Quantcast
Channel: Symantec Connect - Articles
Viewing all 1863 articles
Browse latest View live

Disk Storage Replication Report

$
0
0

Please find the Screenshot attached.

Replication Report or Summary

Based on my experience I have inputted the 3 options to generate total Data Replication report

Option: 1

-->login to Datadomain web GUI http://<storagename> press enter

-->Click on Storage Server

--> Click on Replication

-->if DDboost, Click on DDboost

-->Click on File Replication

-->select the Duration

--> there you can find the total Replication size in 24 hrs

 

 

Option: 2

-->login to Datadomain web GUI http://<storagename> press enter

-->On left bottom, click on report,

--> Select replicationSummary --> select duration --> click on create

 

 

Option: 3 opscenter

-->Click on Report

-->Click on New Custom Report

 

  • Select Ranking

 

àSelect Duration

àSelect Master server if any in particular

àUnder Disk please select Storage server name or Disk Volume name if you looking for any specific

 

Select Report on: “Disk Volume Name” or Storage Server Name

y-axis Display name

Select Report Data: “Disk Volume Replication “

Select Count

Select time basis as “Job End Time”

Click on Next

 

After clicking next you will get the report based on Disk volume name and Disk Replication Count in form on Ranking

 

 

 

 

Click next to save

 

 

 

After Save, open report and click on “show chart as Table”

A table will pop up with all values

 

 


Two Reasons why IPS is a "Must Have" for your Network

$
0
0

Introduction

This is the third of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). 

This third article illustrates how Symantec Endpoint Protection's optional Intrusion Prevention System (IPS) component can help security admins keep their organization secure and track down infected computers on the network.

 

IP What?

Unlike AntiVirus, which looks for known malicious files, IPS scans the network traffic stream in order to find threats using known exploits and attack vectors. IPS does not detect specific files, but rather specific methods that can be used to get malicious files onto your network. This allows IPS to protect against both known and unknown threats, even before antivirus signatures can be created for them.  It’s very cool.

SEP’s IPS component greatly increases the number of threats that can be blocked, so the use of IPS is strongly recommended on almost all endpoints.  More details are contained in:

Best practices regarding Intrusion Prevention System technology
http://www.symantec.com/docs/TECH95347

 

Not Just for Windows Any More!

IPS has been an optional component of SEP for Windows since the beginning.  In order to enable IPS in Symantec Endpoint Protection 11.x, the client firewall portion (Network Threat Protection) must be installed and running. In SEP 12.1, the client firewall function is separate and does not need to be installed or enabled for IPS to function. 

SEP 12.1 RU4 brought many new features to the SEP client that runs on Macintosh (“SEP for Mac”).  An overview of these enhancements can be found in:

Overview for Symantec Endpoint Protection 12.1.4 for Mac
http://www.symantec.com/docs/HOWTO92146

One of the best of these enhancements is that IPS can now defend Mac machines as well as the Windows boxes on the network.  So, definitely upgrade the protection on your Macs!

 

How IPS Defends Clients

For an excellent illustration of how IPS can protect against a very dangerous threat, see Recovering Ransomlocked Files Using Built-In Windows Tools.  Even if the initial Trojan.Cryptolocker .exe is not detected by SEP’s AntiVirus components, IPS attack signatures can still block the network traffic that this threat relies upon in order to generate the keys necessary to sabotage a computer’s files.  If you see a pop-up “System Infected: Trojan.Cryptolocker” then IPS has just blocked the Trojan’s network activity (and saved you a load of grief).  Get that computer isolated and perform a load point diagnostic to identify any unidentified malware files!

 

Generating SEPM Reports of Network Attacks

As detailed in my first article, your Symantec Endpoint Protection Manager contains advanced capabilities for reporting and alerting.  It can often tell you exactly what is going on with the security of your network, if you know how to look.

One report that it can generate on demand is Network Threat Protection: Attacks.  (Remember: in SEP 12.1, it is not necessary to have the NTP component of SEP installed in order to take advantage of IPS.  IPS can be installed without NTP.  The report of all IPS attacks is still listed under Network Threat Protection as a legacy inherited from SEP 11 days.)

Just click on Monitors, Logs tab, and pick the "Network Threat Protection" option for Log type.  Choose “Attacks” to see all the IPS events that have occurred on managed SEP clients and been forwarded to the SEPM.

Logs.jpg

 

 

The logs for all the attack events will be displayed on screen, and can be exported for more advanced parsing and analysis with your favorite spreadsheet program. 

 

Identifying Unprotected Computers

One example of how these can be useful: in a recent real-world case, an administrator had been fighting a never-ending battle to eradicate W32.Downadup from the corporate network.  There were constant detections of this threat being stopped, but somewhere out there were infected computers which constantly tried to re-infect others.  Examining the Risk Reports failed to show any instances where the threat was being detected by AV but “left alone,” so where were they?

Examining the exported Network Attack logs, it was pretty clear that IPS was also blocking infection attempts (traffic that attempted exploit of the vulnerability that W32.Downadup uses to spread).  These logs, though, showed what IP addresses involved with each “[SID: 23179] OS Attack: MSRPC Server Service RPC CVE-2008-4250 attack blocked. Traffic has been blocked for this application: SYSTEM”

 

traffic.jpg

 

Examining the Remote Hosts that were responsible for all that traffic was the solution to this case.  There were a handful of infected computers that had no AV product on them at all. Installing SEP ended the persistent W32.Downadup troubles for good. 

 

Identifying Infected Machines

In another recent real-world example: hundreds of Auto-Protect virus events (Event ID 51) were seen on the shared directory of a file server.  Several days were spent examining the load points of the server itself, with nothing malicious found.  The reason: the infection was on one of the 400 clients which connect daily to that mapped drive.  Some client in the network had attempted to do the damage- but which one?  It would not be possible to examine load point diagnostics from all those hundreds of clients.

Luckily, that file server had IPS installed.  The IPS logs were examined and a large number of ”Incoming Auto-Block Event” entries were spotted, coming from one particular IP Address.  This activity might have been a coincidence, but in this case it was a very big clue as to which mapped client was infected.  That computer was isolated, cleaned, patched and returned to the network.  Problem solved.  

Conclusion

IPS can protect your computers- and everything on them-  in ways that AV alone cannot.  And, its logs can provide valuable intelligence about which computers in the network are infected. 

Moral of this story: it’s much easier to deploy the SEP IPS client and read its logs than to examine 400 load point diagnostics.  &: )

 

One final recommendation: it is always a good time to ensure that the organization's defenses are in good order. There is a great deal of malware in circulation, and it is guaranteed that tomorrow the baddies will come up with new code and techniques.  Take precautions now!

Symantec Endpoint Protection – Best Practices
http://www.symantec.com/theme.jsp?themeid=stopping_malware&depthpath=0

 

 

Many thanks for reading!  Please do leave comments and feedback below. 

 

Windows 8 – elenco comandi e funzioni di sistema operativo

$
0
0

In questo articolo sono elencati una serie di comandi e funzioni di sistema che consentono di personalizzare diversi aspetti del sistema operativo e del suo comportamento nelle singole sessioni utente.

La grande maggioranza di queste funzioni è richiamabile da menu di sistema operativo, da menu di sistema contestuali oppure dal pannello di controllo, ma utilizzando il nome del comando è possibile agire direttamente sulla funzione desiderata risparmiarmiando tempo per la sua ricerca.

Inoltre, una buona parte di queste funzioni sono utilizzabili all'interno di programmi batch, ad esempio inserendo alcuni di questi comandi con dei parametri specifici è possibile personalizzare vari aspetti del sistema operativo.

