowing Attention In case you are using an internal or external firewall please assure that the computer you are installing the client on has the server specified port open By default this is port 4
42. ligion script version 3 9 3 8 29009 Debian Edition Ubuntu w root ubuntu fhome e root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help S CoSoSys Ltd Endpoint Protector Server COSOSYS SOFTWARE END USER LICENSE AGREEMENT COSOSYS LIMITED AND OR ITS AFFILIATES COSOSYS IS WILLING TO LICENSE THE LICENSED SOFTWA Ey DEFINITIONS Content Updates means content used by certyin CoSoSys products which is updated from time Documentation means the user documentation CoSoSys provides with the Licensed Software License Instrument means one or more of the following applicable documents which further Licensed Software means the CoSoSys software product in object code form accompanying t Support Certificate means the certificate sent by CoSoSys confirming Your purchase of the Upgrade means any version of the Licensed Software that has been released to the public a 7 w root ubuntu homey e 33 Endpoint Protector Installation Guide 2 3 1 Installation of required software root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help CoSoSys Ltd Endpoint Protector Server Please select option 1 4 or press lt Cancel gt to exit Install System Requirements Software Automated Install System Requirements Software Advanced Install Endpoint Protector Software Configure Endpoint Protector Software lt Cancel gt
43. ling perl DBD MySQL HHHHHHH AHHH 2 4 Installing mysql HHHHHHH HHH 3 4 Installing mysql server HHHHHHHH HHS 4 4 Installed mysql server x86 64 6 5 0 5la 1 fc9 Dependency Installed mysql x86 64 0 5 0 5la 1 fc9 perl DBD MySQL x86 64 0 4 005 8 fc9 perl DBI x86 64 0 1 607 1 fc9 Complete root localhost EndpointProtector RedHat2 2 2 Jj Start mysql service etc init d mysqld start Define a password for root user of the MySQL Database Server 56 Endpoint Protector Installation Guide usr bin mysgladmin u root password pass PHP version 5 2 3 or higher To install this manually you can issue the command yum install php epp localhost home epp File Edit View Terminal Tabs Help gt Running transaction check gt Package php common x86 64 0 5 2 6 2 fc9 set to be updated gt Package php cli x86 64 0 5 2 6 2 fc9 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Version Repository Installing php x86 64 updates Installing for dependencies php cli x86 64 24 TE updates php common x86 64 a Tc updates Transaction Summary 3 Package s 0 Package s 0 Package s Total download size 3 8 M Is this ok y N y Several extension for PHP 5 2 3 or higher These extensions are php mysql php soap php xml php mbstring php xmlrpc To install these extensions manually you can issue the commands yum install php mysql 57 Endpoint Protector
44. ll PHP version 5 2 3 as a minimum requirement but we recommend version 5 2 6 Additionally you can remove the qn parameter in order to add more extensions to php depending on other sites you have running on the same web server This command will assure that all the correct extensions for PHP are installed automatically The PHP configuration itself will be done automatically by the Endpoint Protector Configurator 21 Endpoint Protector Installation Guide 2 1 13 Using a database from another location You can configure Endpoint Protector Server to use a database which is ona different computer thus reducing the load on the server In order to make Endpoint Protector run on one server and the database on another please follow the steps 1 Follow the instructions from the page bellow in order to be sure that the remote connections are enabled in your SQL Server http support microsoft com default aspx scid kb EN US 914277 2 In the last part of the installation Endpoint Protector Configurator use one of the following as instance name ComputerName SQLInstanceName ex Steve_PC SQLExpress IP SQLInstanceName ex 89 65 215 39 SQLExpress Depending on your network configuration 22 Endpoint Protector Installation Guide 2 1 14 Endpoint Protector Server installation You will have received the ZIP file containing the Endpoint Protector Setup files The server installation contains the installation f
45. ll sh depending on your operating system 31 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstalier File Edit View Terminal Help endpoint ubuntu sudo su sudo password for endpoint rootGubuntu home endpoint cd Downloads root ubuntu home endpoint Downloads mkdir eppInstaller root ubuntu home endpoint Downloads mv EndpointProtectorDebianServerSetup 3038 zip eppInstaller rootGubuntu home endpoint Downloads cd eppInstaller rootGubuntu home endpoint Downloads eppInstaller unzip EndpointProtectorDebianServerSetup 3038 zip root ubuntu home endpoint Downloads eppInstaller install sh Reading package Lists Done Building dependency tree Reading state information Done The following NEW packages will be installed dialog upgraded 1 newly installed to remove and 3 not upgraded Need to get 271kB of archives After this operation 1 466kB of additional disk space will be used Get 1 http us archive ubuntu com karmic universe dialog 1 1 20080819 1 271kB Fetched 271kB in Os 302kB s Selecting previously deselected package dialog Reading database 35 I root ubuntu nomele 32 Endpoint Protector Installation Guide Follow the steps from the wizard root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help CoSoSys Ltd Endpoint Protector Serve Welcome to Endpoint Protector Server instal
