Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

Currently Symantec requires the services account to have several user rights privledges. It also requires membership of backup operators and  domain or local administrators (TECH36718).  This conflicts with best practices, security strategies, and is ...
Idea by IT@SA | 18 Aug 2014 | 0 comments
Abstract :  Enhancement request for selecting the Media server to perform the restore from an OST disk pool when multiple Media Servers have access to the disk pool. A Data Domain OST disk pool can be accessed by multiple Media servers that can ...
Idea by user0000 | 26 Apr 2013 | 2 comments
Abstract :  Enhancement request for restoring from a non-primary backup copy residing on OST disk pool.  With the introduction of OST technology and ability to perform optimized-duplication of backups across sites, the creation of multiple backup ...
Idea by user0000 | 26 Apr 2013 | 0 comments
Here's a common use case: You have a large data set in-scope for review. While the attorneys are working on defining the scope of the review, there is back-and-forth with the regulator/subpoena-issuer/opposing-party, etc, to this end. Your ...
Idea by athorn | 05 Mar 2013 | 0 comments
  1. Field ItemId, defined as NVARCHAR(255), always contain the hexadecimal representation of a  SHA256 hash Considering the type of values kept in ItemId, it could have been defined as a VARCHAR(255), which would require half the space ...
Idea by Windows Admins | 16 Nov 2012 | 1 comment
I have an idea for the norton mobile application for the android market as well as, other mobile devices. I think it would be a good idea for people to be able to log their personal data from their mobile device to their preexisting norton accounts. I ...
Idea by Daniel_Green | 26 Oct 2012 | 0 comments
Good morning gentlemen  It would be great to create a failure analysis after disinfection in the operating system  It would be very good this fix in the system caused by malicious file example of an attack that metasploit using java and concept by ...
Idea by Fabiano.Pessoa | 31 Aug 2012 | 0 comments
  Hello; I want to backup SQL logs via log no truncate method. the DBA team asked to perform hourly log backups without truncation. i am using BE 2012-SP1a & log no truncate method option available only in " ONE TIME BACKUP ...
Idea by Parkar | 03 Aug 2012 | 0 comments
It is apparent to me and many others that the SMTP system in Backup Exec has been broken almost as long as I have been using it, sometime around 2005. That was probably before they were even taken over by Symantec, but the problem was able to be fixed ...
Idea by MBHB IT crew | 23 May 2012 | 2 comments
Hi, Thanks to read and participate on Idea section. Idea:  Symantec_CMDB on Oracle Cause: Many customers and accounts have Oracle. Some Altiris´s competitors support both (SQL and Oracle). Regards, Fábio Sanches ...
Idea by luke.s | 26 Apr 2012 | 0 comments