Pre-install check list for Symantec Mail Security for Microsoft Exchange
If you want to install Symantec Mail Security for Microsoft Exchange, you need to do and check these before the installation:Make sure that the server, or servers, on which you plan to install the...
View ArticleSymantec Enterprise Vault Role Based Access Control
Merhaba , Bu yazımda Enterprise Information Archiving çözümlerinden Enterprise Vault için Role Based Access'i inceleyeceğim. Ürünün; Exchange Server Archiving , File System Archiving ,Sharepoint...
View ArticleDownload the new whitepaper for ApplicationHA 6.1 with Hyper-V
Microsoft Hyper-V becomes the latest platform to be added to the ApplicationHA support matrix. With the release of ApplicationHA 6.1 Microsoft Windows 2012 & 2012 R2 with the Hyper-V role enabled...
View ArticleSharing Information with a Larger Group via the KB in Servicedesk and Workflow
The knowledge base capabilities that Workflow adds to Servicedesk are reasonably extensive. In addition to a Bulletin Board Service, FAQ and WIKI capabilities, the functionality to add, approve, and...
View ArticleBackup Exec vs NetBackup (Comparison of Legends)
Hi Connect,It has been in discussion since long, which would be best for environment. Choice between legends have been concern of corporates. Attached are comparison sheet for Backup exec and...
View ArticleThe Most Detailed Way To Block UltraSurf
Here is the step by step process to disable Ultra Surf from being accessed by your clients. To start with, Ultra Surf leaves a finger print that shall be needed by the admin as a constant value. It is...
View ArticleTesting Your Enterprise Vault Environment
A lot of the time people might think that testing an environment, any environment, is something that the software company itself should be doing. This to some extent, is right. And to some extent it’s...
View ArticleSession 1701: Symantec Archiving Roadmap
Symantec archiving and eDiscovery products solve four key business concerns: eDiscovery, compliance and supervisory review, IT data center efficiency, and information retention and expiry. In this...
View ArticleCreating and Using a WinPE3.1 image with GSS 2.5.1
In this article, I am going to write down the steps that I took to create a WinPE 3.1 boot image that can be used to contact the GSS console. This is by no means required, and, in all honesty, doesn't...
View ArticleVxVM snapshot technology cheatsheet
VOLUME USED FOR THIS SETUP: =========================== dg datadg default default 3000 1202764944.85.bogota dm Disk_0 Disk_0 auto 8192 35797440 - dm Disk_1...
View ArticleShutdown Windows 7 with Message and Cancel Option for Logged on User
Shutdown computers with opt out message at a specific time.Budget concerns are bringing out the energy committees to help reduce power consumption these days. While windows has built in sleep and...
View ArticleGetting The Hang Of IOPS v1.3
In today's enterprise, application administrators are increasingly required to be IT generalists with knowledge spanning far beyond the application layer. Applications demand performance and when an...
View ArticleHow to Create an Exchange 2010 Backup Policy in NetBackup 7.x that crosses NB...
Exchange 2010 uses a database called a DAG. These instructions show how to setup a NetBackup Exchange policy for Exchange 2010 with a DAG that crosses a NetBackup Domain (meaning the servers...
View ArticleHow can tokens be deleted in DS 7.x?
The “Settings > Deployment > Tokens” page allows tokens to be created, but it unfortunately does not allow them to be deleted. How can this be achieved? The following process of running queries...
View ArticleNew ITMS Management Views capabilities
The IT Management Suite 7.5 SP1 release includes the updated ITMS Management Views (formerly known as Enhanced Console Views).This ITMS Management Views preview adds new capabilities for filters and...
View ArticleFinding the Time to Archive Mailboxes
With the every increasing need to provide 24x7 round the world access to computer systems, online and archived data, a question which is often asked is:When is the best time to do an archiving run...
View ArticleSymantec Help (SymHelp) - Quick and easy help with your installation,...
Brief Description about Symhelp:Symantec Help (SymHelp) is a diagnostic utility designed for Symantec Endpoint Protection used in identifying common issues and providing quick solutions to common...
View ArticleHow to block clients connection to the specific group
#Updated on 3rd June'14 Hello Everyone,Today we will see how we can block the clients connection to the specified group which they were assigned in the client installation package.We can set up client...
View ArticleTaking Some Radical Actions to Improve Inventory Quality on the Symantec CMDB
IntroductionResource Update Summary hashes historyManifesto against datahash verificationCreating a SQL Task to clean up the hashesConclusionReferencesIntroductionInventory quality is very important...
View ArticleTuning Backup Exec
At the recently concluded Vision 2014, I had the opportunity to attend a hands-on lab session, Optimising Backup Exec 2014. This lab highlights 4 tunable areas which can have an impact on the...
View Article