46. lly with the system 2 4 2 3 Installation of Endpoint Protector files First step from installation of Endpoint Protector Server files should be the creation of a new folder which will host the application files Command mkdir var www EPPServer 67 Endpoint Protector Installation Guide epp localhost home epp File Edit View Terminal Tabs Help root locaLhost epp mkdir var www EPPServer root locaLlhost epp The location var www is a good choice because the Endpoint Protector is actually a web application The archive EndpointProtector zip should be extracted in the folder created above Command unzip qo EndpointProtector zip d var www EPPServer epp localhost home epp Desktop EndpointProtector RedHat 2 2 2 File Edit View Terminal Tabs Help root locaLhost EndpointProtector RedHat2 2 2 unzip qo EndpointProtector zip d var www EPPServer root locaLhost EndpointProtector RedHat2 2 2 68 Endpoint Protector Installation Guide Please change the owner of the new created folder to the user apache or the user which is set to run Apache Web Server Command chown R apache apache var www EPPServer epp localhost home epp File Edit View Terminal Tabs Help root localhost epp chown R apache apache var www EPPServer root localhost epp J 69 Endpoint Protector Installation Guide 2 4 2 4 Configuration of Endpoint Protector Configuration of Endpoint Protector Server is a co
47. mplex part of the installation process We recommend you to use the provided script for configuration Command configureRedHat sh Following there are the manual configuration steps Create and populate the database with default data Create a new Certificate Authority and a new Server Certificate Create the Endpoint Protector configuration files var www eppserver sieratool config databases yml var www eppserver sieratool config _autoload_classes php var www eppserver sieratool config php var www eppserver sieratool settings php var www eppserver sieratool apps rattol config configws php var www eppserver sieratool apps rattol config config php var www eppserver sieratool config propel ini e Creating the Apache configuration file e Change the permissions for cache logs and uploads folder so they can be accessible also for writing Commands chmod R 777 var www eppserver sieratool cache chmod R 777 var www eppserver sieratool logs chmod R 777 var www eppserver sieratool web uploads 70 Endpoint Protector Installation Guide Access from web browser https 127 0 0 1 Endpoint Protector Reporting and Administration Tool Mozilla Firefox 3 Beta 5 File Edit View History Bookmarks Tools Help gt S Bi https n27 0 0 1 GaSmart Bookmarksy Reliz Ai Welcome Guest Login English x Ae Endpoint Reporting and Administration Tool Protector 2009 Please provide the necessary
48. must accept the EULA in order to continue with the installation 48 Endpoint Protector Installation Guide epp localhost home epp Desktop EndpointProtector RedHat2 2 2 File Edit View Terminal Tabs Help The Licensed Software is the proprietary property of CoSoSys or its licensors ani d is protected by copyright Law CoSoSys and its licensors retain any and all ri ghts title and interest in and to the Licensed Software including in all copie s improvements enhancements modifications and derivative works of the License d Software Your rights to use the Licensed Software shall be Limited to those e xpressly granted in this License Agreement ALL rights not expressly granted to You are retained by CoSoSys and or its licensors J CONTENT UPDATES If You purchase a CoSoSys maintenance support offering consisting of or includin g Content Updates as indicated on Your Support Certificate You are granted the right to use as part of the Licensed Software such Content Updates as and whe n they are made generally available to CoSoSys s end user customers who have pur chased such maintenance support offering and for such period of time as indicate d on the face of the applicable Support Certificate This License Agreement does not otherwise permit You to obtain and use Content Updates 6 UPGRADES CROSS GRADES CoSoSys reserves the right to require that any upgrades if any of the Licensed Software may only be obtained in a quan
49. nd Filearoups Gq Manag Refresh System Databases 11 Endpoint Protector Installation Guide To do this right click the Databases directory and select New Database In the Database name enter EPP and set the owner of the database to be your previously created EPP user New Database epp l By 1 MB unrestricted growth an arig i epp_log ji By 10 percent unrestricted growth Server W2003SE SQLEXPRESS Connection W2003SE Administrator a View connection properties Bemove You can do this by clicking the browsing mark next to the default owner 12 Endpoint Protector Installation Guide Fa Micrasoft SOL Server Management Studio Express File Edit Vin New Database i Ld New Query select apage SS Script 35 Help n g 2 General A Options Seek Gece NRE ag a z Ei gt Filegroups isis ss PE E g w20035E Owner lt default gt Ves 2 la Datal Select Database Owner il a S gt LI Secur Select these object types l Item s I Serve C Repli 0 Mane Object Types growth MB unrestricted growth 1 percent unrestricted growth Enter the object names to select examples Gheck Names Browse Conne Server W200 LEXPR Connection W 2003S E Administrator 2 View connection properties Progress Ready 2 a E _ ae HE 4 In the new
