Video Screencast Help

Search

Search results

We hope you'll enjoy this document comparing the two currently supported versions of Deployment Solution: 6.9 and 7.5 (7.1 is technically still supported, but has reached EOL status and is not discussed except in passing.  Another version of this ...
Article by Thomas Baird | 02 Apr 2014 | 1 comment
1.  Summary 1.1  This document is the next in the series of my experience with the Symantec Management Platform project.  Specifically, this document is part two of two for the Mobile Device Management solution from Symantec.   1.2 ...
Article by ziggy | 31 Mar 2014 | 0 comments
1.  Summary 1.1  This document is the next in the series of my experience with the Symantec Management Platform project.  Specifically, the Mobile Device Management solution from Symantec.   1.2   This document details the steps I took ...
Article by ziggy | 28 Mar 2014 | 0 comments
A community member wanted to be able to identify machines that are not running the latest version of the SMA so that they could then email the user to inform them that they needed to connect to the network in order to bring their machine into compliance ...
Article by SK | 11 Mar 2014 | 0 comments
Introduction Design SQL code Usage Conclusion Introduction Monitoring agent upgrade progress over time is an important task in large environments, and is beneficial in any environment to understand the managed computer pool ...
Article by Ludovic Ferre | 06 Mar 2014 | 2 comments
In some cases, it is helpful to reinstall the SMP Agent for Unix, Linux and Mac without uninstalling the currently installed agent. Following is a description of two methods for overwriting the existing agent. Note: In most cases it is preferable to ...
Article by dougj | 24 Feb 2014 | 3 comments
Scans of SharePoint Servers : The Network Discover Server locates a wide range of exposed confidential data on SharePoint servers. It communicates with the Enforce Server to obtain information about policies and scan targets. It sends ...
Article by Lion Shaikh | 31 Jan 2014 | 1 comment
Symantec Data Loss Prevention provides a set of response rule actions that you can specify to remediate an incident. These provided actions include logging, sending an email, blocking an end-user action, notifying a user, and other responses. You can ...
Article by Lion Shaikh | 17 Jan 2014 | 4 comments
To prevent unauthorized users from removing the Symantec DLP Agent from an endpoint computer you just need to Add uninstallation passwords to agents. Uninstallation passwords prevent unauthorized users from removing the Symantec DLP Agent from an ...
Article by Lion Shaikh | 07 Jan 2014 | 3 comments
Hi All, Wishes you all Happy & Prosperous New Year. I am working on Netbackup I was looking for the soft copy of " Configure,Install & Deploy Netbackup 7.1" . this book is provide when anyone attend netbackup training ...
Article by abhi3588 | 23 Jan 2014 | 0 comments