Video Screencast Help

Search

Search results

  本文在如何配置远程的配送中心上提供指导。短片也可用来提供关于此主题的其他指南: http://www.symantec.com/connect/videos/liveupdate-administrator-how-configure-remote-distribution-center。   远程配送中心,基于 Windows 2008 R2 (IIS 7.5) 确保 IIS 被安装在将运行远程的配送中心的 Windows 2008 R2 ...
Article by Machine Translation | 05 Apr 2012 | 1 comment
(请注意:此文是机器翻译结果,仅供参考,请评论此文是否有帮助,谢谢!)   喂,   有 Symantec Users 无法摆脱问题时的情况“做什么...“如何做...”和“在哪儿转到...??”关于 Symantec。   本文已创建,有最好的努力在回答问题的这些类型方面帮助 Symantec Users。   SymWISE(Symantec Web-based Information Sharing ...
Article by Machine Translation | 05 Apr 2012 | 0 comments
  Do we really need a Antivirus for Linux If someone feels Linux is Malware free or there is nothing called Linux Malwares then it is totally incorrect. Due to increasing popularity of Linux as Desktop using Gnome Environment the malware ...
Article by Vikram Kumar-SA... | 09 Mar 2012 | 20 comments
In the news….. The FBI will be losing their court granted hold over the DNS servers in March and they are planning to make them “go dark”. Rather than changing their green lights sabers to red, this will cause any machine still looking to ...
Article by Brandon Noble | 27 Feb 2012 | 1 comment
Hello, There have been Situations when Symantec Users are stuck with a Question "What to Do...", How to Do..." and "Where to Go...??" in reference to Symantec. This Article is created with the Best Effort to Assist ...
Article by Mithun Sanghavi | 15 Dec 2011 | 15 comments
This article provides guidance on how to configure a remote Distribution Center. A short video is also available to provide additional guidance on this topic: ...
Article by GrahamA | 07 Nov 2011 | 10 comments
  Les groupes peuvent être migrés depuis la Console d’Administration Symantec pour Macintosh (SACM - Symantec Administration Console for Macintosh) vers Symantec Endpoint Protection Manager (SEPM). Cette migration peut être faite comme partie ...
Article by John Q. | 11 Aug 2011 | 0 comments
  FakeAV is a detection for Trojan horse programs that intentionally misrepresent the security status of a computer. These programs attempt to convince the user to purchase software in order to remove non-existent malware or security risks from ...
Article by Mithun Sanghavi | 13 Apr 2011 | 9 comments
  The so called "NightDragon" is not a virus as is popularly belived, but rather a sophisticated combination of hacking and viruses. It did not involve the creation of new code, or a single Trojan per se, but rather used a combination of ...
Article by profman87 | 10 Feb 2011 | 0 comments
How to troubleshoot a failed install of SEP or SEPM?  While troubleshooting a failed install we need to follow a sequence of steps to resolve the issue.    Check the Install log on the Machine    For SEPM  check the  SEPM_Inst.log ...
Article by P_K_ | 25 Oct 2010 | 8 comments