Video Screencast Help

Search

Search results

In Symantec DataInsight (SDI) the configuration of the Network Appliance (NetApp) filer for discovery, scanning, auditing on NFS  shares or shares in mixed mode of CIFS and NFS requires an authentication domain be configured under ...
Article by RodP | 17 Apr 2014 | 0 comments
Most of time we need a script/SQL query to know permission assigned or delegated to Archives or archive folders. This information can also be found from the Vault Admin Console but it’s difficult when we have large no of archives, additionally vault ...
Article by Pradeep_Papnai | 11 Apr 2014 | 0 comments
In some enterprise environment, the sensitive documents that needs to be protected by IDM, are locate in some kind of restricted area. The DLP Enforce cannot access these files logically/physically, or have no rights to access these files. Under such ...
Article by yang_zhang | 09 Apr 2014 | 0 comments
Purpose I had the requirement to create a form with, among many other fields, an email address field.  Rather than use the usual validation model on the button component or a validation model on the output path, I decided to use javascript to ...
Article by africo | 07 Apr 2014 | 0 comments
DataPop v4 can be used with ITMS 7.1.2 and later.  The following steps describe how to implement it: Un.zip and run the attached Setup_EPMDataPopV4.EXE Press the [OK] button to initiate the Setup Wizard: Press ...
Article by SK | 10 Apr 2014 | 0 comments
There are two method to enroll the Symantec Encryption Desktop: by Email, or by AD. In this article, we will provide the graphic step-by-step guide for AD enrollment. 1. We need to enable Directory Synchronization firstly. From ...
Article by yang_zhang | 03 Apr 2014 | 0 comments
In some environments it is necessary to have the location of the large files that Altiris creates on another hard drive. This was often done by installing the agent to another drive. The location of where the "space hog" files are kept have ...
Article by DeaDraug | 07 Apr 2014 | 0 comments
From the previous article: https://www-secure.symantec.com/connect/articles/create-dlp-policy-special-user-group We introduced the method and steps to use AD to create DLP group policy. By using AD directory connection, we can create DLP ...
Article by yang_zhang | 02 Apr 2014 | 1 comment
Use the following instructions to configure Network Prevent Server to operate either in reflecting or forwarding mode. To configure the Network Prevent Server : Procedure Step 1 :  Log on to the Enforce Server administration ...
Article by Lion Shaikh | 07 Apr 2014 | 0 comments
A] Mobile Prevent for Web Server - Basic configuration B] Configuring the Mobile Prevent for Web Server A] Mobile Prevent for Web Server - Basic configuration : Detection servers are configured from each server's individual ...
Article by Lion Shaikh | 07 Apr 2014 | 0 comments