Video Screencast Help

Search

Search results

By default, the Select User field (or more precisely, Check if User Exists Using Email Address button next to it) on Submit Incident (Advanced) form only accepts user's primary e-mail, not user's name. There have been questions about why it ...
Article by toomas | 05 Jun 2014 | 1 comment
DataPop v4 can be used with ITMS 7.1.2 and later.  The following steps describe how to implement it: Un.zip and run the attached Setup_EPMDataPopV4.EXE Press the [OK] button to initiate the Setup Wizard: Press ...
Article by SK | 06 Apr 2014 | 0 comments
From the previous article: https://www-secure.symantec.com/connect/articles/create-dlp-policy-special-user-group We introduced the method and steps to use AD to create DLP group policy. By using AD directory connection, we can create DLP ...
Article by yang_zhang | 02 Apr 2014 | 1 comment
1.  Summary 1.1  This document is the next in the series of my experience with the Symantec Management Platform project.  Specifically, this document is part two of two for the Mobile Device Management solution from Symantec.   1.2 ...
Article by ziggy | 31 Mar 2014 | 0 comments
Symante Critical System Protection (CSP) provides policy-based behavior control and detection for server and desktop computers. Symantec Critical System Protection provides a flexible computer security solution that controls application behavior, blocks ...
Article by yang_zhang | 22 Mar 2014 | 0 comments
Cena comum no departamento de TI de praticamente qualquer empresa: Precisamos comprar um novo Storage! Seja porque o Storage atual está próximo a ficar sem garantia, ou não suporta mais a performance dos ambientes a que serve, ou mesmo a necessidade ...
Article by RAPHAEL F CARVALHO | 06 Mar 2014 | 0 comments
If any part of a business today could be the most critical for success, it would be the company's email system. Numerous Osterman Research surveys show that the majority of decision makers prefer to maintain the responsibility for email inside ...
Article by Darryl_R | 28 Feb 2014 | 0 comments
This article includes the evolution of a report, by merging two queries together. DISCLAIMER:  The machine names, IP Addresses and Domain names are ficticious lab values that no longer exist.   The following query utilises default SMP ...
Article by SK | 27 Jan 2014 | 6 comments
This article was written to outline some issues that were recently discovered and addressed.  Hopefully with the end that any customers currently still using Servicedesk 7.0 will fill additional motivation to take steps necessary to move to the current ...
Article by BRING | 24 Jan 2014 | 0 comments
How to assign security to a Role so that it can open the Resource Selector in order to either add or exclude resources to a collection?   01 Create a Role with these Global Privileges.   ...
Article by SK | 16 Jan 2014 | 0 comments