Post-installation tasks: Symantec Mail Security for Domino ( SMSDOM )

book

Article ID: 159256

calendar_today

Updated On:

Products

Mail Security for Domino

Issue/Introduction

 

Post-installation tasks that you need perform after you install or upgrade to Symantec Mail Security for Domino.

Resolution

Please review the Post-Installation Tasks in the below Installation Guides to review all requirements for Symantec Mail Security for Domino.

Symantec Mail Security 8.1.x for Domino Windows Installation Guide
http://www.symantec.com/docs/DOC5369

Symantec Mail Security 8.1.x for Domino AIX Installation Guide
http://www.symantec.com/docs/DOC5368  
 
--> Here some for your reference: (for more information on any of the following example please read the related paragraphs in the Guide) <--

  • Sign the Mail Security databases
    Before you open the databases for the first time, sign the Mail Security databases with a trusted Notes ID file. See “Signing the Mail Security databases to certify integrity”
  • Grant rights to run unrestricted agents
    You can give a user rights to enable, disable, or modify unrestricted agents. See “Granting rights to run unrestricted agents
    • To grant users rights to run unrestricted agents:
      1. Open Domino Administrator.
      2. On the Configuration tab, in the left pane, double-click Server.
      3. In the left pane, under Server, click All Server Documents.
      4. In the right (view) pane, double-click the server on which Mail Security runs.
      5. On the action bar, click Edit Server.
      6. On the Security tab, under Programmability Restrictions, in the Run unrestricted methods and operations box, add the users to whom you want to grant rights to enable, disable, or modify agents.
      7. On the action bar, click Save & Close. 
    • This is what it looks like:

 

  • Set access control
    The access control settings establish who can access the Mail Security databases. See “Restricting access to Mail Security databases
    • To maintain security in your Lotus Domino environment, restrict access to the Mail Security databases to administrators by setting the Access Control List (ACL) for following databases:
      • Settings (sav.nsf)
      • Log (savlog.nsf)
      • Quarantine (savquar.nsf)
      • Definitions (savdefs.nsf), if used
    • The Quarantine database requires that you also assign roles to Quarantine database users. These roles restrict access to various Quarantine views and control who can release documents from the Quarantine. When you set access control for the Quarantine database, you must assign roles to those groups and users who use the Quarantine.
    • This is what it looks like:

 

 


Attachments