50. nt Protector Client and click Continue Select the disk where you want to install the Endpoint Protector Client software Typi Macintosh HD i 224 21 GB free 249 72 GB total 77 Endpoint Protector Installation Guide Now please press the Install button for the installation to be completed A window will be displayed where you are asked to introduce your Administrator credentials username and password Introduction This will take 3 5 MB of space on your computer Configure Server Click Install to perform a standard installation of De i this software on the disk Macintosh HD 4 Installatio per Installation i le A a Change Install Location GoBack install _ Change Install Location C GoBack C install 78 Endpoint Protector Installation Guide If the installation is completed successfully please press the Close button to exit setup Introduction 6 License f In allatior Type The installation was successful The software was installed GoBack 79 Endpoint Protector Installation Guide Next please press the F4 key for the Dashboard to be displayed and browse for the Endpoint Protector icon After finding the corresponding icon and clicking on it a Similar screen with the one below will be displayed wAe Endpoint Protector Devices Connected to this
51. on Repository Installing php xmLrpe x86 64 5 2 6 2 7c3 updates Transaction Summary Install 1 Package s Update Package s Remove Package s Total download sire 52 k Is this ok y N y OpenSSL version 0 9 8g To install this manually you can issue the command yum install openssl epp localhost home epp File Edit View Terminal Tabs Help Loaded plugins refresh packagekit Setting up Install Process Parsing package install arguments Resolving Dependencies gt Running transaction check gt Package openss x86 64 0 0 9 8g 9 fc9 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Version Repository Updatina openssl x86 64 8 9 89 9 Tc9 updates Transaction Summary 0 Package s 1 Package s 0 Package s Total download sive 1 5 M Is this ok y N y 60 Endpoint Protector Installation Guide Zend Optimizer 3 3 0 This utility software can be downloaded from the Zend website www zend com or you can use the version bundled with our Endpoint Protector package To install Zend Optimizer 3 3 0 run the command install sh and follow the installation wizard epp localhost home epp 1e Ai aire i a a d e en a a a a a TEAGI hi em A et ra H ae beini rL esis ais ie Se o h a ut I a ay p i l A c mar E r m b i aed 4 i n aai F ee For hA i i information regarding this procedure please
52. on has completed successfully Zend Optimizer is now ready for use You must restart your Web server for the modifications to take effect lt OK 65 Endpoint Protector Installation Guide epp localhost home epp File Edit View Terminal Tabs Help Zend Optimizer Installation Zend Optimizer 3 3 3 Restart the Web server now mE lt No gt epp localhost home epp File Edit View Terminal Tabs Help Zend Optimizer Installation Zend Optimizer 3 3 3 Apache has restarted successfully lt ik gt 66 Endpoint Protector Installation Guide Note The Security Enhanced Linux SELinux feature will prevent the loading of Zend Optimizer components Please follow these commands to remedy the situation chcon t texrel_shlib_t usr local Zend lib Optimizer 3 3 3 php 5 2 x ZendOptimizer so chcon t texrel_shlib_t usr local Zend lib ZendExtensionManager so execstack c usr local Zend lib Optimizer 3 3 3 php 5 2 xX ZendOptimizer so execstack c usr local Zend lib ZendExtensionManager so After executing the commands please restart the httpd service using the following command etc init d httpd restart Note The MySQL and httpd components are not installed as a service and therefore they will not start automatically after reboot Please follow these commands to remedy the situation sbin chkconfig mysql on sbin chkconfig httpd on These commands will force the two components to start automatica
53. or _ Certificates Parameters Country Romania City cu State Cluj Napoca Company name CosoSysLte Certificate Authority Password ihe Cerificate Authority Confirm Password hike Server Certificate Password thks E Server Certificate Password Cootinmation Stimugiesacime rititices seh Server Ho p n xl oo4 3 Database 1 Configuration complete 7 Database MLExpress e Databaze i Databaze H Database Password Configuration Options Recreate database and load detault data Recreate the security certificates Configure Creating tables and loading startup data into the database Click the OK button and exit the Endpoint Protector Configuration After clicking OK you can exit the Configurator and continue with the Final steps 2 1 15 Endpoint Protector Server Configurator The Endpoint Protector Server Configurator allows you to configure the parameters of the server Endpoint Protector 2009 Server Configurator E x Certificates Parameters state Company name Certificate Authority Password Certificate Authority Confirm Password Server Certificate Password Server Certificate Password Confirmation Server Host Mame Database Access Parameters Database Host Database Mame Database User Database Password Configuration Options Td Recreate database and oad detaut data r Re Create the securty cer
