Coleta Customizada de Seriais de Software
Por muitas vezes em determinados projetos nos deparamos com a necessidade de customizar algo para atender um requisito exigido pelo cliente. Sabemos também da flexibilidade da plataforma Altiris, que...
View ArticleHow to add clients in the Opscenter
Hi All,We have recently got a request to add around 1500 servers into the Opscenter. We already have a report which is being generated from the Opscenter, I want to add these 1500 clients to that...
View ArticleSecurity 1:1 - Part 1 - Viruses and Worms
Welcome to the Security 1:1 series of articlesIn Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used...
View ArticleSecurity 1:1 - Part 2 - Trojans and other security threats
Welcome to the Security 1:1 - Part 2In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack...
View ArticleSecurity 1:1 - Part 3 - Various types of network attacks
Welcome to the Security 1:1 - Part 3In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user...
View ArticleConfigure,Install & Deploy Netbackup 7.1
Hi All, Wishes you all Happy & Prosperous New Year.I am working on NetbackupI was looking for the soft copy of "Configure,Install & Deploy Netbackup 7.1" .this book is provide when anyone...
View ArticleSecurity 1:1 - Part 5 - Online gaming fraud, scam and phishing attempts
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 SeriesOnline gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the...
View ArticleAbout Restoring a V2i image automatically from DVD
HelloI have a questionin the Old norton ghost to Restore a V2i image automatically from DVD We write :ghost.exe -clone,MODE=pload,SRC=%CDROM%\win.GHO:1,DST=1:1 –sure -rb  How this is done in SSR 2013I...
View ArticleHow to prevent unauthorized users from removing the Symantec DLP Agent from...
To prevent unauthorized users from removing the Symantec DLP Agent from an endpoint computer you just need to Add uninstallation passwords to agents.Uninstallation passwords prevent unauthorized users...
View ArticleCommands to check the Linux Version, Release name & Kernel version.
In order to install #SAVFL on your #Linux Machine you need to check your verify your OS details. Commands to check the Linux Version, Release name & Kernel version.uname -a (Print all Information)...
View ArticleDrives down with status code 84
Hi Friends our enviornment we took only NDMP Backups 1 week ago our quantum scalar i500 library got down, hadrware replacement took place but after that we are not able to perform backup and restore...
View ArticleThe Day After: Necessary Steps after a Virus Outbreak
IntroductionThis is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleHow to Install Microsoft Visio 2010 Through Altiris 7.1 sp2
The Attached documents contains step by step instruction for  steps are given belowHow to Install Microsoft Visio with Symantec Software Management Solution 7.1 SP2To install the Microsoft Visio first...
View ArticleHow to Change ProcessManager SQL Database Connection/Connection String for...
This step by step document explains how to changes the connection string if your SQL Server default instance or SQL Server Instance on which you ProcessManager databse is installed assigned custom port...
View ArticleHow to Create, Review, and Approve a Knowledge Base Article and Create...
Attached document contains step by step "How to Create, Review, and approve a Knowledge Base Article and Create Category and move article into category"Submit Knowledge base Entry1.      Click on...
View ArticleHow Symantec Data Loss Prevention for Mobile works & How to Implement
 Symantec Data Loss Prevention for Mobile connects to your corporate network through Wi-Fi access or through cellular 3G connectivity. Network traffic for Webmail, third-party applications such as...
View ArticleData Loss Prevention Install- Single Tier
This topic covers the installation of DLP Enforcer and Detection Server version 12.0 in grpahic representation for a Single Tier Architecture. Oracle is already installed on the server. The...
View ArticleConfigure DLP to Send Email Notification to Employee's Manager
Some customers want to know whether the DLP can send an Email notification to the manager if an employee trigger an incident. The answer is Yes.This is some kind of workflow in DLP that can help the...
View ArticleFirst Response to: Cryptolocker \ Ransomcrypt\ Encryptor
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 4
This article is a continuation of my three previous articles:How to utilize SEP 12.1 for Incident Response - PART 1How to utilize SEP 12.1 for Incident Response - PART 2How to utilize SEP 12.1 for...
View Article