Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Summary This document details the process we have developed, and use, to schedule the delivery and receipt of assets that we track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, ...
Article by ziggy | 19 Nov 2014 | 0 comments
Summary This document details the process we have developed, and use, to scan in the assets that we track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and ...
Article by ziggy | 19 Nov 2014 | 0 comments
Summary This document details the steps that we follow in order to complete, submit, and process a Move Form.  We complete a Move Forms when an asset: Moves locations. Re/Assigned to a new or different person Re/Assigned cost ...
Article by ziggy | 18 Nov 2014 | 0 comments
Summary This document details the Asset Types and Statuses that we have come to track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and adjust, review, and ...
Article by ziggy | 18 Nov 2014 | 2 comments
Summary This document details the steps that we follow for all surplus and Asset Recovery Services (ARS) activities for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and adjust, review, and apply to your ...
Article by ziggy | 18 Nov 2014 | 0 comments
IT Analytics DLP pack offers several predefined cubes out-of-the-box.  As part of the DLP pack, the custom attribute name and custom attribute value dimension are included.  These two dimensions contain data for custom attributes defined within DLP, ...
Article by dprager | 03 Nov 2014 | 0 comments
Overview The Symantec Endpoint Protection client for Linux provides Virus and Spyware protection and Auto-Protect features for supported Linux operating systems. It can be deployed using the Web link and email or Save package method from ...
Article by Shulk | 15 Oct 2014 | 0 comments
Hello All, Follow the below steps and you are ready to scan for Heartbleed vulnerability: 1. In the CCSVM Console Web interface, click Administration from the top menu. Under the Scan Options Section on the administration page, click the manage ...
Article by isaneh | 15 Oct 2014 | 0 comments
This article is intended to give a reliable method for using Ghost to capture Windows 8.1 update 1 images for deployment. Currently, Ghost has difficulty with Apps. Apps in Windows 8.1 refer specifically to a class of programs installed via the Windows ...
Article by Randall Newnham | 14 Oct 2014 | 0 comments
In ogni computer Windows sono normalmente installati numerosi programmi che nel corso del tempo richiedono un aggiornamento a seguito delle più recenti versioni rilasciate dai produttori. Installare questi aggiornamenti costituisce una pratica di buona ...
Article by riva11 | 08 Oct 2014 | 0 comments