54. or Installation Guide Fa Micrasoft SQL Server Management Studio Express File Edit View Login New i P new Query Rela S soip gt 5 Hep ee General ee a L Server Roles pee wars a 82 a A TA User Mapping iii E fay W20035E SOI EN Securables Windows authentication B Database Status 5 TE E Ga Security f SQL Server authentication C Logins Password Seeccesessoesccesss 5 Item s 9 Serve ce fiw Crede Confirm password LELE EE EEEE EEEE EEEE E _ Server Ot Lj Replicatio Mie R A E Managem l Enio policy F Enforce password expiration F Usermust change password atnest login Mapped to certificate Certificate name O tH sapped to asymmetric Key Connection Key name Server Sis w2003SE SQLEXPRESS Default database master Connection Default language lt default gt W2003SE Administrator 5 View connection properties Progress 3 Cancel Ready i Help make Microsoft SQL Server 2005 better x A Click OK to finish Now you should see a new user called EPP 2 1 9 Create a new database After you have created a new user you need to create a new database Ri Microsoft SQL Server Management Studio Express File Edit View Tools Window Community Help Diwan DISA at B GDA Be S Object Explorer 1 Databases LB Securi t20035E SQLEXPRESS Databases 1 Item s B Serve Restore Database nA ee eee C Replic Restore Files a
55. ormation Specify the server address and port Server Information Server IP XXX XXX XXX XXX Server Port default 443 73 Endpoint Protector Installation Guide Attention If your Endpoint Protector is not using the default 443 port please introduce the correct port You should not be required to add additional information in the installation process 3 2 Client Installation on Mac OS To install Endpoint Protector Client on a Mac PC you must first unzip the archive with the Endpoint Protector Mac Client application and double click on the EndpointProtectorClient pkg Next in the Endpoint Protector Client Installer window please press the Continue button from the right down corner which will initiate the installation process Introduction You will be guided through the steps necessary to install this software License o Destination Selert k Installation Type GoBack Continue 74 Endpoint Protector Installation Guide As a first step please read carefully the Software License Agreement and press Agree and then Continue if you accept the terms of the agreement AOGE Introduction License Configure Server Destination Select Installation Type Installation Summary amp Install Endpoint Protector Client Software License Agreement English re a FRN UAE CENAR AORE T A COSOSYS LIMITED AND OR ITS AFFILIAT
56. path to the Apache control utility apachectl es r sbin apache2ctl lt OK gt lt Cancel gt root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help w root ubuntu home e zend Optiis Apache control utility should be a shell script Do you still wish to use this path Yes 40 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer 3 3 3 Installation couldn t detect the location of Apache executable Please specify the full path to the Apache binary httpd etc init d apache2l lt OK lt Cancel gt a 6B root ubuntu nomez e root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer The installation has failed to detect the version of Apache you use Please choose the correct version l Apache 1 x x E lt JE lt Cancel gt w root ubuntu home e 41 Endpoint Protector Installation Guide root ubuntu home endpoint Downloads eppinstaller File Edit View Terminal Help Zend Optimizer The following configuration changes have been made The php ini file has been relocated from etc php5 apache2 to usr local Zend etc A symbolic Link for the php ini file has been created in etc php5 apache2 The original php ini was backed up to etc php5 apache2 php ini zend optimizer bak E eee
57. r Remove Programs Gul Currently installed programs show updates Sort by IName he n or Windows Components Wizard io ORE x Windows Con oa E eana App cation Server To add or remove a component click the check box A shaded box m means that only part Add Mew of the component will be installed To see what s included in a component click Details Programs To add or re 5 Fe G Feo at Subeomponents of Application Server pat ofthe subcomponents of Application Server Details LJ ha Application Server Console Foo 00MB Component O ASENET lj 51 45MB ea n Enable network COM access IC gB Enable network DTC access i av re Internet Information Services 5 27d MB 22 60KB iL Ge Message Queuing D jeak ag 39MB 4 18MB z cant apor gents 1 SOME Description Description 115 Includes Web FTP Lou and NNTP pea soe support for FrontPage Serv i J ASP Total disk 3j E ie a caret a 28 95MB Total disk space required Deals Space available on disk 2690 8 a MB 5 38MB Cancel 172M 5 pace avail 424MB i Windows Server 2003 Service Pack 2 3 WinRAR archiver Size 3 22MB oe Wait for the installation process to finish Please note that in some cases the Application Server component will not appear in the Add Remove Windows Components Wizard In case you do not see Application Server please look for Internet Information Service and check
