Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

Pre-install check list for Symantec Mail Security for Microsoft Exchange

If you want to install Symantec Mail Security for Microsoft Exchange, you need to do and check these before the installation:Make sure that the server, or servers, on which you plan to install the...

View Article


Image may be NSFW.
Clik here to view.

Symantec Enterprise Vault Role Based Access Control

Merhaba , Bu yazımda Enterprise Information Archiving çözümlerinden Enterprise Vault için Role Based Access'i inceleyeceğim. Ürünün; Exchange Server Archiving , File System Archiving ,Sharepoint...

View Article


Download the new whitepaper for ApplicationHA 6.1 with Hyper-V

Microsoft Hyper-V becomes the latest platform to be added to the ApplicationHA support matrix. With the release of ApplicationHA 6.1 Microsoft Windows 2012 & 2012 R2 with the Hyper-V role enabled...

View Article

Image may be NSFW.
Clik here to view.

Sharing Information with a Larger Group via the KB in Servicedesk and Workflow

The knowledge base capabilities that Workflow adds to Servicedesk are reasonably extensive.  In addition to a Bulletin Board Service, FAQ and WIKI capabilities, the functionality to add, approve, and...

View Article

Backup Exec vs NetBackup (Comparison of Legends)

Hi Connect,It has been in discussion since long, which would be best for environment. Choice between legends  have been concern of corporates. Attached are comparison sheet for Backup exec and...

View Article


Image may be NSFW.
Clik here to view.

The Most Detailed Way To Block UltraSurf

Here is the step by step process to disable Ultra Surf from being accessed by your clients. To start with, Ultra Surf leaves a finger print that shall be needed by the admin as a constant value. It is...

View Article

Image may be NSFW.
Clik here to view.

Testing Your Enterprise Vault Environment

A lot of the time people might think that testing an environment, any environment, is something that the software company itself should be doing. This to some extent, is right. And to some extent it’s...

View Article

Session 1701: Symantec Archiving Roadmap

Symantec archiving and eDiscovery products solve four key business concerns: eDiscovery, compliance and supervisory review, IT data center efficiency, and information retention and expiry. In this...

View Article


Creating and Using a WinPE3.1 image with GSS 2.5.1

In this article, I am going to write down the steps that I took to create a WinPE 3.1 boot image that can be used to contact the GSS console.  This is by no means required, and, in all honesty, doesn't...

View Article


VxVM snapshot technology cheatsheet

VOLUME USED FOR THIS SETUP: =========================== dg datadg       default      default  3000     1202764944.85.bogota dm Disk_0       Disk_0       auto     8192     35797440 - dm Disk_1...

View Article

Image may be NSFW.
Clik here to view.

Shutdown Windows 7 with Message and Cancel Option for Logged on User

Shutdown computers with opt out message at a specific time.Budget concerns are bringing out the energy committees to help reduce power consumption these days.  While windows has built in sleep and...

View Article

Image may be NSFW.
Clik here to view.

Getting The Hang Of IOPS v1.3

In today's enterprise, application administrators are increasingly required to be IT generalists with knowledge spanning far beyond the application layer. Applications demand performance and when an...

View Article

Image may be NSFW.
Clik here to view.

How to Create an Exchange 2010 Backup Policy in NetBackup 7.x that crosses NB...

Exchange 2010 uses a database called a DAG.  These instructions show how to setup a NetBackup Exchange policy for Exchange 2010 with a DAG that crosses a NetBackup Domain (meaning the servers...

View Article


How can tokens be deleted in DS 7.x?

The “Settings > Deployment > Tokens” page allows tokens to be created, but it unfortunately does not allow them to be deleted.  How can this be achieved? The following process of running queries...

View Article

New ITMS Management Views capabilities

The IT Management Suite 7.5 SP1 release includes the updated ITMS Management Views (formerly known as Enhanced Console Views).This ITMS Management Views preview adds new capabilities for filters and...

View Article


Image may be NSFW.
Clik here to view.

Finding the Time to Archive Mailboxes

With the every increasing need to provide 24x7 round the world access to computer systems, online and archived data, a question which is often asked is:When is the best time to do an archiving run...

View Article

Symantec Help (SymHelp) - Quick and easy help with your installation,...

Brief Description about Symhelp:Symantec Help (SymHelp) is a diagnostic utility designed for Symantec Endpoint Protection used in identifying common issues and providing quick solutions to common...

View Article


Image may be NSFW.
Clik here to view.

How to block clients connection to the specific group

#Updated on 3rd June'14 Hello Everyone,Today we will see how we can block the clients connection to the specified group which they were assigned in the client installation package.We can set up client...

View Article

Image may be NSFW.
Clik here to view.

Taking Some Radical Actions to Improve Inventory Quality on the Symantec CMDB

IntroductionResource Update Summary hashes historyManifesto against datahash verificationCreating a SQL Task to clean up the hashesConclusionReferencesIntroductionInventory quality is very important...

View Article

Tuning Backup Exec

At the recently concluded Vision 2014, I had the opportunity to attend a hands-on lab session, Optimising Backup Exec 2014.  This lab highlights 4 tunable areas which can have an impact on the...

View Article
Browsing all 1863 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>