Video Screencast Help

Documentation

Results for Documentation

This document describes the various scenarios you can encounter when deploying the Symantec Management Agent or the Symantec DLP Agent in your environment when both agents may be present. Recently we had an issue which resulted in millions of bad ...
Download by cnpalmer75 | 23 Jun 2011 | 4 comments
I need a solution I recently encountered an issue with a policy definition that included a Regular Expression for content interrogation on content being “sent” from a PC to a USB ...
This issue has been solved
Forum Discussion by John.Armga | 23 Jun 2011 | 4 comments
I need a solution First, i love how many posts are on it, but reference so many broken links.  Thus i shall throw an easy question to the crowd. What ports are needed for Altiris ...
This issue has been solved
Forum Discussion by Aen | 21 Jun 2011 | 1 comment
I need a solution We would like to move SEP to another server.  What would be the best practice for this so we do not lose our data, settings...etc? Thank You. ...
This issue has been solved
Forum Discussion by Ameril01 | 21 Jun 2011 | 4 comments
I need a solution There are documents for SMP 7.0  http://www.symantec.com/business/support/index?page=content&id=HOWTO9593 and NS 6.x  ...
This issue has been solved
Forum Discussion by RMcHugh | 20 Jun 2011 | 3 comments
  A couple of  years ago I finished up a 3 year lease schedule with only 7 computers missing out of 1003 shipped three years earlier for a 99.3% return rate. I had 7 computers of the same age with wrong serial numbers that we turned in to get ...
Article by sdmayhew | 17 Jun 2011 | 0 comments
I need a solution Hello! Excuse me in advance for my English. I recently installed Symantec Protection Suite Small Business Edition. In the Symantec Protection Center I ...
Forum Discussion by MrMagoo | 16 Jun 2011 | 1 comment
Abstract: Custom Inventory extends the data that can be gathered and collected in the CMDB for reporting purposes. The following document outlines the steps required to add space usage by file types.  All referenced tasks are performed in the ...
Download by cnpalmer75 | 15 Jun 2011 | 5 comments
When you log on as a standard user to Symantec Endpoint Protection, you do not have the ability to see the Scan Log , Risk Log and System Log . The logs show up with blank lines. The corresponding log file however is not empty. Logs for ...
Idea by lockdown wizard | 15 Jun 2011 | 3 comments
Abstract: The following process provides the necessary steps to apply metering policies to existing Software Catalog entries. In order to properly meter a product, all software components of that product must have an associated policy applied. ...
Download by cnpalmer75 | 14 Jun 2011 | 0 comments