Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Hello All, Lots of people are facing issue to scan their network for shellshock vulnerability with CCSVM. Follow the below steps and you are ready to scan for shellshock vulnerability: 1. In the CCSVM Console Web interface, click Administration ...
Article by isaneh | 08 Oct 2014 | 0 comments
The Project has been designed to address a business requirement of a client who has a valid use case to modify the resolution date time and text when ticket is either resolved or closed.  The Project checks the following things before it allow ...
Article by SandeepShrivastava | 12 Aug 2014 | 0 comments
By default, the Select User field (or more precisely, Check if User Exists Using Email Address button next to it) on Submit Incident (Advanced) form only accepts user's primary e-mail, not user's name. There have been questions about why it ...
Article by toomas | 05 Jun 2014 | 1 comment
DataPop v4 can be used with ITMS 7.1.2 and later.  The following steps describe how to implement it: Un.zip and run the attached Setup_EPMDataPopV4.EXE Press the [OK] button to initiate the Setup Wizard: Press ...
Article by SK | 06 Apr 2014 | 0 comments
From the previous article: https://www-secure.symantec.com/connect/articles/create-dlp-policy-special-user-group We introduced the method and steps to use AD to create DLP group policy. By using AD directory connection, we can create DLP ...
Article by yang_zhang | 02 Apr 2014 | 1 comment
1.  Summary 1.1  This document is the next in the series of my experience with the Symantec Management Platform project.  Specifically, this document is part two of two for the Mobile Device Management solution from Symantec.   1.2 ...
Article by ziggy | 31 Mar 2014 | 0 comments
Symante Critical System Protection (CSP) provides policy-based behavior control and detection for server and desktop computers. Symantec Critical System Protection provides a flexible computer security solution that controls application behavior, blocks ...
Article by yang_zhang | 22 Mar 2014 | 0 comments
Cena comum no departamento de TI de praticamente qualquer empresa: Precisamos comprar um novo Storage! Seja porque o Storage atual está próximo a ficar sem garantia, ou não suporta mais a performance dos ambientes a que serve, ou mesmo a necessidade ...
Article by RAPHAEL F CARVALHO | 06 Mar 2014 | 0 comments
If any part of a business today could be the most critical for success, it would be the company's email system. Numerous Osterman Research surveys show that the majority of decision makers prefer to maintain the responsibility for email inside ...
Article by Darryl_R | 28 Feb 2014 | 0 comments
This article includes the evolution of a report, by merging two queries together. DISCLAIMER:  The machine names, IP Addresses and Domain names are ficticious lab values that no longer exist.   The following query utilises default SMP ...
Article by SK | 27 Jan 2014 | 6 comments