Nota : i comandi elencati sono per la maggior parte compatibili anche con i sistemi operativi Windows 7, Vista e Windows XP.

Per eseguire uno di questi comandi, da Esegui ( Tasto Windows + R  ) digitare uno dei comandi elencati nella colonna Comandi :

FunzioniComandi
Apre la cartella Documentidocuments
Apre la cartella videovideos
Apre la cartella Downloaddownloads
Apre la cartella Preferitifavorites
Apre la cartella File recentirecent
Disconnessione da Windowslogoff
Apre la cartella Immaginipictures
Windows Sideshowcontrol.exe /name Microsoft.WindowsSideshow
Windows CardSpacecontrol.exe /name Microsoft.cardspace
Windows Anytime UpgradeWindowsAnytimeUpgradeui
Taskbar e Startcontrol.exe /name Microsoft.TaskbarandStartMenu
Troubleshootingcontrol.exe /name Microsoft.Troubleshooting
Account utentecontrol.exe /name Microsoft.UserAccounts
Aggiunge un nuovo dispositivodevicepairingwizard
Wizard per l’aggiunta di nuovo hardwarehdwwiz
Gestione avanzata accountnetplwiz
Gestione autorizzazioniazman.msc
Backup e ripristinosdclt
Trasferimento file Bluetoothfsquirt
Calcolatricecalc
Certificaticertmgr.msc
Cambia le impostazioni sulle performance del PCsystempropertiesperformance
Cambia impostazioni DEPsystempropertiesdataexecutionprevention
Cambia impostazioni stampaprintui
Mappa carattericharmap
ClearType Tunercttune
Gestione coloricolorcpl
Prompt dei comandicmd
Componenti di servizio apertocomexp.msc
Componenti di servizio apertodcomcnfg
Gestione computercompmgmt.msc
Gestione computercompmgmtlauncher
Connessione proiettore di retenetproj
Connessione proiettoredisplayswitch
Pannello di controllocontrol
Wizard per creazione cartella condivisashrpubw
Crea disco di ripristinorecdisc
Wizard per backup/ripristino credenzialicredwiz
Data Execution Preventionsystempropertiesdataexecutionprevention
Data e oratimedate.cpl
Percorso predefinitolocationnotifications
Gestione dispositividevmgmt.msc
Gestione dispositivihdwwiz.cpl
Aggiunge un nuovo dispositivodevicepairingwizard
Wizard risoluzione problemimsdt
Calibrazionetabcal
Diagnostica DirectXdxdiag
Pulizia discocleanmgr
Utility deframmentazione discodfrgui
Gestione dischidiskmgmt.msc
Schermodpiscaling
Calibrazione coloridccw
Cambio schermodisplayswitch
Wizard migrazione chiavi DPAPIdpapimig
Gestione verifica driververifier
Accesso facilitatoutilman
Wizard EFSrekeywiz
Visualizzatore eventieventvwr.msc
Fax editorfxscover
Verifica firma filesigverif
Visualizzatore fontfontview
Controller giochijoy.cpl
Schermata presentazione Windowsgettingstarted
IExpress Wizardiexpress
Infrarossoirprops.cpl
Installa/Disinstalla linguelusrmgr
Internet Exploreriexplore
Opzioni Internetinetcpl.cpl
Configurazione iSCSI Initiatoriscsicpl
Installazione language packlpksetup
Gestione criteri di gruppogpedit.msc
Criteri di protezione localisecpol.msc
Gestione utenti e gruppilusrmgr.msc
Imposta posizione geograficalocationnotifications
Lente d’ingrandimentomagnify
Malicious Software Removal Toolmrt
Gestisce certificati di protezionerekeywiz
Pannello espressioni matematichemip
Microsoft Management Consolemmc
Microsoft Support Diagnostic Toolmsdt
Mousemain.cpl
Configurazione client NAPnapclcfg.msc
Narratornarrator
Connessioni di retencpa.cpl
Wizard acquisizione immaginewiaacmgr
Blocco notenotepad
ODBC Data Source Administratorodbcad32
ODBC Driver Configurationodbcconf
Tastiera su schermoosk
Paintmspaint
Penna e Touchtabletpc.cpl
Persone nelle vicinanzecollab.cpl
Monitoraggio performanceperfmon.msc
Impostazioni performancesystempropertiesperformance
Telefono e modemtelephon.cpl
Composizione telefonicadialer
Impostazioni risparmio energiapowercfg.cpl
Impostazioni presentazionepresentationsettings
Gestione stampaprintmanagement.msc
Migrazionestampaprintbrmui
Interfaccia di stampaprintui
Editor caratterieudcedit
Registratore problemipsr
Programmi e funzioniappwiz.cpl
Migrazione contenuto protettodpapimig
Paese e Linguaintl.cpl
Editor registroregedit
Editor registro 32regedt32
Rubrica accesso remotorasphone
Connessione remota desktopmstsc
Monitoraggio risorseresmon
Gruppo criteri risultantersop.msc
SAM Lock Toolsyskey
Risoluzione schermodesk.cpl
Messa in sicurezza database account Windowssyskey
Serviziservices.msc
Impostazioni accesso ai programmicomputerdefaults
Creazione condivisioneshrpubw
Cartelle condivisefsmgmt.msc
Strumento di catturasnippingtool
Suonommsys.cpl
Registratore suonisoundrecorder
SQL Server Client Network Utilitycliconfg
Sticky Notesstikynot
Username e Password conservaticredwiz
Sync Centermobsync
Utility configurazione sistemamsconfig
Editor configurazione sistemasysedit
System Informationmsinfo32
Proprietà sistemasysdm.cpl
Proprietà sistema – avanzatesystempropertiesadvanced
Proprietà sistema – nome computersystempropertiescomputername
Proprietà sistema – hardwaresystempropertieshardware
Proprietà sistema – remotosystempropertiesremote
Proprietà sistema – protezionesystempropertiesprotection
Ripristino sistemarstrui
Task Managertaskmgr
Pianificazione operazionitaskschd.msc
Gestione Trusted Platform Module (TPM)tpm.msc
Impostazioni Controllo account utenteuseraccountcontrolsettings
Utility Managerutilman
Version Reporter Appletwinver
Mixer volumesndvol
Windows Action Centerwscui.cpl
Client attivazione Windowsslui
Windows Anytime Upgrade Resultswindowsanytimeupgraderesults
Windows CardSpaceinfocardcpl.cpl
Masterizzazione file immagineisoburn
Windows DVD Makerdvdmaker
Windows Easy Transfermigwiz
Windows Explorerexplorer
Fax e scannerwfs
Funzioni di Windowsoptionalfeatures
Windows Firewallfirewall.cpl
Windows firewall con impostazioni sicurezza avanzatewf.msc
Windows Journaljournal
Windows Media Playerwmplayer
Windows Memory Diagnostic Schedulermdsched
Windows Mobility Centermblctr
Wizard Acquisizione Immaginiwiaacmgr
Windows PowerShellpowershell
Windows PowerShell ISEpowershell_ise
Assistenza remotamsra
Disco ripristino di Windowsrecdisc
Windows Script Hostwscript
Windows Updatewuapp
Windows Update Standalone Installerwusa
Versione Windowswinver
WMI Managementwmimgmt.msc
WordPadwrite
XPS Viewerxpsrchvw

 

Announcing support for OS X 10.9 Mavericks

Sharepoint backup fails with error

$
0
0

V-79-57344-33967 - Snapshot Technology: Initialization failure on: "Search instance\Search-DB 1 (Sharepoint\WSS_Search_Sharepoint)". Snapshot technology used: Microsoft Volume Shadow Copy Service (VSS). Snapshot technology error (0xE00084AF): The directory or file was not found, or could not be accessed. Check the Windows Event Viewer for details.

