Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Software Delivery task to prevent users from shutting down client computers

There is often a need to imply a local computer policy change on all your client computers in your network. If you are a domain administrator, you can easily use the group policy to make whatever...

View Article


IT Management Suite (ITMS) 7.5 SP1 Documentation

ITMS 7.5 SP1 product documentation links are as follows:Suite-level documentsLocationIT Management Suite 7.5 SP1IT Management Suite Release NotesDOC7310What has changed in the release notes for IT...

View Article


IT Management Suite documentation

To access the full collections of IT Management Suite documentation for each release, use the URLs below:IT Management Suite...

View Article

Image may be NSFW.
Clik here to view.

SWS - Configuring SQL Server Using Windows authentication

Steps to Configure SWS with SQL Server on Windows Authentication Mode.On the SQL Database Server:1. Configure a SQL 2008 R2 (or any other SWS supported SQL version) Server with Windows authentication...

View Article

Workflow Documentation

 VersionDocumentsWorkflow 7.5 SP1Symantec™ Workflow 7.5 SP1 Release NotesSymantec™ Workflow 7.5 SP1 User GuideSymantec™ Workflow 7.5 SP1 Component Developer GuideFor more information about other IT...

View Article


Image may be NSFW.
Clik here to view.

ServiceDesk 7.5: How to make Select User field work with user's name on...

By default, the Select User field (or more precisely, Check if User Exists Using Email Address button next to it) on Submit Incident (Advanced) form only accepts user's primary e-mail, not user's name....

View Article

Image may be NSFW.
Clik here to view.

Discovery Accelerator - The Hidden searchable items

All the users that use Discovery Accelerator to search for items within a case know that we can search on emails from or to a user or group of users. We also know that we can search for a phrase or...

View Article

Image may be NSFW.
Clik here to view.

Recovering Ransomlocked Files Using Built-In Windows Tools

IntroductionThis is the second of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article


How to correct the DS 7.5 HF6 latest plugin version filters, so that they...

After installing DS 7.5 HF6, you will notice the following:"path\Altiris\Notification...

View Article


IT Analytics 7.1 FAQ and Resources

The purpose of this article is to address frequently asked questions related to IT Analytics 7.1 and provide several resources to learn more about the solution.Q:What is IT Analytics and why is it...

View Article

Backup Exec vs NetBackup (Comparison of Legends)

Hi Connect,It has been in discussion since long, which would be best for environment. Choice between legends  have been concern of corporates. Attached are comparison sheet for Backup exec and...

View Article

What Protection Does Symantec DLP Provide? A Note for Beginners

What Protection Does Symantec DLP Provide?In this article, I would try to provide some basics about DLP. This article is for beginner who wants to understand the following about DLP:Where does DLP...

View Article

How to view the SMP/Altiris agent diagnostics when the systray icon is hidden

Issue:I have often wanted to be able to view the agent diagnostics windows when the client tray icon is hidden.  And I always heard it wasn't possible.  So I searched and I didn't find anything.So I...

View Article


Understanding Compression in Backup Exec:

Understanding Compression in Backup Exec:An explanation of Hardware and Software compression used with Backup Exec How does compression work?It can be better explained with an example. Consider a text...

View Article

Using Barcode Labels - Why and How

Why?If you are using a tape library with a barcode reader, you should be using barcode labels.  Why use barcode labels for your tapes?  EFFICIENCY.  The tape library can identify a tape from its...

View Article


Single-Step Deployment of Veritas Storage Foundation High Availability 6.0.3...

This deployment guide explains how to install and configure Symantec Storage Foundation and High Availability products on Red Hat Enterprise Linux (RHEL) systems using the Yum package manager. Special...

View Article

Feature comparison between SEP 12.1 SBE and EE

Updated on 27th Dec'12Hi,This slide provides a summary of major features and compare the SEP  12.1 Small business Edition and SEP 12.1 Enterprise Edition. FeatureSmall business EditionEnterprise...

View Article


Image may be NSFW.
Clik here to view.

What Variables can be used within Response Rules

Whether you setup a response rule for email notification or send a notification to a syslog server, you can set up response action variables to pass incident specific data. The response action...

View Article

Image may be NSFW.
Clik here to view.

Migrating Notification Server from one Domain to Another

Executive Summary—Migrating a Notification Server to a New DomainThis document provides a basic outline of the steps necessary for Altiris customers to migrate Notification Servers from an existing...

View Article

Vision Symposium -Dubai - Breakout Sessions

Please click on the session title to access the presentation. Cyber Intelligence in a shifting online worldMobility: No longer “If” but “How”Vision and Strategy for the Agile Data CenterThe Evolving...

View Article
Browsing all 1863 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>