添加链接
link管理
链接快照平台
  • 输入网页链接,自动生成快照
  • 标签化管理网页链接
相关文章推荐
愉快的单车  ·  Dell G15 5530 ...·  2 月前    · 
温暖的消炎药  ·  5000人夜排抢玩偶 ...·  1 年前    · 
面冷心慈的日光灯  ·  Zabbix系列:SNMP ...·  1 年前    · 
  • The SEPM must be using a 3 rd party certificate.
  • Follow Updating or restoring a server certificate to configure the SEPM to use a certificate other than the default self-signed certificate.  For more information, see About server certificates .
  • Self-signed certificates (the SEPM default configuration) do not support HSTS.
  • The root certificate installed on each SEPM in the Trusted Root Certification Authorities.
  • Warning

    Enabling HSTS will cause the following items to not function properly.

  • Built-in Help pages in the SEPM.  Clicking Help -> Help Topics within the SEPM will display a browser page indicating “This content cannot be displayed in a frame.”
  • SEPM Web Console (port 8443) when using the SEPM IP address.
  • Using the SEPM Hostname to access the Web Console remains unaffected.
  • Java remote console is unaffected.
  • Steps to enable HSTS for semsrv service on port 8443

  • Stop the SEPM services.
  • Symantec Endpoint Protection Launcher
  • Symantec Endpoint Protection Manager
  • Symantec Endpoint Protection Manager API Service
  • Symantec Endpoint Protection Manager Webserver
  • Open …\<SEPM install directory>\tomcat\conf\web.xml with a text editor.
  • Navigate to the section “Built in Filter Definitions”.  The first filter is httpHeaderSecurity, it is commented out.  On the next line below the closing comment (-->) copy and paste in the following filter configuration.
  • <filter>
    <filter-name>httpHeaderSecurity</filter-name>
    <filter-class>org.apache.catalina.filters.HttpHeaderSecurityFilter</filter-class>
    <init-param>
    <param-name>hstsEnabled</param-name>
    <param-value>true</param-value>
    </init-param>
    <init-param>
    <param-name>hstsMaxAgeSeconds</param-name>
    <param-value>31536000</param-value>
    </init-param>
    <init-param>
    <param-name>hstsIncludeSubDomains</param-name>
    <param-value>true</param-value>
    </init-param>
    <async-supported>true</async-supported>
    </filter>
  • Navigate to the section “Built in Filter Mappings".  The first filter is httpHeaderSecurity, it is commented out.  On the next line below the closing comment (-->), copy and paste in the following filter-mapping configuration.
  • <filter-mapping>
    <filter-name>httpHeaderSecurity</filter-name>
    <url-pattern>/*</url-pattern>
    <url-pattern>*</url-pattern>
    <dispatcher>REQUEST</dispatcher>
    </filter-mapping>
  • Start the SEPM services.
  • Symantec Endpoint Protection Launcher
  • Symantec Endpoint Protection Manager
  • Symantec Endpoint Protection Manager API Service
  • Symantec Endpoint Protection Manager Webserver
  • Verify the Web Console is working by logging into https://<Hostname>:8443 .
  • Steps to enable HSTS for semwebsrv service (httpd) on port 8445 and 443

  • Stop the SEPM services.
  • Symantec Endpoint Protection Launcher
  • Symantec Endpoint Protection Manager
  • Symantec Endpoint Protection Manager API Service
  • Symantec Endpoint Protection Manager Webserver
  • Open …\<SEPM install directory>\apache\conf\ssl
  • In a text editor, open ssl.conf and add the following line at the bottom, then save the file.
  • Header always set Strict-Transport-Security "max-age=63072000; includeSubDomains; preload"
  • In a text editor, open sslforclients.conf and add the following line at the bottom, then save the file.
  • Header always set Strict-Transport-Security "max-age=63072000; includeSubDomains; preload"
  • Start the SEPM services.
  • Symantec Endpoint Protection Launcher
  • Symantec Endpoint Protection Manager
  • Symantec Endpoint Protection Manager API Service
  • Symantec Endpoint Protection Manager Webserver
  • Additional Information on HSTS for port 8446:

  • It is possible to enable HSTS on port 8446; however the configuration won't have an actual effect. This is because HSTS is used to direct a client to only use HTTPS when trying to communicate to a specific service. In the case of the SEPM API Service (running on port 8446), the service -only- responds to HTTPS traffic by default; it will not respond to HTTP traffic. As such, the HSTS header is actually meaningless to the client, as it must already use HTTPS regardless.
  •