Job log.JPG

Windows Event Viewer information

Event ID : 8193
Source : VSS
Error : ConvertStringSidToSid(S-1-5-80-1202657632-534270475-2053275915-3193571600-3895445954.bak), 0x80070539, The security ID structure is invalid.
 

Event ID.JPG

 

Cause
Invalid security ID structure

 

Solution

1)Open regedit on remote server

2)Navigate to HKLM\Software\Microsoft\Windows NT\Current Version\Profile List

3)Right click on Profile list and click Export to take a backup of the registry and save it

4)Look for the invalid SID that is listed in the event viewer (S-1-5-80-1202657632-534270475-2053275915-3193571600-3895445954.bak) and delete it.

SID.JPG

5)Restart the remote server and run the backup again.
 

Extending Asset Management Solution with CMDB Solution

$
0
0

Often times when software is purchased for an organization, the vendor provides a license key or user ID and password combination to activate their software.

Customers often store this information in spreadsheets on their local computer or on a file share within their organization. This can lead to lost information when it is not linked to the consumption of licenses within the organization.

By using the Symantec Management Platform with Asset Management Suite, a customer can simply extend the out-of-the-box solution and create a central repository for such information that also links to purchase information; individual licenses; and actual consumption of such licenses. 

The attached document outlines the necessary steps to add data classes; modify a Resource Type; and create a data entry screen for storing license keys, usernames, and passwords (in clear text).

SEPM 12.1 - Advanced Settings filter options for Client Activity logs

$
0
0

Trying to wade through Client Activity logs can become a tedious task, especially when you have thousands of clients. I would like to show you some advanced filtering that you can do to get the Client info you need much more quickly.

For this article, I will focus solely on the Client Activity logs in the SEPM:

1_8.JPG

The box we want to use for filtering is the Event source box. There are specific keywords you can use to get more granular. They are as follows:

  1.     GUP
  2.     IPS
  3.     LiveUpdate Manager
  4.     Network Intrusion Protection Sys
  5.     REP
  6.     Smc
  7.     SONAR
  8.     SYLINK
  9.     Symantec AntiVirus
  10.     Symantec Endpoint Protection

To look at events generated by SMC, we enter SMC into the Event source box:

2_8.JPG

Click View Log to see those events

3_8.JPG

As you can see, a wealth of info is generated. This also holds true for the other nine keywords above as well. I highly recommend you try these out to see what info comes back. It is very detailed and you may find somethings that you previously did not know about! Better yet, you can export to CSV and drop into Excel and filter as needed.

I hope these help you in your daily monitoring tasks. Feel free to post and comments/questions/criticisms

Thanks!
Brian

How to sign up for alerts and notifications on the BCS notification system

$
0
0

BCS.jpg

Issue

This document explains the process of configuring the Symantec Alerting Services for BCS customers, which includes editing and confirming your recipient information, alerts and notifications and resetting your password. 

Solution

Logging in
( https://symantec.mir3.com )
On entering, you see the following login screen:

MIR3_LOGIN.PNG

Your Username is the same numeric login you use to log into the BCS Support site.

The initial password is the first two characters of your last name (in lower case) followed by: 4Zp%9sj2
For example, the initial login password for John Smith would be: sm4Zp%9sj2
The password is 10 characters long, has no spaces and it is case sensitive.

When you successfully login, you see the following screen. Click the Profile button at the top.

MIR3_Profile.PNG

The recipient setup screen appears.

Changing/Setting passwords

To change your password, please go to the left hand navigational bar under Security and click Change Password. (shown below)

MIR3_Profile_01.PNG

In this section, the initial password is the first two characters of your family name (again in lower case) followed by: 4Zp%9sj2
For example, the login for John Smith would be: sm4Zp%9sj2
The password is 10 characters long, has no spaces and it is case sensitive.

Once you have logged in, you will be asked to reset your password to one of your choosing. That password must meet the following criteria:

    • It must be at least 10 characters long
    • It must contain at least one upper case letter
    • It must contain one lower case letter
    • It must contain one number
    • It must contain one special character (for example: !@#$)

In the future, you will have to reset this password every 90 days per security best practices.

Recipient Information Setup

Click the back arrow on the browser to return to the Recipient Setup page. The screen should be at the General tab
 

  1. At the Recipient Setup page:
    • Confirm your time zone in the drop down menu.
    • Enter your company name. (Employee ID is not necessary)
  2. Confirm the communication modalities you require. The devices circled in red below are the ones available:

MIR3_Profile_02_General.PNG

 

 

Note: After some study, Symantec BCS has decided to join the global trend and discontinue slower or problematic legacy telephone and fax communication modes. We will retain only email and SMS modes by which you can receive alerts. Selecting other than the two specified modalities will not enable them, and you will not receive information on them.

Setting up Alerts and Subscriptions

  1. Click the Topic Subscriptions tab and then click the User Subscriptions tab. (as shown below)

    MIR3_Profile_03_Subscriptions.PNG

  2. Select the Categories you wish to activate for alerts/notifications. You may already see pre-populated information.
  3. Confirm all needed alerts/notifications are here. If not, please add the category by using the drop down menu.
    Selection of the top category header will select all sub-categories. If you do not want to receive all sub-categories, iteratively select specific categories from the drop down menu.

    All other settings: Priority, Severity, Location are already set to their defaults and need no further attention.

  4. Select the Activate check boxes.
     

The following shows the relevant selections:

This will give you informations about the Daily Definition Updates.
MIR3_Profile_03_Subscriptions_DailyDefinitions.PNG
 

This will give you informations about known vulnerabilitys of your Symantec product and recommendations for this.

MIR3_Profile_03_Subscriptions_PlatinumBulletin.PNG

This will give you informations about Endpoint Protection Engine Updates like new BASH driver or new Eraser engine etc.

MIR3_Profile_03_Subscriptions_SEP Engine Update.PNG

Ensuring you receive your alerts or notifications

Depending on your company's Security protocols, you may need to reset your SPAM filters to allow these alerts to enter. If this is the situation, use the following sending address string information for your filters: @notify2.mir3.com

Additional questions

If you have any problems with your set up, please contact your BCAM.
 

Additional Alternative Notification Methods

You may also want to subscribe to anti-virus RSS feeds by visiting the following link and signing up for the virus definitions and security updates: http://www.symantec.com/xml/rss/definitions.jsp 


Symantec Workspace Streaming 7.5 SDK Quick Start Guide

$
0
0

Symantec Workspace Streaming SDK includes several web services. You can access them by using the Simple Object Access Protocol (SOAP). A Web Services Description Language (WSLD) document exposes the interface. The WSLD document provides details on the published methods and objects. The Workspace Streaming web services are separated into multiple areas of management. Each area has its own WSDL file.

This Quick Start Guide explains you through developing clients in the Visual Basic and Java languages. However, most programming languages, such as C#, Visual Basic, C++, Java, and Python, provide support for SOAP web services. Most languages also let you use the WSLD document to automatically generate proxy classes.

You must meet the following requirements to use the Symantec Workspace Streaming SDK:

  • The Workspace Streaming web services require Workspace Streaming 6.1 or later.
  • Applications accessing the web services must be able to contact the server that hosts the Streaming Console.
  • You must have an account on your Workspace Streaming system.

