Video Screencast Help

Search

Search results

아래 기술문서는 RU4와 RU5 버전의 SEPM을 기준으로 작성되었습니다. RU6는 적용되지 않으니 참고하시기 바랍니다. Apache Reverse Proxt를 사용하면 LUA 도입없이 기존 SEPM을 활용하여 내부 라이브업데이트 서버를 구현 할 수 있습니다. SEPM은 바이러스패턴을 다운로드하여 보관하는 방식이아닌 캐시서버역할을 하게됩니다. 설정방법: 챕터1. SEPM Apache Reverse Proxy ...
Article by 김기명 | 18 Jun 2015 | 0 comments
Virtual Machine Management" solution from ITMS 7.6 You can discover your ESX Hosts or Hyper-V servers from network and manage virtual machines from SMP Console How to discover available ESX Hosts from network 1. Open ...
Article by Igor Perevozchikov | 08 Jun 2015 | 0 comments
FAQ Scanning of network drives Q. Does an Administrator-Defined Scan scan the mapped network drives? A. No, it does not. However, if a file located on the network drive is run locally on the client computer and loaded in the ...
Article by Shulk | 20 Feb 2015 | 5 comments
Technical White Papers are designed to introduce Symantec partners and end users to key technologies and technical concepts that are associated with the Symantec Backup and Recovery product family. The information within a Technical White Paper will ...
Article by GFK | 13 Feb 2015 | 0 comments
SSE is a collection of reports commonly used by Backline support and Sustained Engineering. They are very useful for monitoring, administering and troubleshooting. An example can be seen at link below: (ITMS 7.5 - Checking Agent Plug-ins versions via ...
Article by Mauro Dalvit | 13 Jan 2015 | 0 comments
A. Take a Backup of Database OR Follow the Disaster Recovery Steps for 12.1  http://www.symantec.com/docs/TECH160736   B. Symantec Endpoint Protection – How to cleanup excessive disk usage  This ...
Article by Amit.eu | 22 Dec 2014 | 4 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 07 Nov 2014 | 0 comments
Table of Content Introduction Cleaning up the constants class Overview of the constants class Going deep: looking at the mime type handling code Mime type JSON output sample Adding new mime types support ...
Article by Ludovic Ferre | 03 Nov 2014 | 0 comments
Introduction: The Altiris IIS Log Analyzer - version 2 (aila2) is a c# re-write of the first version of aila, that was written in C on a Linux system (it was my way to get intimate with c, pointers and efficient or not so-efficient data structures). ...
Article by Ludovic Ferre | 24 Oct 2014 | 0 comments
Content: What is vShield-enabled Shared Insight Cache? Software requirements and prerequisites Installing vShield Endpoint on ESXi hosts Configuring the Symantec Endpoint Protection Security Virtual Appliance installation settings ...
Article by Shulk | 08 Aug 2014 | 0 comments