Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Welcome to Symantec Connect
Solve problems, Share knowledge, Earn rewards.

Connect communities are where Symantec business customers, partners, and employees find solutions, share technical knowledge, and submit product ideas.

Join the conversation with over 358,321 registered members.

Your Community

Content is grouped in communites around products and topics:


Earn rewards points whenever you participate on Connect.

IT Trends

Follow conversations about today's IT Trends.

Connect ActivityRSS

new discussion 30 Oct 2014
Hello.  Here is the environment: EV and DA 10 SP4 CHF3 SQL Server 2005 Enterprise Edition x64 on MS Windows 2008 R2 Enterprise Edition SQL Server is a 3 node failover cluster   My question is about MSDTC.  Does Enterprise Vault or Discovery Accelerator use MSDTC?  Is it recommended/best practice to configure a MSDTC per application (for each SQL Server node in ...
updated discussion 30 Oct 2014
Hi I have scheduled searches that looks they were never kicked off that users want to delete. For example., the one highlighted below - not enabled, never run. Users don't want these kinds of seaches cluttering the screen. thanks!
updated discussion 30 Oct 2014
Hi I want to pull details of specific unaccepted searches in CA. Specifcally I want the email address of the From and To recipients. I have this query which gives me everything except email addresses. Is this data stored in the CA databease? Thanks   /****** Script for SelectTopNRows command from SSMS  ******/ SELECT TOP 100000 [SearchItemID]       ...
updated blog entry 30 Oct 2014
Ah, Halloween, the one night of the year where ghosts and goblins are free to haunt us in the dark of night. Malware and viruses, however, are free to terrorize us all year long. In honor of this horrific holiday, we’ve conjured up a list of the 5 most frightful viruses demonizing computer users everywhere.   W32.Koobface An anagram of Facebook, this creepy worm will spread through ...
updated discussion 30 Oct 2014
How much cybersecurity does a company owe its customers? Security expert, Ian McShane, will explore this question and others in more detail in a #DirtyTopics chat, Underinvesting in Cybersecurity, on Thursday, August 21 at 11 a.m. PT / 2 p.m. ET. If you have questions about how much cybersecurity is enough, Ian can help. Topic: Underinvesting in Cybersecurity Date: Thursday, August 21, ...