Video Screencast Help

Search

Search results

Introduction This is the seventh of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 26 Feb 2015 | 1 comment
FAQ Scanning of network drives Q. Does an Administrator-Defined Scan scan the mapped network drives? A. No, it does not. However, if a file located on the network drive is run locally on the client computer and loaded in the ...
Article by Shulk | 20 Feb 2015 | 4 comments
Technical White Papers are designed to introduce Symantec partners and end users to key technologies and technical concepts that are associated with the Symantec Backup and Recovery product family. The information within a Technical White Paper will ...
Article by GFK | 13 Feb 2015 | 0 comments
This article contains some cases about problems in CEM environment, where you can find their root cause and possible solution for your case. Note!: All these description steps were done, using SMP 7.5 SP1 release build ! ...
Article by Igor Perevozchikov | 29 Jan 2015 | 0 comments
What is basically required to have SMP 7.5.x CEM functionality working via HTTPs using self-signed or non self-signed certificates Probably this information will be useful to know, if you're going to setup CEM in your environment. ...
Article by Igor Perevozchikov | 29 Jan 2015 | 7 comments
Note: This is based on SEPM v12.1.5 console. Your SEPM installation is running smoothly. There are no alerts going off from the Home page of the SEPM console. You sit back, feeling very pleased about how they are running. Then all of sudden ...
Article by Tony Sutton | 28 Jan 2015 | 0 comments
The Client Task Agent Command Line Utility The actual binary can be found in the ‘/opt/altiris/notification/ctagent/bin’ directory. A link to aex-cta is found in the ‘/usr/bin’ directory, which is in most Unix, Linux and Macintosh path ...
Article by dougj | 19 Jan 2015 | 0 comments
As of the Agent for Unix, Linux and Mac (ULM) 7.1, it is possible to configure which resource keys to ignore during generation of NSE events. This allows for exclusion of any values that would cause a conflict in a given environment. (An NSE event is ...
Article by dougj | 16 Jan 2015 | 0 comments
In some circumstances, it may be necessary to assign a new resource guid value to a Unix, Linux or Mac (ULM) client. This is typical in the case of merged computer resources in the NS console and two or more clients are assigned the same guid.    ...
Article by dougj | 16 Jan 2015 | 0 comments
Inventory tasks and policies include rules based on a default set of file extensions. These extensions are pre-defined in the Symantec_cmdb. In order to create a rule for a file extension that is not currently available in an inventory rule, the ...
Article by dougj | 16 Jan 2015 | 0 comments