Thanks,

Ankit Shrivastava

How to Create a Filter in Yahoo Mail That Will Deliver Connect Messages to My Inbox

$
0
0

Are you using Yahoo Mail as your primary contact email or email client for receiving Connect notifications and find that a lot of your messages are being delivered to the Spam folder?

Yahoo is inconsistent - messages from Connect will be delivered to your Inbox AND to your Spam folder. Just to be on the safe side, check that Spam folder to see what's piling up in there. It can't all be cheap pharmaceuticals!

yahoo spam 1.png

Creating a filter that will deliver your Connect messages to the Inbox is a simple task - then you won't need to check your Spam folder for our messages ever again!

First you need to start with a message from us that has landed in your Spam folder that you know is a legitimate Connect message. Go right ahead and open it. It never hurts to add us to your Contacts list but don't get distracted - we're creating a Filter.

Open your Spam Folder and look for a message from Connect - it could be a notification or a newsletter.

yahoo spam 2.png

Open any one of these messages and then choose the "More..." icon

yahoo spam 3.png

A drop down menu will open with a list of options. Choose "Filter Email Like This..."

yahoo spam 4.png

A box will open allowing you to customize your filter

yahoo spam 5.png

All you need to do is choose "Inbox" in the drop down menu under "Then move the message to" and click "Save"

Unlike Gmail, messages currently in your Spam folder that would be affected by this filter won't be delivered to your inbox. It only applies to messages delivered after the filter has been created. You're still going to have to crawl through your spam folder looking for important messages.

 

Modifying IT Analytics Reports to Decrease Load Times

$
0
0

For IT Analytics reports hosted by SQL Server Reporting Services (which include out-of-the-box reports and dashbaords) some users may experience extended wait times before the report is able to render, and in some cases the report may even fail or timeout. This typically occurs in environments where there are extremely large data volumes and where reports are pre-configured to display all data by default (without filtering).

To minimize the time it takes for some IT Analytics reports to load, steps can be taken to configure settings so that data will be filtered by default, hence greatly improving performance. This article will describe such process, utilizing Microsoft Report Builder a client side aplpication which comes with SQL Server Reporting Services.

 

Selecting the Report

  1. To load Report Builder, open Symantec Management Platform Console and navigate to: Settings > Notification Server > IT Analytics Settings > Reports > Report Builder. Then click on the Launch Report Builder button.

article31-1_0.png

  1. If prompted, click Run to start downloading the application.
  2. Be patient, launching application may take a minute or two, depending on connectivity. While the application is loading, you should see this message:

article31-2_0.png

  1. Click Open to select the report you want to optimize. Under the default configuration, all IT Analytics reports are stored within the ITAnalytics folder off the ReportServer root. 

article31-3_0.png

NOTE: For the purposes of this example, we will select the IT Analytics Configuration Events report. As such, the parameters you select in the next section of this article may be different.

 

Modifying the Report

  1. When report opens, expand Parameters in the Report Data pane on the left, then right-click the From parameter and select Parameter Properties.

article31-4_0.png

  1. Navigte to Default Values > Get values from a query. For both fields select MaxDate from drop-down list, then click OK.
article31-5_0.png
 
NOTE: Write down original values prior to making any modifications.
  1. Modify the properties for the Types parameter and navigate again to Default Values. Select Specify Values and Add new value. In the field type in 'Cube Processing' (without quotes) as shown below, then click OK. If you are modifying a different report, select an appropriate paramater and input a default value that matches a value for that parameter.
article31-6_0.png
  1. Modify the properties for the Targets parameter and navigate again to Default Values. Select Specify Values and Add new value. In the field type in 'Processing Trace' (without quotes) as shown below, then click OK. If you are modifying a different report, select an appropriate paramater and input a default value that matches a value for that parameter.
article31-7_0.png
  1. Click Save to apply all changes (saving may take couple seconds).
article31-8_0.png
 
 

Reloading the Report

  1. In the Symantec Management Console, navigate to Reports > IT Analytics > Reports > IT Analytics Events > ITA Configuration Events (or a the appropriate report you modified). Refresh the browser if necessary. You should notice the report load much faster than previously.
  2. Verify that the current day (in the From parameter) and the specific Type and Target are pre-selected with the values we input previously (or the appropriate values you entered if modifying a different report).

article31-9_0.png

  1. To adjust the parameter values, you can select different values as you normally would.

article31-10_0.png

 

Preventing IT Analytics Reports from Running Automatically

$
0
0

By default, reports and dashboards in IT Analytics (hosted by SQL Server Reporting Services) will run automatically when selected. This behavior can sometimes be problematic for environments with excessive amounts of data, resulting in increased load times or timeouts for certain reports. One option to prevent this is to modify the value of a parameter within a report so that it does not execute automatically when clicked, a process which is documented in the article below.

To modify report parameters in more detail in order to load reports more efficiently, please see the article: Modifying IT Analytics Reports to Decrease Load Times.

  1. For the purposes of this example we will use the DLP Endpoint Incident Search report. Note that by default, the report runs with the Policy Name parameter value of 'All' pre-selected.

article33-1_0.png

  1. To change this report, open a browser on the server hosing SQL Reporting Services and goto: http://localhost/Reports.
  2. From within the IT Analytics folder, locate and hover over the DLP Endpoint Incident Search report (or the report you want to modify) and to the right you will see a menu of options. Select Manage.

article33-2_0.png

  1. Once in the report manage screen, select the Parameters section.

article33-3_0.png

  1. Once there, uncheck the 'Has Default' column from the parameter you want to force users to select or enter information on. This will ensure a user must select a value for that parameter before the report can be executed. In this example we will use the Policy Name parameter, then click Apply.

article33-4_0.png

  1. Return to the Symantec Management console to load the report and you should notice that it does not automatically execute the report, but instead prompts for a parameter value. Once a value is selected click View Report. Refresh the browser if necessary. 

The Log Files Location and Description of Symantec DLP Server

$
0
0

Symantec Data Loss Prevention provides many operational log files that can be used to interpret how the system is running.

The default locations put the log files during installation for the Enforce Server and Detection Servers on the computers that host the servers. The files are in the \SymantecDLP\Protect\logs directory on Windows installations and in the /var/log/SymantecDLP directory on Linux installations. The number at the end of the log file name indicates the count.

Most log files are located on the sub-directory: \SymantecDLP\Protect\logs\debug on Windows and /var/log/SymantecDLP/debug on Linux.

Log File Name

Description

Server

Aggregator0.log

This file describes communications between the detection

server and the agents.

Look at this log to troubleshoot the following problems:

■ Connection to the agents

■ To find out why incidents do not appear when they should

■ If unexpected agent events occur

Endpoint detection

servers

BoxMonitor0.log

This file is typically very small, and it shows how the application processes are running. The BoxMonitor process oversees the detection server processes that pertain to that particular server type. For example, the processes that run on Network Monitor are file reader and packet capture.

All detection servers

ContentExtractor0.log

This log file may be helpful for troubleshooting

ContextExtractor issues.

All detection servers,

Enforce Server

DiscoverNative.log.0

Contains the log statements that the Network Discover native code emits. Currently contains the information that is related to ,pst scanning. This log file applies only to the Network Discover Servers that run on Windows platforms.

Discover detection

servers

FileReader0.log

This log file pertains to the file reader process and contains application-specific logging, which may be helpful in resolving issues in detection and incident creation. Look at this log file to find out why an incident was not detected. One symptom that shows up is content extractor timeouts

All detection servers

IncidentPersister0.log

This log file pertains to the Incident Persister process. This process reads incidents from the incidents folder on the Enforce Server, and writes them to the database. Look at this log if the incident queue on the Enforce Server (manager) grows too large. This situation can be observed also by checking the incidents folder on the Enforce Server to see if incidents have backed up.

