Activity Center is Missing the "Identification" Section for Some Computer...
In some cases, the Activity Center in the NS/SMP console does not show an "Identification" section for computer resources. The reason for this is that the Identification section is currently...
View ArticleIdentifying Unix, Linux and Mac computers affected by the Bash Shell Shock Bug
Symantec has created the following process to identify Unix, Linux and Mac (ULM) computers that are vulnerable to the Bash Shell Shock bug.DescriptionThe process uses a custom inventory script that can...
View ArticleDeduplication Simplified - Part 2 - Restore
In Part 1,https://www-secure.symantec.com/connect/articles/d...I have discussed what happened when you back up to a dedup folder/OST appliance. After our series of backups, the dedup store looks like...
View ArticleThe Three Fastest Ways to Upset Your Users
We all know that there are a lot of different ways that Enterprise Vault can be configured from both the server side processing of items, to the end-user experience on users’ desktops and laptops....
View ArticleCreating Scan template for Shellshock Vulnerbaility
Hello All,Lots of people are facing issue to scan their network for shellshock vulnerability with CCSVM. Follow the below steps and you are ready to scan for shellshock vulnerability:1. In the CCSVM...
View ArticleCome controllare la versione del software installato e cercare gli...
In ogni computer Windows sono normalmente installati numerosi programmi che nel corso del tempo richiedono un aggiornamento a seguito delle più recenti versioni rilasciate dai produttori. Installare...
View ArticleNovidades em Mobilidade - Apresentando Symante Mobility: Suite
Pessoal, Bom dia!Finalmente a Symantec atualizou a listagem de soluções para dispositivos móveis, lançando assim a Symantec Mobility Suite, que é uma suíte integrada com as soluções de MDM, MAM e...
View ArticleSneak Peek: Motivational Leadership Session - Oct 15th at 3.30 pm
We’re less than a week away from the Partner Engage event, and we’re glad you’ve joined us on this Private Partner Forum for event attendees. Here is a sneak peek at one of the guest speakers we’ll...
View ArticleHow to install Symantec Endpoint Protection 12.1.5 on supported Linux...
OverviewThe Symantec Endpoint Protection client for Linux provides Virus and Spyware protection and Auto-Protect features for supported Linux operating systems.It can be deployed using the Web link and...
View ArticlePartner Engage - Marketing Workshop
Presented by: Manny Kostas, Sr. Vice President & Chief Marketing OfficerMay Mitchell, Vice President of Americas MarketingAlix Hart, Vice President of Brand, Digital & AdvertisingTricia...
View ArticlePartner Engage - Information Management Solution Session (Part 1)
Presented by:Laura DuBois, Program Vice President of Storage, eDiscovery & Information Governance, IDCIM Solution Session (IDC)_PE 2014 preso.pdf
View ArticlePartner Engage - Information Management Solution Session (Part 2)
Presented by:Drew Meyer, Sr. Director of Global Product MarketingIM Solution Session (SYMC)_PE 2014 preso.pdf
View ArticlePartner Engage - Information Security Solution Session (Part 1)
Presented by:Jon Oltsik, Sr. Principal Analyst, ESGIS Solution Session (ESG)_PE 2014 preso.pdf
View ArticlePartner Engage - Information Security Session (Part 2)
Presented by:Stephen Trilling, Sr. Vice President of Product ManagementIS Solution Session (SYMC)_PE 2014 preso.pdf
View ArticlePartner Engage - North America Business Update
Presented by:Brett Shirk, Sr. Vice President of North America SalesN.America Business Update_PE 2014 preso.pdf
View ArticlePartner Engage - Symantec Strategy Overview & State of the Business
Presented by:Stephen Gillett, Chief Operating OfficerSymantec Strategy and State of the Biz_PE 2014 preso.pdf
View ArticlePartner Engage - Prosper! Positioned to Win Together
Presented by:The Channel Leadership Team Prosper! Positioned to Win Together_PE 2014 preso.pdf
View ArticleInventory Database Schema 7.5, Part 1 - Basic Inventory
Understanding the schema for Basic Inventory in 7.5 is very useful when creating reports. Since Basic Inventory contains generally valuable information, it is essential for creating custom reports that...
View ArticleInventory Database Schema 7.5, Part 2 - Hardware
In Part 2 the Hardware data classes are covered. Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema...
View Article