Please review the Post-Installation Tasks in the below Installation Guides to review all requirements for Symantec Mail Security for Domino.
Symantec Mail Security 8.1.x for Domino Windows Installation Guide
http://www.symantec.com/docs/DOC5369
Symantec Mail Security 8.1.x for Domino AIX Installation Guide
http://www.symantec.com/docs/DOC5368
--> Here some for your reference: (for more information on any of the following example please read the related paragraphs in the Guide) <--
- Sign the Mail Security databases
Before you open the databases for the first time, sign the Mail Security databases with a trusted Notes ID file. See “Signing the Mail Security databases to certify integrity”
- Grant rights to run unrestricted agents
You can give a user rights to enable, disable, or modify unrestricted agents. See “Granting rights to run unrestricted agents ”
- To grant users rights to run unrestricted agents:
- Open Domino Administrator.
- On the Configuration tab, in the left pane, double-click Server.
- In the left pane, under Server, click All Server Documents.
- In the right (view) pane, double-click the server on which Mail Security runs.
- On the action bar, click Edit Server.
- On the Security tab, under Programmability Restrictions, in the Run unrestricted methods and operations box, add the users to whom you want to grant rights to enable, disable, or modify agents.
- On the action bar, click Save & Close.
- This is what it looks like:

- Set access control
The access control settings establish who can access the Mail Security databases. See “Restricting access to Mail Security databases”
- To maintain security in your Lotus Domino environment, restrict access to the Mail Security databases to administrators by setting the Access Control List (ACL) for following databases:
- Settings (sav.nsf)
- Log (savlog.nsf)
- Quarantine (savquar.nsf)
- Definitions (savdefs.nsf), if used
- The Quarantine database requires that you also assign roles to Quarantine database users. These roles restrict access to various Quarantine views and control who can release documents from the Quarantine. When you set access control for the Quarantine database, you must assign roles to those groups and users who use the Quarantine.
- This is what it looks like:
