Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Monitor Solution is an excellent product. One snag I hit hard in it's implementation is that the primary mechanism for delivering alerts is not email but the event console. This meant that I had to open up a web browser everytime I wanted to see how ...
Article by ianatkin | 30 Oct 2014 | 0 comments
Overview The Symantec Endpoint Protection client for Linux provides Virus and Spyware protection and Auto-Protect features for supported Linux operating systems. It can be deployed using the Web link and email or Save package method from ...
Article by Shulk | 15 Oct 2014 | 0 comments
Contents 1. Introduction 2. Why Did I Come Up With This? 3. Implementing Job Parameters in DS6.9     3.1. Preparing your Deployment Server for Job Parameters     3.2. Preparing your Deployment Server for ...
Article by ianatkin | 15 Oct 2014 | 1 comment
This article is intended to give a reliable method for using Ghost to capture Windows 8.1 update 1 images for deployment. Currently, Ghost has difficulty with Apps. Apps in Windows 8.1 refer specifically to a class of programs installed via the Windows ...
Article by Randall Newnham | 14 Oct 2014 | 0 comments
In ogni computer Windows sono normalmente installati numerosi programmi che nel corso del tempo richiedono un aggiornamento a seguito delle più recenti versioni rilasciate dai produttori. Installare questi aggiornamenti costituisce una pratica di buona ...
Article by riva11 | 08 Oct 2014 | 0 comments
Hello All, Lots of people are facing issue to scan their network for shellshock vulnerability with CCSVM. Follow the below steps and you are ready to scan for shellshock vulnerability: 1. In the CCSVM Console Web interface, click Administration ...
Article by isaneh | 08 Oct 2014 | 0 comments
Symantec has created the following process to identify Unix, Linux and Mac (ULM) computers that are vulnerable to the Bash Shellshock bug. Description The process uses a custom inventory script that can be ran on ULM clients. A zipped file is ...
Article by dougj | 03 Oct 2014 | 1 comment
 In some cases, the Activity Center in the NS/SMP console does not show an "Identification" section for computer resources.    The reason for this is that the Identification section is currently dependent on the presence of hardware ...
Article by dougj | 02 Oct 2014 | 0 comments
The Protection Engine (formerly named as Scan Engine) download the updates from Internet by default, but, we can configure it to update from LiveUpdate Administrator. Such kind of configuration will be very useful if the customer has a LUA in their ...
Article by yang_zhang | 01 Oct 2014 | 0 comments
  NetBackup Accelerator VMware backup best practices: o) This feature uses Accelerator technology to speed up virtualization backups. o) Only the blocks that have changed are transferred from client to media server. o) The media server ...
Article by Andrew2 | 30 Sep 2014 | 0 comments