Enforce Server

Indexer0.log

This log file contains information when an EDM profile is indexed. It also includes the information that is collected when the external indexer is used. If indexing fails then this log should be consulted.

Enforce Server (or

computer where the

external indexer is

running)

jdbc.log

This log file is a trace of JDBC calls to the database. By default, writing to this log is turned off.

Enforce Server

MonitorController0.log

This log file is a detailed log of the connections between the Enforce Server and the detection servers. It gives details around the information that is exchanged between these servers including whether policies have been pushed to the detection servers or not.

Enforce Server

PacketCapture.log

This log file pertains to the packet capture process that

reassembles packets into messages and writes to the

drop_pcap directory. Look at this log if there is a problem

with dropped packets or traffic is lower than expected.

PacketCapture is not a Java process, so it does not follow the same logging rules as the other Symantec Data Loss

Prevention system processes.

All detection servers

PacketCapture0.log

This log file describes issues with PacketCapture

communications.

All detection servers

RequestProcessor0.log

This log file pertains to SMTP Prevent only. The log file is primarily for use in cases where SmtpPrevent0.log is not sufficient.

SMTP Prevent

detection servers

ScanDetail-target-0.log

Where target is the name of the scan target. All white spaces in the target's name are replaced with hyphens. This log file pertains to Discover server scanning. It is a file by file record of what happened in the scan. If the scan of the file is successful, it reads success, and then the path, size, time, owner, and ACL information of the file scanned. If it failed, a warning appears followed by the file name.

Discover detection

servers

SmtpPrevent0.log

This operational log file pertains to SMTP Prevent only. It is the primary log for tracking health and activity of a Mail Prevent system. Look at this file for information on the communications between the MTA and detection server.

SMTP Prevent

detection servers

Tomcat\Localhost.<date>.log

This log file contains information for any action that involves  the user interface. The log includes the User Interface red error message box, password fails when logging on ) and Oracle errors (ORA –#).

Enforce Server

Tomcat\ Localhost_access_log.<date>.txt

 

This log contains the record of all URLs requested. 

Enforce Server

VontuIncidentPersister.log

This log file contains minimal information –stdout and stderr only (fatal events).

Enforce Server

VontuManager.log

This log file contains minimal information –stdout and stderr only (fatal events).

Enforce Server

VontuMonitor.log

This log file contains minimal information –stdout and stderr only (fatal events).

All detection servers

VontuMonitorController.log

This log file contains minimal information –stdout and stderr only (fatal events).

Enforce Server

VontuNotifier.log

This log file pertains to the Notifier service and its

communications with the Enforce Server and the

MonitorController service. Look at this file to see if the

MonitorController service registered a policy change

Enforce Server

VontuUpdate.log

This log file is populated when Symantec Data Loss

Prevention is updated.

Enforce Server

WebPrevent_Access0.log

This access log file pertains to Web Prevent only. It records all the requests that Web Prevent processes. It is similar to Web access logs for a proxy server.

Web Prevent

detection servers

WebPrevent_Operational0.log

This operational log file pertains to Web Prevent only. It

reports the operating condition of Web Prevent such as

whether the system is up or down, connection management, and so on. This log is the primary log file for tracking Web Prevent operations.

Web Prevent

detection servers

 

 

 

 

Modifying IT Analytics Reports to Decrease Load Times

$
0
0

For IT Analytics reports hosted by SQL Server Reporting Services (which include out-of-the-box reports and dashbaords) some users may experience extended wait times before the report is able to render, and in some cases the report may even fail or timeout. This typically occurs in environments where there are extremely large data volumes and where reports are pre-configured to display all data by default (without filtering).

To minimize the time it takes for some IT Analytics reports to load, steps can be taken to configure settings so that data will be filtered by default, hence greatly improving performance. This article will describe such process, utilizing Microsoft Report Builder a client side application which comes with SQL Server Reporting Services.

 

Selecting the Report

  1. To load Report Builder, open Symantec Management Platform Console and navigate to: Settings > Notification Server > IT Analytics Settings > Reports > Report Builder. Then click on the Launch Report Builder button.

article31-1_0.png

  1. If prompted, click Run to start downloading the application.
  2. Be patient, launching application may take a minute or two, depending on connectivity. While the application is loading, you should see this message:

article31-2_0.png

  1. Click Open to select the report you want to optimize. Under the default configuration, all IT Analytics reports are stored within the ITAnalytics folder off the ReportServer root. 

article31-3_0.png

NOTE: For the purposes of this example, we will select the IT Analytics Configuration Events report. As such, the parameters you select in the next section of this article may be different.

 

Modifying the Report

  1. When report opens, expand Parameters in the Report Data pane on the left, then right-click the From parameter and select Parameter Properties.

article31-4_0.png

  1. Navigate to Default Values > Get values from a query. For both fields select MaxDate from drop-down list, then click OK.
article31-5_0.png
 
NOTE: Write down original values prior to making any modifications.
  1. Modify the properties for the Types parameter and navigate again to Default Values. Select Specify Values and Add new value. In the field type in 'Cube Processing' (without quotes) as shown below, then click OK. If you are modifying a different report, select an appropriate parameter and input a default value that matches a value for that parameter.
article31-6_0.png
  1. Modify the properties for the Targets parameter and navigate again to Default Values. Select Specify Values and Add new value. In the field type in 'Processing Trace' (without quotes) as shown below, then click OK. If you are modifying a different report, select an appropriate parameter and input a default value that matches a value for that parameter.
article31-7_0.png
  1. Click Save to apply all changes (saving may take couple seconds).
article31-8_0.png
 
 

Reloading the Report

  1. In the Symantec Management Console, navigate to Reports > IT Analytics > Reports > IT Analytics Events > ITA Configuration Events (or a the appropriate report you modified). Refresh the browser if necessary. You should notice the report load much faster than previously.
  2. Verify that the current day (in the From parameter) and the specific Type and Target are pre-selected with the values we input previously (or the appropriate values you entered if modifying a different report).

article31-9_0.png

  1. To adjust the parameter values, you can select different values as you normally would.

article31-10_0.png

 

Create a Boot Disk in Deployment Solution 7.5

$
0
0

Create a Deployment Solution 7.5 Boot Disk

Reviewing the Symantec Deployment Solution User guide for 7.5 listed here www.symantec.com/business/support/index?page=content&id=DOC5678 there isn’t clear instructions for using Boot Disk Creator, just that it exists.  I would assume this is because they feel a majority will be using PXE/Symantec Netboot Services.    For now, our organization still relies on boot disks as a CD or USB drive.  Depending on the systems you are deploying images to that you know how to create both.

Boot disk creator will run remotely, albeit slowly, if you have access to the location that it is installed.  If you do not have physical network access, ask your network admin to make the location a shared folder so that you can run it remotely. 

Why will you have to run it remotely?  Aside from access issues, in our case the NS is a virtual server and it’s not just a case of walking up to it in your data center and plugging in the USB drive and vsphere, is very limited on what it can access as far as clipboard and hardware on a tech's computer and connecting those to VMs.  If you do not need to create a USB disk, and prefer an ISO it will be in the best interest of time and resources to be logged in directly to the NS through RDP, or other remote access software, and running boot disk creator locally to the NS.

Before we get started there are a few things to think about:

  • The pre-boot environment used in DS 7.5 is WinPE 4.0.  This means that if you have drivers that Symantec didn’t preload for you, you will need to have them ready when we get to the part of adding drivers to the driver database.
  • If you require anything other than DHCP for your Automation environment, you will either need to know how to reconfigure this with cmd line (after it tries for a decade to configure DHCP in automation) or tinker around with it in Boot disk creator.

