Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Symantec Endpoint Protection is in need of a customizable Trusted Process setting or policy instead of having only hard coded Trusted Processes such as Windows Indexer.  There is a policy based setting that states "Do not scan file when trusted ...
Idea by SEP_Admin_Nic | 26 Nov 2014 | 1 comment
We have a requirement to perform a BMR backup on  Suse Linux 11  clients configured with Persistent Device Names (Etrack 2554905).  And we are unable to do this due to the unsupported disk persistent device names as per  technote ...
Idea by jeff_menil | 20 Oct 2014 | 0 comments
The Protection Engine (formerly named as Scan Engine) download the updates from Internet by default, but, we can configure it to update from LiveUpdate Administrator. Such kind of configuration will be very useful if the customer has a LUA in their ...
Article by yang_zhang | 01 Oct 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 22 Sep 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 22 Sep 2014 | 1 comment
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 05 Sep 2014 | 0 comments
  The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how ...
Article by GFK | 27 Aug 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 27 Aug 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 25 Aug 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 20 Aug 2014 | 0 comments