Video Screencast Help

Search

Search results

SSE is a collection of reports commonly used by Backline support and Sustained Engineering. They are very useful for monitoring, administering and troubleshooting. An example can be seen at link below: (ITMS 7.5 - Checking Agent Plug-ins versions via ...
Article by Mauro Dalvit | 13 Jan 2015 | 0 comments
Steps to Configure SWS with SQL Server on Windows Authentication Mode. On the SQL Database Server: 1. Configure a SQL 2008 R2 (or any other SWS supported SQL version) Server with Windows authentication alone (Default SA account will be disabled). ...
Article by Christyt | 04 Jun 2014 | 0 comments
Today, there is a restriction in SWS that requires Microsoft SQL Server to be in a "mixed mode" authentication, i.e. to support both Windows authentication and SQL authentication. SWS needed SQL authentication because as part of the database ...
Article by Nirmal R | 27 Sep 2012 | 1 comment
Every time I’m on a SEP project, the database size always is a big subject for discussion, especially for a large environment. The SEP DB sizing tool as we know is not supported tool, we use it as a guide to estimate the required disk space for the ...
Article by Mohammad Bamya | 08 Mar 2012 | 4 comments
If you are using the Administrator SDK method GetItemsByType you may be experiencing some timeout issues in larger enterprise environments. This is due to the SQL stored procedure spASDKGetItemsByType not being as properly written/optimized as it should ...
Article by bmc_saxman | 20 Oct 2011 | 0 comments
Probleme Le Manager Symantec Endpoint Protection est installé et configuré pour l’utilisation de la base de données Microsoft SQL. Lors de création de la base de données par l’Assistant de Configuration de Serveur de Gestion, l’erreur suivant ...
Article by Maciej_Jedrzejczyk | 11 Aug 2011 | 0 comments
The usage of the CPU and RAM is an important check point of the performance of endpoint. We can use HI policy to monitor the CPU and RAM usage. The following example shows the configuration steps. If the usage of the CPU and RAM is higher than 50%, ...
Article by yang_zhang | 23 Nov 2010 | 2 comments
Symantec recently launched a new member of the Control Compliance Suite family - Symantec Control Compliance Suite Vulnerability Manager (CCS VM). This new product will help you when you are challenged to answer questions like which databases, servers ...
Article by Guido Sanchidrian | 18 Nov 2010 | 12 comments
This instruction is used to block ActiveSync and PC Suite by using SEP’s Application and Device Control Policy. You may need two additional tools. One is System Explorer (can be downloaded from http://www.systemexplorer.net/download.php ). This ...
Article by yang_zhang | 28 Sep 2010 | 0 comments
I'm creating this article in response to a forum question.   It demonstrates how to use a SELECT .. IN statement using the SQL query generator.  There are a couple of pitfalls involving the input parameters and formatting the input CSV string.   ...
Article by scottwed | 20 Sep 2010 | 1 comment