               

The install on the NS path for boot disk creator is

<Install Directory>\Program

Files\Altiris\Deployment\BDC\Bootwiz\bootwiz.exe

 

The NS, and I understand why even if I dont like it, is the only location for boot disk creator in 7.5.  In 7.1 it was available on any deployment server via the deployment share, however in the new environment the deployment share no longer exists on task & package servers. Well, sort of, you may find it here:

\\ Program Files\Altiris Agent\Agents\Deployment\SBS\Bootwiz\{guid}\cache\bootwiz

Changes made to Boot Disk Creator on Task Servers, or if you copy the bootwiz directory to your technician computer and run it there, do not affect the NS. 

 

OK, on with the show!  Open bootwiz.exe.  You may have to run it from an admin level command prompt. 

Boot Disk Creator Wizard starts…

wizard.PNG

If you haven’t run the creator yet, you will want to choose “Create a new…” Otherwise, go to the interface and edit a previous configuration.

With a New configuration Fill in the blanks, Select your OS and OEM extensions:

new1.PNG

At this point you wait for the driver database to be opened up.  If you haven’t already, disable any IPS software.  McAfee HIPS doesn’t like boot disk creator very much.  This is a problem if you are executing bootwiz from a remote system and will prevent you from going any further. The wait time for the driver database to open can take any unkown amount of time depending on whether you are accessing bootwiz remotely, or the resources available on the NS.

Once opened, this is where you can review what drivers will be loaded in your boot disk.

new2.PNG

 

If you have to add any, select Have Disk…  If you are building your images in vmware products you will need to add drivers for those here.  The drivers can be found on any system that has vmware tools installed.  You shouldn’t have a problem with any Intel E1000 NIC’s, but I did have to add a driver for VMXNET3 and PVSCSI (Para virtual SCSI) to my boot disk in order to capture images from machines I had built in VSPHERE.  Since my NS has vmware tools installed, I was able to grab the drivers lfrom the NS itself.  Make sure you add drivers that are compatible with Winpe 4.0  & match the architecture.  Vmware drivers can be found in these folders according to vmware's own documentation:

new3.PNG

Click next and you will have the option of selecting DHCP or Static for your boot disc.  For capturing one particular image I needed a static IP address and this will all depend on your enviroment.  Most will use DHCP.  Static selection presented some problems for me because the bat file generated for the static option didn’t work as well as i thought it would because the network device on my vm that I wanted to capture didn’t use the same name that is written in to the bat. Fortunately, you can modify this later.

new4.PNG

Click next and wait again. Add any optional components here…

new5.PNG

And lastly, review and finish!

 

As I mentioned, if you do decide to go static for your network adapter, you may have to modify it.  The default name that Symantec had written in didn’t match my VM and so I changed it here.  You can also just use DHCP, wait an hour for it to time out and then type the commands in manually yourself and then once configured properly rerun runagent.bat once in automation.

static_mod.PNG

Once you are ready to make your boot disk right click on the configuration you made and select “Create Boot Disk”

Select the values you prefer.  Some systems you will need an ISO, and some a USB, some it doesn’t matter.  I always run through twice and make both so that I have them.  Also, select the compatible processor and select next.

BD1.PNG

 

If you select USB, you will have to make sure it detects the right drive before you continue. 

BD_usb.PNG

From here it will start to compile

bd3.PNG

Once done either burn or mount and test!

Once you are confident in you are boot disk you created you can make more.You can use the ISO to burn more CD's, or you can can capture a GHO image file of your USB boot disk using ghost.exe and imaging more USB drives with that GHO image file.  Also, using ghost explorer you can then add files and folders to your GHO image as time goes on, just keep in mind the size of the USB drive you are using and to not go over it.

 


Preventing IT Analytics Reports from Running Automatically

$
0
0

By default, reports and dashboards in IT Analytics (hosted by SQL Server Reporting Services) will run automatically when selected. This behavior can sometimes be problematic for environments with excessive amounts of data, resulting in increased load times or timeouts for certain reports. One option to prevent this is to modify the value of a parameter within a report so that it does not execute automatically when clicked, a process which is documented in the article below.

To modify report parameters in more detail in order to load reports more efficiently, please see the article: Modifying IT Analytics Reports to Decrease Load Times.

  1. For the purposes of this example we will use the Asset Search report. Note that by default, the report runs with the Asset Type parameter value of 'All' pre-selected.

article32-1_0.png

  1. To change this report, open a browser on the server hosing SQL Reporting Services and goto: http://localhost/Reports.
  2. From within the IT Analytics folder, locate and hover over the Asset Search report (or the report you want to modify) and to the right you will see a menu of options. Select Manage.

article32-2_0.png

  1. Once in the report manage screen, select the Parameters section.

article32-3_0.png

  1. Once there, uncheck the 'Has Default' column from the parameter you want to force users to select or enter information on. This will ensure a user must select a value for that parameter before the report can be executed. In this example we will use the Asset Type parameter, then click Apply.

article32-4_0.png

  1. Return to the Symantec Management console to load the report and you should notice that it does not automatically execute the report, but instead prompts for a parameter value. Once a value is selected click View Report. Refresh the browser if necessary. 

List of Run Commands in Windows 7 and 8

$
0
0

In this article a complete list of Run Commands in Windows 7 and 8 . These commands allows to quickly access features and applications to customize operative system environment.

These run commands are available for almost all settings available in Windows control panel.

Note : most part of these commands are compatible with Windows 7, Vista e Windows XP.

