Video Screencast Help
Welcome to Symantec Connect
Solve problems, Share knowledge, Earn rewards.

Connect communities are where Symantec business customers, partners, and employees find solutions, share technical knowledge, and submit product ideas.

Join the conversation with over 379,230 registered members.

Your Community

Content is grouped in communites around products and topics:


Earn rewards points whenever you participate on Connect.

IT Trends

Follow conversations about today's IT Trends.

Connect ActivityRSS

updated blog entry 03 Mar 2015
Em nosso primeiro artigo desta série, discutimos os desafios enfrentados pelos administradores de TI na adoção do Android no local de trabalho. Para o departamento de TI, o Android apresenta vários obstáculos à segurança devido à sua plataforma de código aberto, variedade de fabricantes de dispositivos, provedores e diferentes versões de sistemas operacionais para dispositivos ...
updated blog entry 03 Mar 2015
ITMS 7.6 Nouveautés La nouvelle version 7.6 (nom de code Snowbird) intégre les nouvelles fonctionnalités suivantes: CEM: Cloud Enablement Management pour les Macintosh (Gérer les macs over Internet/https) CEM: Support de certificats externes, et du "load-balancer" F5 PXE: Support de multiples versions de PXE, cela peut être utile et nous éviter des refontes de preboot et le ...
updated video 03 Mar 2015
Symantec Mobility: Suite's mobile device management (MDM) features provide detailed information about devices enrolled with your Mobility Suite. MDM features allow you to secure, manage, locate, lock, reset password, revoke all apps, create device policies, and more. The Symantec Mobility Manager Dashboard page gives you a visual snapshot of the activity occurring with your organization.
new discussion 03 Mar 2015
Hello, I have  customer who requires the ability to log or audit the activities of administrative users. From my experience this functionality does not exist. Can anyone please confirm my understanding? Cheers Cameron
updated blog entry 03 Mar 2015
When I think of the cyber security realm, three characteristics come top of mind- Velocity, Volume and Variety. These three facets of the attack landscape make security a consistently moving target. It’s one of the only verticals where an active attack actor can change the state of an industry with a touch of keyboard. Over the last decade we have had a front row seat to witness the evolution ...
updated discussion 03 Mar 2015
We are living  more than 3 years with ghost 2.5.  We need support for more system and new hardware. When will come new Ghost solution Suite 3.0 Raff
updated blog entry 03 Mar 2015
March is Women’s History Month in the United States, and March 8th marks International Women’s Day around the world.  At Symantec, we want to take this time to reflect on the contributions women have made in the history of technology, celebrate our communities of women at Symantec through SWAN, and highlight some of our inspirational partners in gender around the world. “Weaving the ...