Video Screencast Help

Federal Government

Results for Federal Government

Ronald Reagan Building & International Trade Center Tue, 11 June, 2013 - 8:30 - 15:00 EDT Join ...
Event by MeganI | 27 Mar 2013 | 0 comments
De-Militarized Zone or the DMZ is the portion of the network which has two main specifications: 1-      Contains servers and services which are accessible from outside of the network. 2-      Any access to these servers and transaction with them ...
Article by Farzad | 19 Mar 2013 | 7 comments
Hi,       I have found that even on Netbackup 7.5 there is still no auditing for any SLP modification which is a big deal for some customers because in many cases we have face that a single SLP modification translates in to TB's of backlogs that ...
Idea by Omar Villa | 12 Mar 2013 | 0 comments
I need a solution Morning Colleagues... I have a dilema which I feel I am in big trouble with... maybe you can help...   We had an old system; MASTER_A with v6.5  and ...
This issue has been solved
Forum Discussion by jkhosravan | 07 Feb 2013 | 4 comments
This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.   Particularly during the first few minutes and hours of a business disruption, an established incident ...
Article by Courtenay Enrig... | 29 Jan 2013 | 0 comments
Hi Everybody,                       You may be facing lot of problems with a virus infected systems in your  IT environment. Here is a tool which will help your endpoints to recover after a massive virus outbreak. If the endpoints are  heavily ...
Article by Samir Ahmed | 13 Jan 2013 | 1 comment
Regulatory compliance is a critical factor in the development of an IT Business Continuity strategy. The requirements vary across industry sectors and geographies. It is also worth noting that not all regulations may apply in a specific business ...
Article by sai_mukundan | 02 Jan 2013 | 1 comment
I need a solution When drilling down into events that are part of a SSIM incident you discover that SEP has detected a number of malware threats. The Data Status ID of the threats ...
Forum Discussion by 0zguR | 14 Nov 2012 | 0 comments
Referring to TECH189663 ( www.symantec.com/docs/TECH189663 ) and the SWG 5.1 implementation guide on page 205, The Symantec Web Gateway proxy supports basic 401 authentication from Web sites. Web sites that require NTLM 401 authentication or a ...
Idea by JB Park | 12 Nov 2012 | 0 comments
When Erik Hughes, the Principal Product Manager on SWV asked me to write an article on our PolicyPak utility for SWV, I wasn’t exactly sure how to start. As a Group Policy MVP I often think about the big picture problems around desktop management. ...
Article by Jeremy Moskowitz MVP | 08 Nov 2012 | 0 comments