Video Screencast Help

Critical System Protection

Results for Critical System Protection

Ports Used by IT Analytics This article illustrates which ports are used for a successful installation of IT Analytics.  All of the ports listed are default ports for the service provided.  Each of these ports may be mapped to a different port ...
Article by dprager | 24 Sep 2012 | 0 comments
Understanding IT Analytics 7.1 Architecture Scenarios IT Analytics Solution 7.1 requires that the following components exist within the environment to run successfully: Symantec Management Platform, SQL Server Analysis Server and SQL Server Report ...
Article by dprager | 24 Sep 2012 | 0 comments
IT Analytics 7.1 uses pass-through authentication whenever a user accesses either reports or cubes.  When a user accesses a cube their credentials are passed to the Analysis Service to authenticate his connection.  This also applies to accessing reports; ...
Article by dprager | 24 Sep 2012 | 0 comments
IT Analytics provides a flexible security structure, modeled off the role and scope security of the Symantec Management Platform. Additionally, because IT Analytics uses standard technologies within Microsoft SQL Server (namely SQL Server Analysis ...
Article by dprager | 24 Sep 2012 | 0 comments
Content: Documentation Related articles Downloads Documentation The Symantec Critical System Protection 5.2 RU9 documentation is provided with the installation media (either CD or archive from ...
Article by Shulk | 23 Sep 2012 | 0 comments
Monitoring Virtual Agents in SCSP Through Syslog Aggregation Abstract: A short HOW-TO article depicting steps for setting up virtual agents in SCSP 5.2 RU8 MP4 for monitoring unsupported platforms via syslog. Overview Most UNIX-flavored ...
Article by Shulk | 23 Sep 2012 | 0 comments
As head of the Field Technology Sales organisation for Symantec in EMEA, I find myself in some extraordinarily interesting meetings. None more so than a recent half-day workshop with our technology peers at VMware down at Frimley in Camberley. It ...
Blog Entry by Neal Watkins | 22 Sep 2012 | 0 comments
Berlin, Germany Tue, 16 October, 2012 - 11:30 CEST - Thu, 18 October, 2012 - 14:00 CEST Zum 8. Mal ...
Event by uspange | 21 Sep 2012 | 0 comments
Symantec Critical System Protection allows organizations to monitor and protect physical and virtual data centers using granular, policy-based controls. Through a combination of host-based intrusion detection, intrusion prevention, and least privilege ...
Video by jjesse | 19 Sep 2012 | 1 comment
I need a solution Why is it so important to embrace https and leave htp behind? its becuase https is secured its becuase https is secured tunnel, no eaves dropping.. HTTPS ...
Forum Discussion by ygamedzro | 16 Sep 2012 | 2 comments