Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

The Protection Engine (formerly named as Scan Engine) download the updates from Internet by default, but, we can configure it to update from LiveUpdate Administrator. Such kind of configuration will be very useful if the customer has a LUA in their ...
Article by yang_zhang | 01 Oct 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 22 Sep 2014 | 0 comments
  The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how ...
Article by GFK | 27 Aug 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 27 Aug 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 25 Aug 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 20 Aug 2014 | 0 comments
There should be a better way of reporting bugs. I raised a support issue to report a bug, and was directed to report the bug as a feature request through Symantec Connect. The scripts used by the support operators can not handle bugs. It ...
Idea by SteveDoughton | 28 Jul 2014 | 0 comments
Businesses need to protect a broad range of information, generated in a plethora of ways, through multiple applications used by billions of individuals around the world. Organisations not only need to protect their information and IT infrastructure, but ...
Article by GFK | 18 Jul 2014 | 0 comments
A Full Unix/Linux client recovery from a backup image requires setting up a recovery environment on the target client hardware specifically for the activity. Overwriting system files on a running system will cause it to crash and leave it in a non-boot ...
Article by Jaime_Vazquez | 15 Jul 2014 | 0 comments
Let me start off by saying, this was done to reduce the need for loading network drivers on the WinPE discs and so far has worked for most systems without issue, with that being said, we have had a few machines that have displayed issues with the GPT ...
Article by bl_fowler | 18 Mar 2014 | 0 comments