Video Screencast Help

Search

Search results

Cena comum no departamento de TI de praticamente qualquer empresa: Precisamos comprar um novo Storage! Seja porque o Storage atual está próximo a ficar sem garantia, ou não suporta mais a performance dos ambientes a que serve, ou mesmo a necessidade ...
Article by RAPHAEL F CARVALHO | 06 Mar 2014 | 0 comments
As a Disaster Recovery and High-Availability Consultant, I've participated in several disaster recovery exercises, for different customers in different industries, most of them large financial institutions, that are severely regulated here in Brazil ...
Article by RAPHAEL F CARVALHO | 17 Dec 2013 | 0 comments
  Problem   Cannot restore SQL databases when the SQLINSTANCE value has been defined in lower case inside the backup script. (Using an UNIX master).   Error Messages     "Err - Error in VxBSAQueryObject: ...
Article by NBdmecha | 25 Oct 2013 | 0 comments
Today, there is a restriction in SWS that requires Microsoft SQL Server to be in a "mixed mode" authentication, i.e. to support both Windows authentication and SQL authentication. SWS needed SQL authentication because as part of the database ...
Article by Nirmal R | 04 Oct 2012 | 1 comment
Every time I’m on a SEP project, the database size always is a big subject for discussion, especially for a large environment. The SEP DB sizing tool as we know is not supported tool, we use it as a guide to estimate the required disk space for the ...
Article by Mohammad Bamya | 09 Mar 2012 | 4 comments
If you are using the Administrator SDK method GetItemsByType you may be experiencing some timeout issues in larger enterprise environments. This is due to the SQL stored procedure spASDKGetItemsByType not being as properly written/optimized as it should ...
Article by bmc_saxman | 25 Oct 2011 | 0 comments
Probleme Le Manager Symantec Endpoint Protection est installé et configuré pour l’utilisation de la base de données Microsoft SQL. Lors de création de la base de données par l’Assistant de Configuration de Serveur de Gestion, l’erreur suivant ...
Article by Maciej_Jedrzejczyk | 11 Aug 2011 | 0 comments
The usage of the CPU and RAM is an important check point of the performance of endpoint. We can use HI policy to monitor the CPU and RAM usage. The following example shows the configuration steps. If the usage of the CPU and RAM is higher than 50%, ...
Article by yang_zhang | 01 Dec 2010 | 2 comments
Symantec recently launched a new member of the Control Compliance Suite family - Symantec Control Compliance Suite Vulnerability Manager (CCS VM). This new product will help you when you are challenged to answer questions like which databases, servers ...
Article by Guido Sanchidrian | 18 Nov 2010 | 12 comments
This instruction is used to block ActiveSync and PC Suite by using SEP’s Application and Device Control Policy. You may need two additional tools. One is System Explorer (can be downloaded from http://www.systemexplorer.net/download.php ). This ...
Article by yang_zhang | 04 Oct 2010 | 0 comments