Video Screencast Help

Search

Search results

As of the Agent for Unix, Linux and Mac (ULM) 7.1, it is possible to configure which resource keys to ignore during generation of NSE events. This allows for exclusion of any values that would cause a conflict in a given environment. (An NSE event is ...
Article by dougj | 16 Jan 2015 | 0 comments
In some circumstances, it may be necessary to assign a new resource guid value to a Unix, Linux or Mac (ULM) client. This is typical in the case of merged computer resources in the NS console and two or more clients are assigned the same guid.    ...
Article by dougj | 16 Jan 2015 | 0 comments
 I studied distinct options we have for MySQL backup with Netbackup. We do not have any direct Netbackup agent for MySQL, BUT MySQL backup integration with Netbackup achievable via 2 different options.             Options 1:   Using MySQL Enterprise ...
Article by Anuj Kr | 16 Jan 2015 | 0 comments
Inventory tasks and policies include rules based on a default set of file extensions. These extensions are pre-defined in the Symantec_cmdb. In order to create a rule for a file extension that is not currently available in an inventory rule, the ...
Article by dougj | 16 Jan 2015 | 0 comments
SSL has long been the foundation of secure Internet communications. At the tail end of 2014, several vulnerability postings battered and bruised the SSL protocol and a POODLE was a primary wagger of that tail. Luckily SSL's stronger sibling, TLS, ...
Article by Art_P | 08 Jan 2015 | 0 comments
Introdução Atualmente os usuários querem usar tecnologias mais recentes para acessar os aplicativos e dados corporativos, e isso acaba criando a necessidade de permitir o uso de dispositivos pessoais nesses acessos. Assim, o BYOD – Bring Your ...
Article by Eder Souza | 30 Dec 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 20 Dec 2014 | 0 comments
In Enterprise Vault 11.0 significant changes have been made to the search application (EVS). Apart from multiple browser support and a new UI there are few other features which are introduced at the server side.  In the Vault Admin Console (VAC), a new ...
Article by AmolB | 16 Dec 2014 | 0 comments
What is Symantec Mobility Suite? Symantec Mobility Suite securely serves up apps to mobile devices and implements remote device management services. Symantec Mobility Suite manages apps and app distribution. New and updated apps are uploaded into ...
Article by Nirmal R | 10 Dec 2014 | 0 comments
Executive Summary I/O Fencing provides protection against data corruption and can guarantee data consistency in a clustered environment.  Data is the most valuable component in today’s enterprises. Having data protected and therefore consistent at ...
Article by AHerr | 10 Dec 2014 | 0 comments