58. rer File Edit View Favorites Tools Help ve Favorites f Endpoint Protector Reporting and Administration Tool fh GJ mp Page gt Safety Tools Welcome Guest Endpoint Reporting and Administration Tool English Protector 2009 Please provide the necessary credentials Username Password 97 Endpoint Protector Installation Guide 4 2 For Mozilla Firefox Open the Browser Open Endpoint Protector Administration and Reporting Tool IP address https 127 0 0 1 This Connection is Untrusted cay llama 192 168 0 225 but we can t confirm that your connection is Y then you ty to conect searely mc a Aana a that you taterik Anih this site s identity can t be verified What Should I Do hitches appe peterr ioi this error could mean that someone is trying to impersonate the site and you shouldn t continue From the above screenshot This Connection is Untrusted choose I Understand the Risks Click Add Exception Security Warning window pops up 98 Endpoint Protector Installation Guide Just click Get Certificate button and then the Confirm Security Exception button Gy httos 192 168 0 225 Add Security Exception This Connection is Un You have asked Firefox to connect secu connection is secure Normally when you try to connect sec are going to the right place However t What Should I Do If you usually connect to this site witho impersonate
59. rver Please follow these detailed next steps for a successful installation 2 1 3 Install NET Framework 2 0 After you have downloaded the package run the dotnetfx exe and follow the instructions 2 1 4 Install MS SQL or MS SQL 2005 Express Server and Server Management Studio Run the installer and complete installation process with default settings When asked choose Mixed Mode Windows Authentication and SQL Server Authentication and set up your password On the following screen check Enable User Instances and click Next is Microsoft SOL Server 2005 Express Edition Setup Authentication Mode The authentication mode specifies the security used when E connecting to SOL Server g a Seleck the authentication mode to use For this installation C Windows Authentication Mode Mixed Mode Windows Authentication and SOL Server Authentication Specify the sa logon password below Enter password Eaa Confirm password iek Help lt Back Cancel 6 Endpoint Protector Installation Guide jir Microsoft SOL Server 2005 Express Edition Setup x Configuration Options Configure user and administrator accounts i This option enables users without administrator permissions to run a separate instance of the SQL Server Express Database Engine Add user to the SOL Server Administrator role This option adds the user who is running the SOL Server Express installation program
60. s lt Back Next gt Cancel Click Browse button From the browser list select Trusted Root Certification Authorities Then click the Next button 95 Endpoint Protector Installation Guide Certificate Import Wizard Certificate 5 Content Another Completing the Certificate Import Wizard pops up Just click the Finish button 96 Endpoint Protector Installation Guide Security Warning window pops up Just click Yes Security Warning You are about to install a certificate from a certification authority CA daiming to represent 192 166 0 225 Windows cannot validate that the certificate is actually from 192 168 0 725 You should confirm its origin by contacting 192 168 0 225 The following number will assist you in this process Thumbprint shai BBSFDD48 E4807D8D SBCT580C SA6758F6 F2608000 Warming If you install this root certificate Windows will automatically trust any certificate issued by this CA Installing a certificate with an unconfirmed thumbprint is a security risk If you dick Yes you acknowledge this risk Do you want to install certificate ves E You have now successfully installed the Certificate Close the Internet Explorer browser and try to access the Endpoint Protector Administration and Reporting Tool IP address again gt Endpoint Protector Reporting and Administration Tool Windows Internet Explo
61. se parameters are required for the creation of a Certificate Authority Server Certificate and database access 23 Endpoint Protector Installation Guide Note ALL FIELDS ARE REQUIRED Endpoint Protector 2009 Server Configurator Ee xj Certificates Parameters state Company name Certificate Authority Password Certificate Authority Confirm Password Server Certificate Password Server Certificate Password Confirmation Server Host Mame Database Access Parameters Database Host Database Mame Database User Database Password Configuration Options Td RejCreate database and loaddetautt data ri Re create the securty certificates Configure Exit This application will set up all the configuration parameters for Endpoint Protector Enter the required information into the configuration window You can find what information you need to enter in the paragraph called Endpoint Protector Configurator If you do not know what information you need to enter here please go to the paragraph called Endpoint Protector Configurator now Note Endpoint Protector uses by default the 443 port If this port is occupied by another Website the Endpoint Protector Configurator will prompt you to introduce a different port This port is also necessary when installing the Endpoint Protector Client 24 Endpoint Protector Installation Guide Endpoint Protector 2009 Server Configurat
