Video Screencast Help

Search

Search results

Businesses need to protect a broad range of information, generated in a plethora of ways, through multiple applications used by billions of individuals around the world. Organisations not only need to protect their information and IT infrastructure, but ...
Article by GFK | 18 Jul 2014 | 0 comments
Symantec Messaging Gateway software consists of the following subcomponents: Scanner Control Center Scanners do the following tasks: Process the inbound messages and outbound messages and route messages for delivery. Download ...
Article by yang_zhang | 16 Jul 2014 | 0 comments
This article is the fifth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous four are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by .Brian | 11 Jul 2014 | 0 comments
Symantec Data Insight (SDI) 4.5 lets you monitor NetApp Cluster-Mode devices running Data ONTAP 8.2. Data Insight uses the FPolicy framework to receive event notifications. These notifications are sent over a TCP connection to Data Insight's FPolicy ...
Article by Dhruba Choudhury | 04 Jul 2014 | 0 comments
Symantec Data Insight(SDI) 4.5 lets you monitor EMC Isilon OneFS file servers, version 7.1 or later. You can also scan and monitor events in users' home directories on the EMC Isilon storage system. To configure Data Insight to monitor EMC ...
Article by Dhruba Choudhury | 04 Jul 2014 | 0 comments
The series of Technical White Papers we are currently publishing are updated papers on the release of Backup Exec 2014. They are designed to introduce Symantec partners and end users to key technologies and technical concepts that are associated with the ...
Article by GFK | 01 Jul 2014 | 0 comments
The CSV Lookup Plugin extracts data from a comma-separated values (CSV) file stored on the Enforce Server. The plugin uses data from the CSV file to populate custom attributes for an incident at the time the incident is generated. The CSV Lookup ...
Article by Lion Shaikh | 21 Jun 2014 | 0 comments
A message might violate more than one policy. You can add special headers to the outgoing messages that report the number and severity of policies the message violates. Three different kinds of violation-data headers are available: Number of violated ...
Article by Lion Shaikh | 20 Jun 2014 | 0 comments
Technical White Papers are designed to introduce Symantec partners and end users to key technologies and technical concepts that are associated with the Symantec Backup and Recovery product family. The information within a Technical White Paper will ...
Article by GFK | 19 Jun 2014 | 0 comments
Technical White Papers are designed to introduce Symantec partners and end users to key technologies and technical concepts that are associated with the Symantec Backup and Recovery product family. The information within a Technical White Paper will ...
Article by GFK | 19 Jun 2014 | 0 comments