Video Screencast Help

Search

Search results

FAQ Scanning of network drives Q. Does an Administrator-Defined Scan scan the mapped network drives? A. No, it does not. However, if a file located on the network drive is run locally on the client computer and loaded in the ...
Article by Shulk | 20 Feb 2015 | 4 comments
This article is the seventh installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous six are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by Brɨan | 15 Feb 2015 | 2 comments
Technical White Papers are designed to introduce Symantec partners and end users to key technologies and technical concepts that are associated with the Symantec Backup and Recovery product family. The information within a Technical White Paper will ...
Article by GFK | 13 Feb 2015 | 0 comments
This article sits in its original format (along with many others) at http://atmaworkflow.com/2014/10/24/primer-applying-custom-css-to-workflow-forms/ .  This should amount to a good starting point for using custom CSS code to style your Workflow ...
Article by africo | 30 Jan 2015 | 0 comments
This article contains some cases about problems in CEM environment, where you can find their root cause and possible solution for your case. Note!: All these description steps were done, using SMP 7.5 SP1 release build ! ...
Article by Igor Perevozchikov | 29 Jan 2015 | 0 comments
What is basically required to have SMP 7.5.x CEM functionality working via HTTPs using self-signed or non self-signed certificates Probably this information will be useful to know, if you're going to setup CEM in your environment. ...
Article by Igor Perevozchikov | 29 Jan 2015 | 7 comments
As of the Agent for Unix, Linux and Mac (ULM) 7.1, it is possible to configure which resource keys to ignore during generation of NSE events. This allows for exclusion of any values that would cause a conflict in a given environment. (An NSE event is ...
Article by dougj | 16 Jan 2015 | 0 comments
In some circumstances, it may be necessary to assign a new resource guid value to a Unix, Linux or Mac (ULM) client. This is typical in the case of merged computer resources in the NS console and two or more clients are assigned the same guid.    ...
Article by dougj | 16 Jan 2015 | 0 comments
 I studied distinct options we have for MySQL backup with Netbackup. We do not have any direct Netbackup agent for MySQL, BUT MySQL backup integration with Netbackup achievable via 2 different options.             Options 1:   Using MySQL Enterprise ...
Article by Anuj Kr | 16 Jan 2015 | 0 comments
Inventory tasks and policies include rules based on a default set of file extensions. These extensions are pre-defined in the Symantec_cmdb. In order to create a rule for a file extension that is not currently available in an inventory rule, the ...
Article by dougj | 16 Jan 2015 | 0 comments