62. see the Zend Optimizer Installation Guide 61 Endpoint Protector Installation Guide epp localhost home epp Fle Edit View Terminal Tabs Help Zend Optimizer 3 ZEND LICENSE AGREEMENT Zend Optimizer ZEND TECHNOLOGIES LTD ZEND SOFTWARE LICENSE AGREEMENT AGREEMENT IMPORTANT READ THESE TERMS CAREFULLY BEFORE INSTALLING THE SOFTWARE KNOWN AS THE ZEND OPTIMIZER AS INSTALLED BY THIS INSTALLATION PROCESS IN MACHINE EXECUTABLE FORM ONLY AND ANY RELATED DOCUMENTATION COLLECTIVELY THE SOFTWARE BY INSTALLING OR OTHERWISE USING THIS SOFTWARE YOU THE LICENSEE ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT AND THAT YOU AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT YOU ARE NOT AN AUTHORIZED USER OF THE SOFTWARE AND IT IS YOUR RESPONSIBILITY TO EXIT THIS INSTALLATION PROGRAM WITHOUT INSTALLING THE SOFTWARE OR TO DELETE THE SOFTWARE FROM YOUR COMPUTER 1 License Subject to the terms and conditions of this Agreement including without Limitation Section 2 hereof Zend hereby grants to Licensee during the Term as defined below a Limited a non exclusive Li g4 lt EXIT gt epp localhost home epp Fle Edit View Terminal Tabs Help fend Optimizer 3 IMPORTANT BY SELECTING THE YES OPTION BELOW DOWNLOADING INSTALLING OR OTHERWISE USING THIS SOFTWARE YOU ACKNOWLEDGE THAT YOU HAVE READ THE LICENSE AGREEMENT AND THAT YO
63. stallation scripts provided or it can be done manually The automated installation is recommended on systems recently installed or where the update of the following software will not inflict with existing applications installed Apache Web Server PHP PHP extensions OpenSSL MySQL Server The manual installation will require the user installing the Endpoint Protector software to install and update if required the software pre requisitions 47 Endpoint Protector Installation Guide 2 4 1 Endpoint Protector Automated Installation 2 4 1 1 Preparations Unzip the received archive from your Endpoint Protector provider to a temporary folder After that change the current folder to the folder where you have extracted the files All the following commands and installation of Endpoint Protector Server need to be done using root privileges For that please change user to root using su root Verify what version of Fedora you are running 32bit or 64bit the installation package contains both versions Command uname a epp localhost home epp File Edit View Terminal Tabs Help root locaLhost epp uname a A Linux Localhost localdomain 2 6 25 14 fc9 x86 64 1 SMP Thu May 1 06 06 21 EDT 2 008 x86 64 x86 64 x86 64 GNU Linux root localhost epp D 2 4 1 2 Installation Depending on your Red Hat version please run the installation script Command install x32 sh or install x64 sh Please note that you
64. the box next to it If IIS is already installed but is not working follow the previous steps to remove it and then use your CD DVD to reinstall the component 17 Endpoint Protector Installation Guide If you are still experiencing difficulties installing IIS please visit Microsoft Support http www microsoft com technet prodtechnol WindowsServer2003 Library IIS 750d3137 462c 491d b6c7 5f370d7f26cd mspx mfr true 2 1 11 Install IIS version 7 0 on Windows Server 2008 or install additional necessary Web Server roles In order to install IIS please follow these steps 1 Start Server Manager from Start Menu gt Administrative Tools gt Server Manager if Storage lore Start Search A Oe a Psn jame 2 Add a Web Server Role to the machine Roles Summary Help Sm AddR aa Remove Roles 18 Endpoint Protector Installation Guide 3 Select a Web Server and click the Next button J Add Roles Wizard Select Server Roles Select one or more roles to install on this server Roles Description 4 k S A a eee 14 P i ia Web Server H5 C Active Directory Certificate Services Web Server 115 provides a reliable manageable and scalable Web Role Services _ Active Directory Domain Services application infrastructure 2 E Active Directory Federation Services Active Directory Lightweight Directory Services Progress E Active Directory Rights Management Services Pende Applicat
65. the site and you shouldn t Close the browser and start it again Endpoint Protector Reporting and Administration Tool Mozilla Firefox Please provide the necessary credentials Username Password C toon 5 Support In case additional help such as the FAQs or e mail support is required please visit our Support website directly at http www cososys com help html One of our team members will contact you in the shortest time possible Even if you do not have a problem but miss some feature or just want to leave us general comment we would love to hear from you Your input is much appreciated and we welcome any input to make computing with portable devices Safe and convenient 6 Important Notice Disclaimer Security safeguards by their nature are capable of circumvention CoSoSys cannot and does not guarantee that data or devices will not be accessed by unauthorized persons and CoSoSys disclaims any warranties to that effect to the fullest extent permitted by law 2004 2010 CoSoSys Ltd Endpoint Protector Basic EPPBasic Endpoint Protector My Endpoint Protector are trademarks of CoSoSys Ltd All rights reserved Windows is registered trademark of Microsoft Corporation Macintosh Mac OS X are trademarks of Apple Corporation All other names and trademarks are property of their respective owners
