Software Delivery task to prevent users from shutting down client computers
There is often a need to imply a local computer policy change on all your client computers in your network. If you are a domain administrator, you can easily use the group policy to make whatever...
View ArticleIT Management Suite (ITMS) 7.5 SP1 Documentation
ITMS 7.5 SP1 product documentation links are as follows:Suite-level documentsLocationIT Management Suite 7.5 SP1IT Management Suite Release NotesDOC7310What has changed in the release notes for IT...
View ArticleIT Management Suite documentation
To access the full collections of IT Management Suite documentation for each release, use the URLs below:IT Management Suite...
View ArticleSWS - Configuring SQL Server Using Windows authentication
Steps to Configure SWS with SQL Server on Windows Authentication Mode.On the SQL Database Server:1. Configure a SQL 2008 R2 (or any other SWS supported SQL version) Server with Windows authentication...
View ArticleWorkflow Documentation
VersionDocumentsWorkflow 7.5 SP1Symantec™ Workflow 7.5 SP1 Release NotesSymantec™ Workflow 7.5 SP1 User GuideSymantec™ Workflow 7.5 SP1 Component Developer GuideFor more information about other IT...
View ArticleServiceDesk 7.5: How to make Select User field work with user's name on...
By default, the Select User field (or more precisely, Check if User Exists Using Email Address button next to it) on Submit Incident (Advanced) form only accepts user's primary e-mail, not user's name....
View ArticleDiscovery Accelerator - The Hidden searchable items
All the users that use Discovery Accelerator to search for items within a case know that we can search on emails from or to a user or group of users. We also know that we can search for a phrase or...
View ArticleRecovering Ransomlocked Files Using Built-In Windows Tools
IntroductionThis is the second of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleHow to correct the DS 7.5 HF6 latest plugin version filters, so that they...
After installing DS 7.5 HF6, you will notice the following:"path\Altiris\Notification...
View ArticleIT Analytics 7.1 FAQ and Resources
The purpose of this article is to address frequently asked questions related to IT Analytics 7.1 and provide several resources to learn more about the solution.Q:What is IT Analytics and why is it...
View ArticleBackup Exec vs NetBackup (Comparison of Legends)
Hi Connect,It has been in discussion since long, which would be best for environment. Choice between legends have been concern of corporates. Attached are comparison sheet for Backup exec and...
View ArticleWhat Protection Does Symantec DLP Provide? A Note for Beginners
What Protection Does Symantec DLP Provide?In this article, I would try to provide some basics about DLP. This article is for beginner who wants to understand the following about DLP:Where does DLP...
View ArticleHow to view the SMP/Altiris agent diagnostics when the systray icon is hidden
Issue:I have often wanted to be able to view the agent diagnostics windows when the client tray icon is hidden. And I always heard it wasn't possible. So I searched and I didn't find anything.So I...
View ArticleUnderstanding Compression in Backup Exec:
Understanding Compression in Backup Exec:An explanation of Hardware and Software compression used with Backup Exec How does compression work?It can be better explained with an example. Consider a text...
View ArticleUsing Barcode Labels - Why and How
Why?If you are using a tape library with a barcode reader, you should be using barcode labels. Why use barcode labels for your tapes? EFFICIENCY. The tape library can identify a tape from its...
View ArticleSingle-Step Deployment of Veritas Storage Foundation High Availability 6.0.3...
This deployment guide explains how to install and configure Symantec Storage Foundation and High Availability products on Red Hat Enterprise Linux (RHEL) systems using the Yum package manager. Special...
View ArticleFeature comparison between SEP 12.1 SBE and EE
Updated on 27th Dec'12Hi,This slide provides a summary of major features and compare the SEP 12.1 Small business Edition and SEP 12.1 Enterprise Edition. FeatureSmall business EditionEnterprise...
View ArticleWhat Variables can be used within Response Rules
Whether you setup a response rule for email notification or send a notification to a syslog server, you can set up response action variables to pass incident specific data. The response action...
View ArticleMigrating Notification Server from one Domain to Another
Executive Summary—Migrating a Notification Server to a New DomainThis document provides a basic outline of the steps necessary for Altiris customers to migrate Notification Servers from an existing...
View ArticleVision Symposium -Dubai - Breakout Sessions
Please click on the session title to access the presentation. Cyber Intelligence in a shifting online worldMobility: No longer “If” but “How”Vision and Strategy for the Agile Data CenterThe Evolving...
View Article