Laserfiche WebLink
Chapter 3 - System Components <br />B. As with any network/system change, it is a good practice to install the software initially on a limited <br />number of computers and then monitor for performance or any other anomalies that were not occurring <br />prior to the installation of the software. Monitor for a one to two week period of time. If everything appears <br />to be fine, deploy on the rest of your system and monitor for problems. <br />20.3.3 SCHEDULED VIRUS PROTECTION RECOMMENDATIONS <br />1. Definition files should be updated before the scheduled scans are started. <br />2. Nightly scans should be configured so that they do not interfere with normal call activity or the nightly <br />maintenance routines (i.e. Backups, etc.). <br />3. All TriTech folders and files can be scanned during a scheduled virus protection scan. This includes the <br />Inform CAD file structure on the File Server, and the TriTech folder and all of its subfolders on business <br />servers and workstations, the Inform CAD file structure on Mobile Servers, and the Inform RMS file <br />stricture on Law RMS Servers and Workstations. As noted in the general recommendations network and/or <br />mapped drives should not be scanned. Do not scan the Inform CAD Q: (network drive) from a workstation.) <br />4. As noted in the Platform Specific Recommendations, Microsoft and EMC require files to be excluded from <br />any virus scanning to protect against data corruption. <br />a. UNDER NO CIRCUMSTANCES should the SQL Server's "Data" directory ever be scanned. <br />Configure your virus scan activities to exclude this directory, which on a typical SQL Server <br />installation will be the "\Program Files\Microsoft SQL Server\MSSQL\Data" directory. Disabling the <br />scanning of the SQL Server "Data" files by type is also acceptable, they can be identified by having <br />one of the following file extensions-*.mdf, .ndf, and *.ldf. The full Microsoft guidelines for <br />configuring SQL Server with Virus Protection software can be found at: <br />http://sgpporL.microsoft.comlkb/309422. <br />b. EMC recommends that the RepliStor "C:\Documents and Settings\All users\Application Data\Legato <br />Replistor Data" be excluded from active and scheduled scans. Refer to the RepliStor Administration <br />Guide for additional information. <br />5. Expect performance impacts during the scan. <br />6. Stagger scans across the system so that performance impacts will be dispersed. <br />7. Notify users about the scan and expected performance impacts. <br />20.3.4 ACTIVE SCANNING RECOMMENDATIONS <br />1. When implementing on -access scanning, it should be done in a conservative mariner. Heuristics should <br />NOT be used. Typically, the default configuration will have heuristics disabled. <br />2. Perform active scanning at the Network level where vulnerability of a virus infection is most likely, this is <br />generally where access to or from an outside source is possible such as an E-mail server or an Internet <br />server. <br />3. As noted in the Platform Specific Recommendations, Microsoft and EMC require files to be excluded from <br />any virus scanning to protect against data corruption. <br />a. UNDER NO CIRCUMSTANCES should the SQL Server's "Data" directory ever be scanned. <br />Configure your virus scar activities to exclude this directory, which on a typical SQL Server <br />installation will be the "C:\Program Files\Microsoft SQL Server\MSSQL\Data", D:\\MSSQL\DATA <br />and L:\MSSQL\Logs directories. Disabling the scanning of the SQL Server "Data" files by type is also <br />acceptable, they can be identified by having one of the following file extensions -*.md f .ndf, and *.Idf. <br />The full Microsoft guidelines for configuring SQL Server with virus protection software can be found <br />at: http://supportanierosoft.com/kb/309422 <br />8 <br />The contents of this material are confidential and proprietary to TriTech Software Systems, Inc. and may not be reproduced, 3 <br />published or disclosed to others without the prior written consent of TriTech Software Systems, Inc. <br />©2015 TriTech Software Systems <br />