Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Summary This document details the process we have developed, and use, to scan in the assets that we track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and ...
Article by ziggy | 19 Nov 2014 | 0 comments
Summary This document details the steps that we follow in order to complete, submit, and process a Move Form.  We complete a Move Forms when an asset: Moves locations. Re/Assigned to a new or different person Re/Assigned cost ...
Article by ziggy | 18 Nov 2014 | 0 comments
Summary This document details the Asset Types and Statuses that we have come to track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and adjust, review, and ...
Article by ziggy | 18 Nov 2014 | 0 comments
Summary This document details the steps that we follow for all surplus and Asset Recovery Services (ARS) activities for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and adjust, review, and apply to your ...
Article by ziggy | 18 Nov 2014 | 0 comments
Overview The Symantec Endpoint Protection client for Linux provides Virus and Spyware protection and Auto-Protect features for supported Linux operating systems. It can be deployed using the Web link and email or Save package method from ...
Article by Shulk | 15 Oct 2014 | 0 comments
Hello All, Follow the below steps and you are ready to scan for Heartbleed vulnerability: 1. In the CCSVM Console Web interface, click Administration from the top menu. Under the Scan Options Section on the administration page, click the manage ...
Article by isaneh | 15 Oct 2014 | 0 comments
Hello All, Lots of people are facing issue to scan their network for shellshock vulnerability with CCSVM. Follow the below steps and you are ready to scan for shellshock vulnerability: 1. In the CCSVM Console Web interface, click Administration ...
Article by isaneh | 08 Oct 2014 | 0 comments
In Part 1, https://www-secure.symantec.com/connect/articles/d... I have discussed what happened when you back up to a dedup folder/OST appliance. After our series of backups, the dedup store looks like this abcde = FileA-FB1, FileC-IB1, ...
Article by pkh | 02 Oct 2014 | 0 comments
The Protection Engine (formerly named as Scan Engine) download the updates from Internet by default, but, we can configure it to update from LiveUpdate Administrator. Such kind of configuration will be very useful if the customer has a LUA in their ...
Article by yang_zhang | 01 Oct 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 22 Sep 2014 | 1 comment