66. tificates Configure Exit This application vill set up all the configuration parameters for Endpoint Protector 25 Endpoint Protector Installation Guide All fields are necessary Certificate Authority Password You must define a password for certificate authorizations in your system You use this password when importing a certificate into ITS Server Certificate Password You must define a password for server certificate authorizations This enables server authentication on the client side The client verifies the server s identity using ssl mechanism The server sends the public key of the server certificate as part of SSL key handshake Database Host This is the address to the database itself If the database is on the same computer where you installed Endpoint Protector Server than the correct format is SQLExpress without quotes If the database is on a different computer please see the Using a database from another location paragraph Please pay close attention to capital letters SQLExpress and computer names must be written as such Database Name The name of the database which you created earlier in this case EPP Database User The login that you created for your database epp Database Password The password you created for the database user 26 Endpoint Protector Installation Guide 2 1 16 Final Steps 1 Restart IIS Admin service To do this go to Start gt Run and
67. tity equal to the number indicated on th e applicable License Instrument An upgrade to an existing License shall not be deemed to increase the number of Licenses which You are authorized to use Addit lonally if You upgrade a Licensed Software License or purchase a Licensed Soft ware License Listed on the applicable License Instrument to cross grade an exist The steps of installation of Endpoint Protector Server epp localhost home epp Desktop EndpointProtector RedHat2 2 2 Fle Edit View Terminal Tabs Help ee Endpoint Protector Installation RedHat Edition t CoSoSys LTD Contact Informations Phone 40 264 593 110 t Fax 40 264 593 113 WEB www COSOSYS COM i www endpointprotector com Email support cososys com E EERE EEE EEE ERE ERR ERE REE REE EERE EE EE EEE Check System for Software Requirements Install System Requirements Software Automated Install System Requirements Software Advanced Install Endpoint Protector Software Configure Endpoint Protector Software Exit lease enter option 1 6 49 Endpoint Protector Installation Guide 1 Testing your system configuration for required software epp localhost home epp Desktop EndpointProtector RedHat2 2 2 File Edit View Terminal Tabs Help i Endpoint Protector Installation RedHat Edition SERRRERRREDPEREEEERREREREREEEEREEEEREEREEE Check System for Software Requirements Checking for Apache version
68. ts Resolving Dependencies gt Running transaction check gt Package php xml x86 64 0 5 2 6 2 fc9 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Version Repository Installing php xmL x86 64 5 2 6 2 fc9 updates Transaction Summary Install 1 Package s Update Package s Remove Package s Total download sive 102 k Is this ok y N y yum install php mbstring epp localhost home epp File Edit View Terminal Tabs Help Another app is currently holding the yum Lock waiting for it to exit Setting up Install Process Parsing package install arguments Resolving Dependencies gt Running transaction check gt Package php mbstring x86 64 0 5 2 6 2 fc9 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Version Repository Installing php mbstring x86 64 5 2 6 2 7c9 updates Transaction summary Install 1 Package s Update Package s Remove Package s Total download size 1 1 M Is this ok y N y yum install php xmlrpc 59 Endpoint Protector Installation Guide epp localhost home epp File Edit View Terminal Tabs Help updates Setting up Install Process Parsing package install arguments Resolving Dependencies gt Running transaction check gt Package php xmlrpc x86 64 6 5 2 6 2 fc9 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Versi
69. uation sbin chkconfig mysql on sbin chkconfig httpd on These commands will force the two components to start automatically with the system 54 Endpoint Protector Installation Guide 2 4 2 Endpoint Protector Manual Installation 2 4 2 1 Preparations Unzip the received archive from your Endpoint Protector provider to a temporary folder After that change the current folder to the folder where you have extracted the files All the following commands and installation of Endpoint Protector Server need to be done using root privileges For that please change user to root using su root 2 4 2 2 Installation of required software Endpoint Protector requires the following software to be installed on your Red Hat system installed Apache Web Server version 2 X To install this manually your can issue the command yum install httpd epp localhost home epp File Edit View Terminal Tabs Help gt Running transaction check gt Package httpd x86 64 0 2 2 9 1 fc9 set to be updated gt Processing Dependency httpd tools 2 2 9 1 fc9 for package httpd gt Running transaction check gt Package httpd tools x86 64 0 2 2 9 1 fc9 set to be updated gt Finished Dependency Resolution Dependencies Resolved Package Arch Version Repository Updating httpd x86 64 2 2 9 1 fc9 updates httpd tools x86 64 2 2 9 1 fc9 updates Transaction Summary Package s 2 Package s Package s Total download size 1 0 M
