Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

The usage of the CPU and RAM is an important check point of the performance of endpoint. We can use HI policy to monitor the CPU and RAM usage. The following example shows the configuration steps. If the usage of the CPU and RAM is higher than 50%, ...
Article by yang_zhang | 23 Nov 2010 | 2 comments
This instruction is used to block ActiveSync and PC Suite by using SEP’s Application and Device Control Policy. You may need two additional tools. One is System Explorer (can be downloaded from http://www.systemexplorer.net/download.php ). This ...
Article by yang_zhang | 28 Sep 2010 | 0 comments
If you are using SQL Server 2000 for your SEPM, and want to upgrade the SQL Server 2000 into SQL Server 2008, then you need some additional steps to re-configure the SQL Server, otherwise, the SEPM service cannot start. This is due to some changes of ...
Article by yang_zhang | 25 May 2010 | 0 comments