1. /
  2. Yellow Books

Symantec Yellow Books

Symantec Yellow Books provide technical know-how to IT professionals in Symantec's customer and partner communities—and to the technical marketplace in general. Written to show how to solve real-world business and technical problems using Symantec solutions, these books include best-practice recommendations as well as detailed information on installation, configuration, and product integration.

Feedback

Veritas Cluster File System

The Veritas Cluster File System: Technology and Usage

Optimize utilization, performance, and availability with Symantec's scalable shared file storage infrastructure.
This book describes Symantec’s Veritas Cluster File System (CFS), an implementation of the cluster architectural model for sharing data among multiple computers. Based on Symantec’s long-proven Storage Foundation File System (commonly known as VxFS), CFS is exceptionally scalable, robust, and high-performing. Building on a solid base of VxFS technology, CFS adds clusterwide cache coherency, distributed resource control and file system transactions, and other features that enable scaling and enhance performance and load balancing across a cluster of application or database servers.
Download PDF Now (250 pages)
azyb

Symantec Product Authentication and Authorization Volume III

Volume III illustrates the setup of the Symantec Product Authentication and Authorization Service in both stand-alone and high-availability environments.
You are given the steps to configure the Symantec Product Authentication and Authorization Service in both stand-alone and high-availability environments. Volume III also provides the Symantec-tested authentication and authorization common procedures that you can use to securely verify Symantec products in your enterprise environment. The procedures for the authentication, the authorization, and the Symantec-products are tested and verified on Windows, Linux, and UNIX platforms.
Download PDF Now (336 pages)
azyb

Symantec Product Authentication and Authorization Volume II

Volume II presents use cases of Symantec products being deployed with the Symantec Product Authentication and Authorization Service in your enterprise.
Each use case provides possible deployment configurations. Organizations can use these tested use cases as a guide to help them securely deploy Symantec products with authentication and authorization. You can design and implement an appropriate security configuration for your enterprise when you deploy the first Symantec product with authentication and authorization. After the security infrastructure is in place, you can securely deploy additional Symantec products with authentication and authorization. Volume II includes Windows, Linux, and UNIX use cases in which multiple deployment scenarios are described in both stand-alone and high-availability environments.
Download PDF Now (457 pages)
az_yb

Symantec Product Authentication and Authorization Volume I

Volume I provides an overview of the Symantec Product Authentication and Authorization Service in your enterprise.
The overview explains the value that authentication and authorization adds to the security infrastructure in your enterprise environment. It also gives a high-level view of the Symantec Product Authentication and Authorization Service to help you understand the role of the security infrastructure. You can use the suggested guidelines and best practices to create the appropriate deployment configuration and securely deploy Symantec products with authentication and authorization in your environment.
Download PDF Now (97 pages)
sirmme

Symantec Information Risk Management for Microsoft Exchange

This Symantec Yellow Book helps organizations deploy a combination of Symantec products to minimize and manage the risk to enterprise information such as Microsoft Exchange email. It explains how Symantec's email and instant message protection and archiving solutions can reduce the risks posed by security threats and spam. The book also explains how these Symantec solutions help organizations implement archiving in order to simplify storage and discovery challenges for improved messaging management and reduced e-discovery and compliance risks. This book presents the combination of Symantec products that are considered essential for information risk management, and includes a description of the Dell Secure Exchange test environment.
Download PDF Now (140 pages)
Highlights

The Role of IT in Achieving Compliance

Strategies for alignment of IT controls with regulatory compliance and business needs.
This book provides CIOs, business stakeholders, IT managers and administrators information about how to meet the business requirements set forth by multiple functions involved in the compliance process. This includes creating a sound control environment, which supports the business and addresses the IT risks in a more efficient manner. Although many of the regulations and examples highlighted in this book focus on the financial industry for the US and Western Europe, the same processes model and methodology, technology solutions, and best practices recommendations can be applied to most regulated industries.
Download PDF Now (290 pages)
Take the multimedia tour
udst

Using Dynamic Storage Tiering

How Veritas Storage Foundation helps you get the most from multi-tier online storage.
This book describes how Dynamic Storage Tiering works, shows how administrators can use it to automatically optimize online storage utilization, and presents some common use cases. It is a must for architects and administrators concerned with controlling storage cost without sacrificing the quality of service delivered to applications and users.
Download PDF Now (195 pages)
ulcs

Using Local Copy Services

How Veritas Storage Foundation snapshot facilities protect data, reduce costs, and enhance the quality of IT service.
This book describes how Storage Foundation's five snapshot facilities work, how they are commonly used, and how to implement them. The five facilities are: split mirror snapshots, space-optimized instant snapshots, full-sized instant snapshots, snapshot file systems, and storage checkpoints.
Download PDF Now (197 pages)
yellowbook

Standardizing Storage Management

Using Veritas Storage Foundation to increase effectiveness of storage management across the enterprise.
This book describes how to standardize storage configuration and administration across all of a data center's platforms to result in better quality of service at lower administrative cost. Storage architects, administrators, integrators, and consultants need to know about the Storage Foundation and how it can reduce their cost to deliver service.
Download PDF Now (168 pages)