FunzioniComandi
Open Documents Folderdocuments
Open Videos foldervideos
Open Downloads Folderdownloads
Open Favorites Folderfavorites
Open Recent Folderrecent
Open Recent Folderlogoff
Open Pictures Folderpictures
Windows Sideshowcontrol.exe /name Microsoft.WindowsSideshow
Windows CardSpacecontrol.exe /name Microsoft.cardspace
Windows Anytime UpgradeWindowsAnytimeUpgradeui
Taskbar and Start Menucontrol.exe /name Microsoft.TaskbarandStartMenu
Troubleshootingcontrol.exe /name Microsoft.Troubleshooting
User Accountscontrol.exe /name Microsoft.UserAccounts
Adding a new Devicedevicepairingwizard
Add Hardware Wizardhdwwiz
Advanced User Accountsnetplwiz
Advanced User Accountsazman.msc
Backup and Restoresdclt
Bluetooth File Transferfsquirt
Calculatorcalc
Certificatescertmgr.msc
Change Computer Performance Settingssystempropertiesperformance
Change Data Execution Prevention Settingssystempropertiesdataexecutionprevention
Change Data Execution Prevention Settingsprintui
Character Mapcharmap
ClearType Tunercttune
Color Managementcolorcpl
Command Promptcmd
Component Servicescomexp.msc
Component Servicesdcomcnfg
Computer Managementcompmgmt.msc
Computer Managementcompmgmtlauncher
Connessione proiettore di retenetproj
Connect to a Projectordisplayswitch
Control Panelcontrol
Create A Shared Folder Wizardshrpubw
Create a System Repair Discrecdisc
Credential Backup and Restore Wizardcredwiz
Data Execution Preventionsystempropertiesdataexecutionprevention
Date and Timetimedate.cpl
Default Locationlocationnotifications
Device Managerdevmgmt.msc
Device Managerhdwwiz.cpl
Device Pairing Wizarddevicepairingwizard
Diagnostics Troubleshooting Wizardmsdt
Digitizer Calibration Tooltabcal
DirectX Diagnostic Tooldxdiag
Disk Cleanupcleanmgr
Disk Defragmenterdfrgui
Disk Managementdiskmgmt.msc
Displaydpiscaling
Display Color Calibrationdccw
Display Switchdisplayswitch
DPAPI Key Migration Wizarddpapimig
Driver Verifier Managerverifier
Ease of Access Centerutilman
EFS Wizardrekeywiz
Event Viewereventvwr.msc
Fax Cover Page Editorfxscover
File Signature Verificationsigverif
Font Viewerfontview
Game Controllersjoy.cpl
Getting Startedgettingstarted
IExpress Wizardiexpress
Getting Startedirprops.cpl
Install or Uninstall Display Languageslusrmgr
Internet Exploreriexplore
Internet Optionsinetcpl.cpl
iSCSI Initiator Configuration Tooliscsicpl
Language Pack Installerlpksetup
Local Group Policy Editorgpedit.msc
Local Security Policysecpol.msc
Local Users and Groupslusrmgr.msc
Location Activitylocationnotifications
Magnifiermagnify
Malicious Software Removal Toolmrt
Manage Your File Encryption Certificatesrekeywiz
Math Input Panelmip
Microsoft Management Consolemmc
Microsoft Support Diagnostic Toolmsdt
Mousemain.cpl
NAP Client Configurationnapclcfg.msc
Narratornarrator
Network Connectionsncpa.cpl
New Scan Wizardwiaacmgr
Notepadnotepad
ODBC Data Source Administratorodbcad32
ODBC Driver Configurationodbcconf
On-Screen Keyboardosk
Paintmspaint
Pen and Touchtabletpc.cpl
People Near Mecollab.cpl
Performance Monitorperfmon.msc
Performance Optionssystempropertiesperformance
Phone and Modemtelephon.cpl
Phone Dialerdialer
Power Optionspowercfg.cpl
Presentation Settingspresentationsettings
Print Managementprintmanagement.msc
Printer Migrationprintbrmui
Printer User Interfaceprintui
Private Character Editoreudcedit
Problem Steps Recorderpsr
Programs and Featuresappwiz.cpl
Protected Content Migrationdpapimig
Region and Languageintl.cpl
Registry Editorregedit
Registry Editor 32regedt32
Remote Access Phonebookrasphone
Remote Desktop Connectionmstsc
Resource Monitorresmon
Resultant Set of Policyrsop.msc
SAM Lock Toolsyskey
Screen Resolutiondesk.cpl
Securing the Windows Account Databasesyskey
Servicesservices.msc
Set Program Access and Computer Defaultscomputerdefaults
Share Creation Wizardshrpubw
Shared Foldersfsmgmt.msc
Snipping Toolsnippingtool
Soundmmsys.cpl
Sound recordersoundrecorder
SQL Server Client Network Utilitycliconfg
Sticky Notesstikynot
Stored User Names and Passwordscredwiz
Sync Centermobsync
System Configurationmsconfig
System Configuration Editorsysedit
System Informationmsinfo32
System Propertiessysdm.cpl
System Properties (Advanced Tab)systempropertiesadvanced
System Properties (Computer Name Tab)systempropertiescomputername
System Properties (Hardware Tab)systempropertieshardware
System Properties (Remote Tab)systempropertiesremote
System Properties (System Protection Tab)systempropertiesprotection
System Restorerstrui
Task Managertaskmgr
Task Schedulertaskschd.msc
Trusted Platform Module (TPM) Managementtpm.msc
User Account Control Settingsuseraccountcontrolsettings
Utility Managerutilman
Version Reporter Appletwinver
Volume Mixersndvol
Windows Action Centerwscui.cpl
Windows Activation Clientslui
Windows Anytime Upgrade Resultswindowsanytimeupgraderesults
Windows CardSpaceinfocardcpl.cpl
Windows Disc Image Burning Toolisoburn
Windows DVD Makerdvdmaker
Windows Easy Transfermigwiz
Windows Explorerexplorer
Windows Fax and Scanwfs
Windows Featuresoptionalfeatures
Windows Firewallfirewall.cpl
Windows Firewall with Advanced Securitywf.msc
Windows Journaljournal
Windows Media Playerwmplayer
Windows Memory Diagnostic Schedulermdsched
Windows Mobility Centermblctr
Windows Picture Acquisition Wizardwiaacmgr
Windows PowerShellpowershell
Windows PowerShell ISEpowershell_ise
Windows Remote Assistancemsra
Windows Repair Discrecdisc
Windows Script Hostwscript
Windows Updatewuapp
Windows Update Standalone Installerwusa
Versione Windowswinver
WMI Managementwmimgmt.msc
WordPadwrite
XPS Viewerxpsrchvw

 

 

Symantec ApplicationHA providing application high availability and mobility in EMC Cloud-enabled infrastructure for SAP

$
0
0

Application and infrastructure availability is a key consideration in today's modern business continuity strategies for SAP cloud infrastructures stretched across distances. In traditional infrastructure designs for SAP high availability, workloads across physical data centers are disrupted when any of the infrastructure components fail at the same time. These traditional high availability designs are limited and usually require special combinations of software and hardware that are operating system specific, database specific, or both, making them complex, inflexible, costly, and difficult to implement and maintain. Often these designs require more effort to keep them running than actually providing the required protection and availability promised in the first place.

This white paper focuses on High Availability and Application Mobility add-on bundle of the on-premise Cloud-enabled Infrastructure for SAP. It explains the transformation of a single datacenter into a mission-critical business continuity solution with active/active datacenters. The solution is enabled by EMC®VPLEX® Metro, EMC Symmetrix® VMAX®, VMware vCloud Suite, and VMware vSphere Metro Storage Cluster (vMSC) with Symantec ApplicationHA, VMware vSphere HA and DRS.

Symantec ApplicationHA provides application monitoring and restart within virtual machines. For the scope of this paper, Symantec ApplicationHA simplifies and centralizes application administration and management through integration with VMware vSphere and guest applications.

 The main business challenges addressed by this solution include:

  • Protect against single points of failure
  • Minimize the impact caused by planned and unplanned downtimes
  • Reduce the infrastructure complexity and operational costs
  • Provide and end-to-end automated resilience model
  • Improve the utilization of resources across data centers

To download the entire White Paper, visit - https://community.emc.com/docs/DOC-29575

For more information on Symantec ApplicationHA, visit the product page.

 

Raccolta di ebook gratuiti

$
0
0

In questo articolo sono elencati numerosi libri in formato elettronico appartenenti a diverse tematiche nell'ambito IT, e che possono essere utili per le normali attività giornaliere da parte degli amministratori di sistema.

Sono presenti manuali IT, ebook ed altri utili documenti per system administrators e tecnici del settore IT. Con la speranza che questi titoli possano essere un valido aiuto per novizi ed esperti, che potranno trovare delle utili informazioni nei diversi ambiti delle tecnologie informatiche.

Nota: questo articolo viene costantemente tenuto aggiornato, inviatemi le Vs segnalazione nel caso vi siano altri interessanti titoli meritevoli di essere aggiunti.

