Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 20 Dec 2014 | 0 comments
What is Symantec Mobility Suite? Symantec Mobility Suite securely serves up apps to mobile devices and implements remote device management services. Symantec Mobility Suite manages apps and app distribution. New and updated apps are uploaded into ...
Article by Nirmal R | 10 Dec 2014 | 0 comments
Executive Summary I/O Fencing provides protection against data corruption and can guarantee data consistency in a clustered environment.  Data is the most valuable component in today’s enterprises. Having data protected and therefore consistent at ...
Article by AHerr | 10 Dec 2014 | 0 comments
With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). However, some folder exclusions still have to be configured via the command-line interface (e.g. /sys and /proc).  TECH95274 ...
Article by DSOLO | 04 Dec 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 03 Dec 2014 | 0 comments
Summary This document details the process we have developed, and use, to schedule the delivery and receipt of assets that we track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, ...
Article by ziggy | 19 Nov 2014 | 0 comments
Summary This document details the Asset Types and Statuses that we have come to track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and adjust, review, and ...
Article by ziggy | 18 Nov 2014 | 2 comments
Summary This document details the steps that we follow for all surplus and Asset Recovery Services (ARS) activities for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and adjust, review, and apply to your ...
Article by ziggy | 18 Nov 2014 | 0 comments
What is required to create such environment, where you will be able to receive mail notifications about Agent service crash from any of available managed endpoints via mail? This scenario is applicable for SMP 7.1.x and SMP 7.5.x 1. ...
Article by Igor Perevozchikov | 14 Nov 2014 | 0 comments
Before we begin, I would like to let the reader know that the product for standalone drive encryption installations is Symantec Encryption Desktop.  This guide is intended for managed environments already using Symantec Endpoint Encryption who have a ...
Article by Mike Ankeny | 12 Nov 2014 | 1 comment