Video Screencast Help
Welcome to Symantec Connect
Solve problems, Share knowledge, Earn rewards.

Connect communities are where Symantec business customers, partners, and employees find solutions, share technical knowledge, and submit product ideas.

Join the conversation with over 345,190 registered members.

Your Community

Content is grouped in communites around products and topics:


Earn rewards points whenever you participate on Connect.

IT Trends

Follow conversations about today's IT Trends.

Connect ActivityRSS

new discussion 24 Jul 2014
How do I resolve the following error on Microsoft Exchange 2007    the requested operation was partially successful(1)   21/07/2014 12:50:01 AM - Info nbjm(pid=3496) starting backup job (jobid=77468) for client odmexcmbx01.ondigitalmedia.local, policy EXCHANGE-MAILBOX, schedule Daily   21/07/2014 12:50:01 AM - Info nbjm(pid=3496) requesting STANDARD_RESOURCE resources from ...
updated blog entry 24 Jul 2014
Today SSL is an integral part of online businesses and any secured communication. It is however not an area that many system administrators or security experts are comfortable with. For most administrators the correct installation of the private key and its corresponding certificate is sufficient. As long as the green bar, the padlock, or https:// can be seen during the SSL/TLS negotiation, ...
updated blog entry 24 Jul 2014
In the blog, I will introduce details about Amazon S3 cloud migrator feature & its usage in Enterprise Vault. This will help you to understand architecture, feature details, how to use it as secondary migrator in Enterprise Vault & if any problem, how to start troubleshooting it.     In Enterprise vault world, what is use of Amazon S3 cloud migrator? Customer can use ...
updated blog entry 24 Jul 2014
A special request was made today: "How does SSL work? What is an SSL handshake?" Here are some quick info.   SSL/TLS are protocols used for encrypting information between two points. It is usually betwen server and client, but there are times when server to server and client to client encryption are needed. For the purpose of this blog, I will focus only on the negotiation between server ...