Video Screencast Help
New Company Name and Logo Announced. Learn More.

Search

Search results

Last week I took a look at ammending power plans in Windows 7. The aim was to create an Altiris job which ammended laptop power plans to stop them going to sleep when their lid was closed. This was for laptops which were likely to be used for ...
Article by ianatkin | 26 Jan 2015 | 0 comments
The Client Task Agent Command Line Utility The actual binary can be found in the ‘/opt/altiris/notification/ctagent/bin’ directory. A link to aex-cta is found in the ‘/usr/bin’ directory, which is in most Unix, Linux and Macintosh path ...
Article by dougj | 19 Jan 2015 | 0 comments
You’ve installed & set up the SEPM console. You’ve also deployed the SEP clients to PCs across the network. The job is done… or so you thought. While it can ‘run’ itself most of the time, there are some thing you will have to monitor the health of ...
Article by Tony Sutton | 13 Jan 2015 | 1 comment
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 20 Dec 2014 | 0 comments
In Enterprise Vault 11.0 significant changes have been made to the search application (EVS). Apart from multiple browser support and a new UI there are few other features which are introduced at the server side.  In the Vault Admin Console (VAC), a new ...
Article by AmolB | 16 Dec 2014 | 0 comments
With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). However, some folder exclusions still have to be configured via the command-line interface (e.g. /sys and /proc).  TECH95274 ...
Article by DSOLO | 04 Dec 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 03 Dec 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 03 Dec 2014 | 1 comment
Summary This document details the process we have developed, and use, to scan in the assets that we track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and ...
Article by ziggy | 19 Nov 2014 | 0 comments
Summary This document details the steps that we follow in order to complete, submit, and process a Move Form.  We complete a Move Forms when an asset: Moves locations. Re/Assigned to a new or different person Re/Assigned cost ...
Article by ziggy | 18 Nov 2014 | 0 comments