How to Sysprep a Windows Vista, 7, or 8 Image More Than Three Times
The easy way to get around the three time limit of sysprepping is to either a) use a virtual machine and save a snapshot before the first time you sysprep, or b) capture an image through the console of...
View ArticleSuccessful PST Migration
Three Steps to Successful PST MigrationsIn this article I will discuss three crucial steps to a successful PST Migration into Enterprise or for that matter into Exchange. If you approach a migration...
View ArticleWhat permissions I need to add to allow a security role to access the...
To add permissions that allow a security role to access the Symantec Management Agent Push Install page, you must do the following:In the Symantec Management Console, on the Settings menu, click...
View ArticleFour principles for cost-effective disaster recovery
When evaluating a solution for high availability and disaster recovery, one should start with a few basic criteria. Here are four.Principle #1: An HA/DR solution should be simple.In the middle of...
View ArticleGet the Enterprise-class Hadoop you want from the infrastructure you’ve...
How important is your data to you?If the results and guidance you get from Hadoop-based analysis provide a significant benefit to your bottom line, then it clearly is important. While data stored in...
View ArticleBE 2012 - Run Job At Certain Hourly Intervals Between Certain Hours Of The...
Scenario:I want to run my SQL log backup or increment backup job on the hour every x hour between 9 a.m. and 5 p.m. during the week-days. Solution:Earlier I have writtten an article on how to solve...
View ArticleIndexing remote SharePoint documents using WebDAV
With Symantec Data Loss Prevention version 11.x, you can index documents stored on a remote SharePoint server using WebDAV. WebDAV (Web-based Distributed Authoring and Versioning) is a standard that...
View ArticleJournal Mailbox folders with Enterprise Vault
Have you ever looked inside an Exchange journal mailbox after it's been targeted with Enterprise Vault? If you have never opened your Enterprise Vault journal mailbox with Outlook, then you should!...
View ArticleHow does BYOD affect your Enterprise Vault strategy?
In this article I'll describe some of what Bring Your Own Device (BYOD) is all about, and how it might affect your Enterprise Vault deployment and strategy for usage across your organisation. Some of...
View ArticleIDiag: LinPE Automation Diagnostic for Altiris Deployment Server
Deployment Server’s Linux automation is a light-weight and versatile imaging environment. Being less than a tenth of the size of the WinPE automation options, it is an attractive choice for those...
View ArticleNetwork services configurations on NetBackup BMR Boot Server
Network services configurations on NetBackup BMR Boot ServerFor Network boot based recovery, NetBackup Bare Metal Restore (BMR) leverages OS specific NW boot protocols to boot client over BMR Boot...
View ArticleNetbackup Catalog and Directories All Links
Following are the very special Links collected in one place ,regarding NETBACKUP Catalog and Netbackup Data Base Directory ,which is very necessary for Netbackup Users: About NetBackup catalogs on...
View ArticleUnderstanding Disk Staging
Staging Backup— This is a process in which first data is copied on a Storage Unit then copied to another Storage unit. Images expire after copying data to secondary unit.Benefits—1- This allows...
View ArticleLatest NB 7.5.0.4 AND NB 7.5.0.5 Software Alerts from Symantec
I suggest you to subscribe to these alertsNetbackup Latest Versions Software AlertsBest Practices:Symantec strongly recommends the following best practices: 1. Always perform a full DR backup prior to...
View ArticleAbout Windows Mobile in Symantec Mobile Security 7.2
The Story So Far...This is the third in an informal series of illustrated articles about how admins (and end users) can best protect their mobile endpoints using Symantec Mobile Security 7.2. (This is...
View Article"How to..." Series for Symantec Endpoint Protection - Part 1
Hello,Here are few popular "How to..." which would be assistance to the Symantec Endpoint Protection Users.Series 1 contains the following "How to..."1) HOW to Enable the Risk Tracer in Symantec...
View ArticleSCSP policy update after an agent upgrade
Symantec provides upgrades and enhancements for SCSP agents at the majority of major and minor releases. With these updates comes enhancements and changes to the default policies supported by that...
View ArticleSilent PST Migrations and Enterprise Vault
IntroductionIn many organisations IT decision makers and IT workers want to get users involved in the migration of PST data into Enterprise Vault. They feel that by involving the users the eventual...
View ArticleDownloading Current Latest Products from Symantec Fileconnect (Symantec...
Hello,Here are the steps on how to download Current Latest Products from Symantec Flexnetoperations (earlier Symantec Fileconnect).Before you begin, you need to get your Serial number with our Customer...
View ArticleHow to Setup SMP 7.1 Package Server
I've deployed some Package Servers on remote sites to boost my Altiris 7.1 deployment.This is some feedback from what I've found during the setup. 1. Notification Server (NS) versus Package Server...
View Article