Solved

Symantec Endpoint - how do deploy a secondary server for a secondary location

Posted on 2009-04-14
2
1,046 Views
Last Modified: 2013-12-09
Hi

We are about to take over another company at another site and add their servers into our domain.  I would like to integrate their AV into our current Symantec Endpoint installation.  How do I add a secondary server so their servers get their updates from that server and not from ours through the remote link?

Thanks
0
Comment
Question by:lrkwalkers
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 15

Assisted Solution

by:xmachine
xmachine earned 200 total points
ID: 24146819
Hi,

You need to install the second server as (Replication Partner)

http://service1.symantec.com/support/ent-security.nsf/854fa02b4f5013678825731a007d06af/7634fc5ee39e1c5c882574670060698a?OpenDocument


A Symantec Certified Specialist @ your service
0
 

Accepted Solution

by:
lrkwalkers earned 0 total points
ID: 24174300
Ended up using a Group Update Provider.  http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2007092720522748

The link to the other company is only a slow VPN so replicating the database would have been sloooow.  Group Update Provider is a lot easier to do as well.

Thanks for the reply though...have given you 200 points since you replied!

Cheers
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

These are on the increase and getting more common these days. Users who use the Google search engine may complain of having their search redirected to unwanted sites, regardless of what browser is used. This happens when the system is infected with…
OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question