70. up 2 3 2 8 msi qn WSIP 192 168 0 35 To uninstall the client using command prompt please run the following command msiexec x EPPSetup 2 3 2 8 msi qn 4 Installing Root Certificate to your Internet Browser 4 1 For Microsoft Internet Explorer Open Endpoint Protector Administration and Reporting Tool IP address https 127 0 0 1 If there is no certificate in your browser you will be prompted with Certificate Error page like the screenshot below Certificate Error Navigation Blocked Windows Internet Explorer 6o B https 192 168 0 225 RARIS File Edit View Favorites Tools Help ue Favorites Certificate Error Navigation Blocked r v Pager Safety Too x There is a problem with this website s security certificate A The security certificate presented by this website was not issued by a trusted certificate authority Security certificate problems may indicate an attempt to fool you or intercept any data you send to the server We recommend that you close this webpage and do not continue to this website Click here to close this webpage 9 Continue to this website not recommended More information Continue your navigation by clicking W continue to this website not recommended Now go to the Certificate file you downloaded and install the Certificate 92 Endpoint Protector Installation Guide Click the Certificate Error button just next to th
71. window click on Browse A list of available users will appear RES Fe Micrasoft SOL Server Management Studio Express File Edit Vin New Database 2 New Query Select a page N ES Script 3 3 Help General i Browse for Objects c 6 objects were found matching the types you selected Matching eas al BUILTIN Administrators bject Types growth BUILTIN Users MB unrestricted growth 1 percent unrestricted growth INT AUTHORITYSSYSTEM sa W2003SE SQLS erver2005MSSOLUser w2003SE SQLEXPRESS Login heck Nemes Conne Server W200 LEXPR Connection W 2003S E Administrator 2 View connection properties Progress Ready Add Remove A 4 Check the box next to the user epp and click OK 13 Endpoint Protector Installation Guide i Ob E Replica me Fil J3 MB th E Manage ep By unrestricted growth By 10 percent unrestricted growth Server W2003SE SQLEXPRESS Connection W 20035 E Administrator a View connection properties Notice that the Owner has been changed to epp Click OK to finish Please make sure that you set the correct Collation for this database This is essential for the correct display of characters This can be done by right clicking the newly created database selecting Properties then Options from the left side of the window and choosing
72. ws XP then in the same Group Policy Object go under Computer Configuration gt Administrative Templates gt System gt Logon and enable the Always wait for computer network to startup at logon GPO This is required for the client computers to have access to the shared network folder at reboot fi Group Policy Object Editor aia File Action wiew Help e Hm Ee em Test Serv ad cososys com Policy Setting Computer Configuration j B Software Settings B windows Settings eid Don t display the Getting Started welcome screen at logon Mot configured Eel Always use classic logon Mok configured i Run these programs at user logon Mot configured sg Administrative Templates Ei Do not process the run once list Mok configured a Wingo vie CBMRENE AEs ed Do not process the legacy run list Mok configured Spee Bete Always wait For the network at computer shartup and logon Enabled FS User Profiles ia Scripts EE Logon H E Met Logon Fe Group Policy ka Remote Assistance i f E System Restore H E Error Reporting ial Windows File Prote l Remote Procedure H E Windows Time 5er a Internet Communic o E Distributed COM H E Network aa Printers Eg User Configuration a ga Software Settings H E windows Settings E E Administrative Templates 4 M Extended Standard Next time each computer from this OU reboots the startup script will run and it will install Endpoint Protector
73. ze z26 95MB Space available ndk A oe Size 6 30MB Size 17 27MB Size 4 24MB i Windows Server 2003 Service Pack 2 WinkaR archiver In the new window check the box next to Internet Information Services IIS and click OK 16 Endpoint Protector Installation Guide fe Add or Remove Programs Currently installed programs in Show updates Sort by r hare v Windows Components Wizard si z 45 33MB a I E Windows Cor I You can rr Tadd or removes component click the check box A shaded box means that only part keel Add Mew ofthe component will be installed To see what s included in a component click Details Programs To add or re a A hec 20 396 Subcomponents of Application Server O ha Application Server Console ral poo OUME Cs Component O y4SP NET a E145MB ddi Reriowe an M Ge Enable network COM access Windows prope EW Enable network DTC access Compa ments kal ee Rs m ae eM nemet Information Services I5 2r 4 ME ge ec SOME O EP Message Queuing D 67MB x Description Description 11S Includes web FTP SMTP and NNTP support along with support for F rontPage Server Extensions and Active Server Pages ASP Total Pa 7 _ 28 95MB i otal di se Total disk space required 44 MB Details Space available on disk 24690 9 ME ee 8 38MB 17 27mB 4 18MB 1 30MB 4 24MB i Windows Server 2003 Service Pack 2 3 WinRAR archiver Size 3 22MB oe fe Add o

Download Pdf Manuals

image

Related Search

Related Contents

Energizer EZ-PWRPACK02    Configuring a controller    Manuel d'utilisation  

Copyright © All rights reserved.
Failed to retrieve file