Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

A. Take a Backup of Database OR Follow the Disaster Recovery Steps for 12.1  http://www.symantec.com/docs/TECH160736   B. Symantec Endpoint Protection – How to cleanup excessive disk usage  This document describes the necessary steps ...
Article by Amit.eu | 22 Dec 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 07 Nov 2014 | 0 comments
Table of Content Introduction Cleaning up the constants class Overview of the constants class Going deep: looking at the mime type handling code Mime type JSON output sample Adding new mime types support ...
Article by Ludovic Ferre | 03 Nov 2014 | 0 comments
Introduction: The Altiris IIS Log Analyzer - version 2 (aila2) is a c# re-write of the first version of aila, that was written in C on a Linux system (it was my way to get intimate with c, pointers and efficient or not so-efficient data structures). ...
Article by Ludovic Ferre | 24 Oct 2014 | 0 comments
What is vShield-enabled Shared Insight Cache? Virtual clients in a VMware vShield infrastructure can use a vShield-enabled Shared Insight Cache to reduce scan loads. A vShield-enabled Shared Insight Cache runs in a Symantec Endpoint Protection ...
Article by Shulk | 08 Aug 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 18 Jul 2014 | 2 comments
Here is a doc which describes, how customers can configure own environment and add separate tasks to get latest information delivered more quickly to Parent Server from all managed Child Servers in Hierarchy to see how goes software installations on each ...
Article by Igor Perevozchikov | 28 Apr 2014 | 5 comments
I had the opportunity to test various configuration options in EV as well as on an EMC Centera. A customer has stored the EV archive data on NTFS devices and wanted to move the data to EMC Centera. The sole reason for this exercise was verifying the ...
Article by Jochen Köcher | 25 Mar 2014 | 1 comment
Short answer : Disabling the Mac root user via the Directory Utility app or equivalent command line has no affect on the SMP Agent for Mac installation or subsequent functionality. Long answer : The Mac OS X Directory Utility, located ...
Article by dougj | 25 Feb 2014 | 0 comments
The first query targets all computer resources and allows you to specify the byte size range as well as the percentage of available disk space. The second query only targets site servers.  It provide similar options as the first, but also allow you ...
Article by SK | 14 Feb 2014 | 1 comment