Video Screencast Help
Welcome to Symantec Connect
Solve problems, Share knowledge, Earn rewards.

Connect communities are where Symantec business customers, partners, and employees find solutions, share technical knowledge, and submit product ideas.

Join the conversation with over 399,254 registered members.

FIND
Your Community

Content is grouped in communites around products and topics:

EARN
Rewards

Earn rewards points whenever you participate on Connect.

EXPLORE
IT Trends

Follow conversations about today's IT Trends.

Connect ActivityRSS

new discussion 03 Jun 2015
Hi, NetBackup master/media/BMR master/boot server 7.6.1.2  OS:redhatlinux65  ( one physical machine ) SRT redhatlinux65  six NetBackup clients 7.6.1.2:  redhatlinux6.6 KVM on top of redhatlinux6.5; NetBackup client software was installed on each VM. one NetBackup client 7.6.1.2: redhatlinux59 KVM on top of redhatlinux6.5; NetBackup client software was installed on VM. I am ...
updated discussion 03 Jun 2015
Just wanted to know one technical stuff regarding restore of windows server. Sometime we came across few situations where we had to restore some application related xml/exe files from a windows server however we were not able to find those in normal backup. After further investigation we found that those files are getting backed up in System state and after restoring those files we are able to ...
new discussion 03 Jun 2015
Hello, I've read that Superseeded Bulletin are not reported "by design" in compliance report cf this article : https://www-secure.symantec.com/connect/forums/software-update-bulletin-dont-have-compliance-report But we need this information : is there any way to have a compliance report with all active Bulletin, even if this bulletin are superseeded ? In the actual situation, we are delivering ...
updated blog entry 02 Jun 2015
フィッシング詐欺を利用する攻撃者は、何らかのデータを盗み出そうとします。スピア型フィッシングともなれば、データベースごと盗み出そうとするかもしれません。 今日の企業が直面している多様な脅威のなかでも、標的型攻撃は特に厄介であることが多く、防ぐのも容易ではありません。最新のセキュリティインフラストラクチャを備えている企業でさえ、標的型攻撃を検知して遮断することは難しいと考えています。セキュリティの構成要素のなかで最も弱い部分を突いてくる、つまり人間を標的にしているからです。巧妙にカスタマイズされたスピア型フィッシングメールを作成したり、ブラウザの動作を悪用したりする攻撃者は、システムではなく人間を欺くほうが、ネットワークへの侵入は簡単だと考えています。 事実、シマンテックが発行する最新の『インターネットセキュリティ脅威レポート』(ISTR)によれば、標的型攻撃の件数は 2013 ...