Video Screencast Help

Policy

Results for Policy

To Symantec tech support,   We had quite a few incidents recently where a plain text file was marked as “malformed container” by Symantec virus scanner. Such error is supposed to flag files like corrupted PDF files that can’t be opened by Adobe ...
Idea by stephen.khuon@g... | 31 Mar 2014 | 1 comment
I need a solution hello all, I have problem with a detection rule. I need to create Registry Key Value detection for a value contains %sapini_copy%. when i write %sapini_copy% it ...
Forum Discussion by KMariusz | 02 Mar 2012 | 11 comments
We have 100's of sites that use authenticating proxies. It would be better to configure proxy addresses and credentials in a policy rather than opening firewalls to pass outbound traffic unauthenticated to the SEPM. This would be best set, in ...
Idea by Andy Scott | 22 Mar 2011 | 3 comments
I need a solution We have installed SMP7 SP5 MR2 with Client management suite, we created the inventory policy. when we update the policy from "ADAVANCE" button to uncheck ...
Forum Discussion by Chandru S | 11 Nov 2010 | 2 comments
I need a solution I have installed the Client Management Suite and then I installed Server Management Suite. I noticed that all the default or Predefined Collect inventory policies and ...
Forum Discussion by rnanda | 26 Aug 2010 | 3 comments
I need a solution Hello All, One small and good question, I am planning for Synthetic backups, I know the process how it works but one thing I am unable to understand is as ...
Forum Discussion by anasser | 17 Apr 2010 | 5 comments
I need a solution I know how to manually build and deploy an image using Ghost to a lab of computers but I want to remove the manual part. I want to dedicate 1 computer as a ...
Forum Discussion by romo | 10 Apr 2010 | 0 comments
It would be nice to have a feature in SEP that: - Logs all processes that need to communicate on the network - Report to the SEPM the name, hash, and communication ports used by this process. This list of applications could then be used by the ...
Idea by Thomas Ballandras | 25 Mar 2010 | 0 comments