Up to ten connections to Symantec Endpoint Protection Manager databases have been tested and supported, but you can specify any number of connections in your configuration. If you have a complex Symantec Endpoint Protection installation that uses replication, you can configure only one database connection per replication group.
For more information about the implications of replication groups and connections to the Symantec Endpoint Protection Manager instances, see the following topic.
To configure the connection to a Symantec Endpoint Protection Manager database
In ATP Manager, click Settings > Global.
In the Synapse section, check Enable Symantec Endpoint Protection Correlation, if it is not already checked.
Under Symantec Endpoint Protection Manager (SEPM) Databases, click +Add SEPM.
Specify the following information:
Select MS SQL from the drop-down list to collect logs from an external Microsoft SQL Server. Or select Embedded DB to collect logs from an embedded database.
Type the name of your Symantec Endpoint Protection Manager database server.
Type the database name. This field requires a specific name for the database itself, not the host name. The name that you type here is case-sensitive and must exactly match the database name that is configured in Symantec Endpoint Protection Manager.
Type the listening IP address for the database server or database server named instance. This IP address must be static.
Type the database server's listening TCP port or database server named instance. This port must be static.
User Name and Password
If you use a Microsoft SQL Server database, do one of the following:
Type the user name and password of the local Symantec Endpoint Protection Manager read-only account that can access the Microsoft SQL Server database.
Type the user name and password of a Symantec Endpoint Protection Manager account that you authenticated with a Microsoft Active Directory account. This account must have the appropriate logon permissions.
For details, see the Symantec™ Endpoint Protection Installation and Administration Guide.
If you use an embedded database:
Type the user name and password that you specified when you installed the log collector.