Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Overview The Symantec Endpoint Protection client for Linux provides Virus and Spyware protection and Auto-Protect features for supported Linux operating systems. It can be deployed using the Web link and email or Save package method from ...
Article by Shulk | 15 Oct 2014 | 0 comments
Hello All, Lots of people are facing issue to scan their network for shellshock vulnerability with CCSVM. Follow the below steps and you are ready to scan for shellshock vulnerability: 1. In the CCSVM Console Web interface, click Administration ...
Article by isaneh | 08 Oct 2014 | 0 comments
In Part 1, https://www-secure.symantec.com/connect/articles/d... I have discussed what happened when you back up to a dedup folder/OST appliance. After our series of backups, the dedup store looks like this abcde = FileA-FB1, FileC-IB1, ...
Article by pkh | 02 Oct 2014 | 0 comments
The Protection Engine (formerly named as Scan Engine) download the updates from Internet by default, but, we can configure it to update from LiveUpdate Administrator. Such kind of configuration will be very useful if the customer has a LUA in their ...
Article by yang_zhang | 01 Oct 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 22 Sep 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 12 Sep 2014 | 0 comments
You can download the full technical white paper below – it is intended to assist partners and customers as they implement data protection solutions based on the Backup Exec™ 3600 R3 Appliance. This brief will explore the following topics as they relate ...
Article by GFK | 12 Sep 2014 | 0 comments
The web console of the DLP Enforce is a https one. Everytime the user launch Internet Explorer to try to log into the DLP Enforce, there will be a certificate error such as this: The user need to click 'Continue to this website (not ...
Article by yang_zhang | 30 Aug 2014 | 0 comments
Attached is an excel sheet with the mappings for the following Tables>Columns>Solution Views>Tables>Columns>Solution Stored Procedures>Tables>Solution Functions>Tables>Solution All of these were created on ...
Article by eglismann | 26 Aug 2014 | 2 comments
The following commands are used by the Unix, Linux and Mac Software Mangement Framework to gather native software information:   Platform Collector Info source Platform specific DataClass ...
Article by dougj | 14 Aug 2014 | 0 comments