 

Categoria

Titolo del documento e descrizione

Link

   
Group PolicyGroup Policy for Microsoft Office 2010
(Blog: Group Policy for Microsoft Office 2010)
Microsoft GP for Microsoft Office 2010
Group PolicyGroup Policy for Beginners , this white paper provides an overview of what you can do with Group PolicyGroup Policy for Beginners
Group PolicyGroup Policy Settings Reference Guide for Windows Vista, Windows 7, Windows 8, Windows Server 2003 SP2, Windows Server 2008 R2 and Windows Server 2012Group Policy Settings Reference for Windows and Windows Server
 
OfficeFirst Look Microsoft Office 2010PDF - XPS
OfficeOperations guide for Microsoft Office 2010 - For IT professionalsDOC - PDF - XPS
OfficePlanning guide for Microsoft Office 2010 - For IT professionalsDOC - PDF - XPS
OfficeDeployment guide for Microsoft Office 2010 - For IT professionalsDOC - PDF - XPS
OfficeTechnical reference for Microsoft Office 2010 - For IT professionals DOC - PDF - XPS
Office

Packaging guide for Office 2010. (Blog:Office 2010 Packaging Guide For the Training on 3/19/13)

Office 2010 Packaging Guide For the Training on 3/19/13
OfficeMicrosoft Office 365 for professionals and small businesses: Help and How ToPDF - MOBI - ePub
OfficeDeployment guide for Microsoft Office 2013
(Blog: Free eBook: Deployment guide for Microsoft Office 2013)
PDF - DOC - EPUB
OfficeGuide for IT Pros for Microsoft Office Web Apps - How to use Microsoft Office Web Apps on Microsoft SharePoint 2010 Products in an organization.Guide for IT Pros for Microsoft Office Web Apps
OfficeSecurity and Privacy for Microsoft Office UsersPDF - MOBI - ePub
OfficeOffice 365 Guides for professionals and small businessesDOCX
OfficeMicrosoft Office 365: Connect and Collaborate Virtually Anywhere, AnytimePDF - MOBI - ePub
 
Windows 7Windows 7 for BeginnersPDF - XPS
Windows 7Welcome to Windows 7PDF - XPS
Winodws 7What You Can Do Before You Call Tech Support (Windows 7) PDF - XPS
Windows 7Windows 7 Power Users Guide (Blog: Free Windows 7 Power Users Guide eBook)PDF
Windows 7Windows 7 troubleshooting tipsPDF - XPS
Windows 7Windows 7 keyboard shortcuts, more than 200 keyboard shortcuts containing almost all the keyboard shortcuts that are available in Windows 7 Windows 7 keyboard shortcuts
Windows 7Deploying Windows 7, Essential GuidanceDeploying Windows 7
Windows 8Introducing Windows 8.1 for IT Professionals
(Blog: Introducing Windows 8.1 for IT Professionals )
PDF
Windows 8

Introducing Windows 8 - An Overview for IT Professionals
(Blog: Free e-Book : Introducing Windows 8 - An Overview for IT Professionals)

PDF - MOBI - ePub
Windows 8Windows 8 Product Guide for BusinessWindows 8 Product Guide for Business
Windows 8Work Smart: Exploring Windows 8. This guide provides a high-level overview of the exciting new features in the Windows 8 user interface.Work Smart: Exploring Windows 8
Windows 8Work Smart: Windows 8 Shortcut Keys. This guide provides a quick reference to the shortcut keys in the Windows 8 Start screen.Work Smart: Windows 8 Shortcut Keys
Windows 8Work Smart: Backing Up Your Data and Settings. This guide provides information on how to set up and use the new File History feature in Windows 8 or the IntelliMirror Redirection Service to back up your data.Work Smart: Backing Up Your Data and Settings
Windows 8Work Smart: Protecting Data with Windows 8 BitLocker. This guide discusses how to use Microsoft BitLocker Drive Encryption technology to protect your computer’s data, and prevents others from accessing your disk drives without authorization.Work Smart: Protecting Data with Windows 8 BitLocker
Windows 8Work Smart: Connecting Remotely Using Windows 8 DirectAccess. This guide discusses how to connect remotely using Windows 8 DirectAccess, which enables you to seamlessly connect to the corporate network from any Internet-equipped remote location without having to establish a Virtual Private Network (VPN) connection.Work Smart: Connecting Remotely Using Windows 8 DirectAccess
WindowsWindows Command Reference  , the use of the command-line tools used to perform various tasks related to Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 7, and Windows VistaWindows Command Reference
WindowsIntroducing Microsoft SQL Server 2008 R2 PDF - XPS
WindowsIntroducing Windows Server 2012 R2 Technical OverviewPDF
WindowsIntroducing Windows Server 2012 R2 Preview ReleasePDF - MOBIePub
WindowsIntroducing Microsoft SQL Server 2012PDF - MOBI - ePub
WindowsIntroducing Windows Server 2012 (RTM Edition) PDF - MOBI - ePub
WindowsTCP/IP Fundamentals for Microsoft Windows, fundamentals of TCP/IP in Windows Vista, Windows Server 2008, Windows XP, and Windows Server 2003.TCP/IP Fundamentals for Microsoft Windows
WindowsA Guide to Claims-Based Identity and Access Control, Second EditionPDF
WindowsTCP/IP Tutorial and Technical OverviewPDF - ePub
WindowsIntroduction to Storage Area Networks and System NetworkingPDF - ePub
WindowsSystem Center 2012 , Virtual Machine Manager componentTechnical documentation
 
SecuritySecurity Concepts Book examines the typical problems in computer security and related areas, and attempt to extract from them principles for defending systems; attempt to synthesize various fields of knowledge, including computer security, network security, cryptology, and intelligencePDF
 
ProgrammingWindows PowerShell Quick Reference. Quick-reference guide to commonly-used Windows PowerShell commands.Windows PowerShell Quick Reference
ProgrammingWindows PowerShell 3.0 and Server Manager Quick Reference Guides. Quickly learn tips, shortcuts, and common operations in the new Windows Powershell 3.0, Windows PowerShell Workflow, Windows PowerShell ISE, Windows PowerShell Web Access, Server Manager for Windows Server 2012, WinRM, WMI, and WS-Man.Windows PowerShell 3.0 and Server Manager Quick Reference Guides
ProgrammingProgramming Windows Store Apps with HTML, CSS, and JavaScript, Second EditionPDF
ProgrammingProgramming Windows Phone 7PDF - MOBI - ePub
ProgrammingProgramming Windows 8 Apps with HTML, CSS, and JavaScriptPDF - MOBI - ePub
ProgrammingMoving to Microsoft Visual Studio 2010PDF - XPS

 

Integrating your Patch Trending Site to the Symantec Management Platform (Part I)

$
0
0

As we have seen in previous articles [1] or download [2] it is now very simple to add Patch Compliance trending to your Symantec Management Platform. 

However the solution provided operates outside of the Symantec Management Console. So we will look at how to integrate the Patch Trending site and graphs into the Management Console, to further simplify management and increase visibility over the patch compliance trends.

In Part I (this article) we'll integrate the full trending site into the Management Console.

In Part II we will integrate the charts into the console right click options, so anytime you right click on a bulletin you can access the current trending charts [3].

Part I: Integrating the Patch trending Site into the Management Console

Here is the starting point: the PatchTrending site is external to the Management Console. So to access it users must know or be given the url.

01_StartPoint.png

We will do this integration from the "All Settings > Notification Server > Console > Menus" editor.

02_Menus.png
 
Under "Home" we will add "New > New Item":
 
03_Menus.png
 
04_Menus.png
 
We will name the new menu entry "Patch Trending":
 
05_Menus.png
 
And set it to show the patch trending home pages ("/Altiris/NS/PatchTrending" by default):
 
06_Menus.png
 
Once we have saved the menus with our newly added item, we can access the new site under the "Home" menu entry:
 
07_Menus.png
 
We have now just integrated the Patch Trending Site into the Symantec Management Console:
 
08_Menus.png
 
Viewing all 1863 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>