Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

What is vShield-enabled Shared Insight Cache? Virtual clients in a VMware vShield infrastructure can use a vShield-enabled Shared Insight Cache to reduce scan loads. A vShield-enabled Shared Insight Cache runs in a Symantec Endpoint Protection ...
Article by Shulk | 08 Aug 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 18 Jul 2014 | 2 comments
Here is a doc which describes, how customers can configure own environment and add separate tasks to get latest information delivered more quickly to Parent Server from all managed Child Servers in Hierarchy to see how goes software installations on each ...
Article by Igor Perevozchikov | 28 Apr 2014 | 5 comments
I had the opportunity to test various configuration options in EV as well as on an EMC Centera. A customer has stored the EV archive data on NTFS devices and wanted to move the data to EMC Centera. The sole reason for this exercise was verifying the ...
Article by Jochen Köcher | 25 Mar 2014 | 1 comment
Short answer : Disabling the Mac root user via the Directory Utility app or equivalent command line has no affect on the SMP Agent for Mac installation or subsequent functionality. Long answer : The Mac OS X Directory Utility, located ...
Article by dougj | 25 Feb 2014 | 0 comments
The first query targets all computer resources and allows you to specify the byte size range as well as the percentage of available disk space. The second query only targets site servers.  It provide similar options as the first, but also allow you ...
Article by SK | 14 Feb 2014 | 1 comment
Question: Do we have a whitepaper/write-up on how to deploy a successful patch deployment solution in a low bandwidth environment? No, but it sounds like a good idea for one. In the interim, though: There are a lot of variables that ...
Article by MThrift | 12 Feb 2014 | 0 comments
Introduction: The aila2 collection of tools comes with quite a few articles and downloads (see references [1-6]. But how can we benefit from this tool without having to read the full documentation? In short, how can we deploy the tool as simply as ...
Article by Ludovic Ferre | 06 Feb 2014 | 1 comment
This article was written to outline some issues that were recently discovered and addressed.  Hopefully with the end that any customers currently still using Servicedesk 7.0 will fill additional motivation to take steps necessary to move to the current ...
Article by BRING | 24 Jan 2014 | 0 comments
The “Settings > Deployment > Tokens” page allows tokens to be created, but it unfortunately does not allow them to be deleted.  How can this be achieved?   The following process of running queries against the Symantec_CMDB database and then ...
Article by SK | 24 Jan 2014 | 7 comments