Video Screencast Help

Search

Search results

It has been quite some time since Backup Exec 2012 has been launched but there is one option which was not discussed or highlighted in any documentation, i.e. ‘ Make This a Required Selection’ This option is available when we right click on ...
Article by Sym-cr@zy | 11 Apr 2014 | 4 comments
In some enterprise environment, the sensitive documents that needs to be protected by IDM, are locate in some kind of restricted area. The DLP Enforce cannot access these files logically/physically, or have no rights to access these files. Under such ...
Article by yang_zhang | 09 Apr 2014 | 0 comments
DataPop v4 can be used with ITMS 7.1.2 and later.  The following steps describe how to implement it: Un.zip and run the attached Setup_EPMDataPopV4.EXE Press the [OK] button to initiate the Setup Wizard: Press ...
Article by SK | 10 Apr 2014 | 0 comments
There are two method to enroll the Symantec Encryption Desktop: by Email, or by AD. In this article, we will provide the graphic step-by-step guide for AD enrollment. 1. We need to enable Directory Synchronization firstly. From ...
Article by yang_zhang | 03 Apr 2014 | 0 comments
We hope you'll enjoy this document comparing the two currently supported versions of Deployment Solution: 6.9 and 7.5 (7.1 is technically still supported, but has reached EOL status and is not discussed except in passing.  Another version of this ...
Article by Thomas Baird | 02 Apr 2014 | 1 comment
From the previous article: https://www-secure.symantec.com/connect/articles/create-dlp-policy-special-user-group We introduced the method and steps to use AD to create DLP group policy. By using AD directory connection, we can create DLP ...
Article by yang_zhang | 02 Apr 2014 | 1 comment
PingOne and App Center Configuration Abstract: This document will provide high-level steps for configuring Ping One as an External Identity Provider for Symantec App Center. This article does not cover group mapping, and is based on the ...
Article by Dishwishy | 27 Mar 2014 | 0 comments
Hello All, Many thanks for attending last weeks webcast on Symantec Workspace Virtualization and Streaming with a review/recap on 7.5 and a Preview into what is coming in the upcoming release of 7.5 SP1.  I was very excited to see well over 100+ ...
Article by Joseph_Carson | 25 Mar 2014 | 0 comments
Understanding Compression in Backup Exec: An explanation of Hardware and Software compression used with Backup Exec   How does compression work? It can be better explained with an example. Consider a text file (.txt) with ...
Article by Sym-cr@zy | 13 Apr 2014 | 3 comments
Symante Critical System Protection (CSP) provides policy-based behavior control and detection for server and desktop computers. Symantec Critical System Protection provides a flexible computer security solution that controls application behavior, blocks ...
Article by yang_zhang | 27 Mar 2014 | 0 comments