Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Exporting run configurations in Pycharm

IntroductionPython is great for rapid development and we use a lot of it. We also use Pycharm as an IDE and its pretty neat for python development. However its not as evolved as eclipse so sometimes...

View Article


How we surplus assets

SummaryThis document details the steps that we follow for all surplus and Asset Recovery Services (ARS) activities for ITAM managed equipment.  Feel free to use this as a basic template, take what you...

View Article


How we define asset types and asset statuses

SummaryThis document details the Asset Types and Statuses that we have come to track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, take...

View Article

Image may be NSFW.
Clik here to view.

How we fill out and process a move form

SummaryThis document details the steps that we follow in order to complete, submit, and process a Move Form.  We complete a Move Forms when an asset:Moves locations.Re/Assigned to a new or different...

View Article

Image may be NSFW.
Clik here to view.

How we scan in received assets

SummaryThis document details the process we have developed, and use, to scan in the assets that we track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a...

View Article


Keep Your Business Running with High Availability and Disaster Recovery for...

This whitepaper is aimed at technical architects and IT decision-makers at customer companies as well as architects and consultants involved in the design and planning of technical solution...

View Article

How we schedule and receive assets

SummaryThis document details the process we have developed, and use, to schedule the delivery and receipt of assets that we track within our Symantec Management Platform for ITAM managed equipment....

View Article

Image may be NSFW.
Clik here to view.

DS 7.5 - Increase RAMDRIVE space to run the image deployment

RAM drive (also called RAM disk) is a block of RAM (primary storage or volatile memory) that a computer's software is treating as if the memory were a disk drive (secondary storage).In some instances...

View Article


Image may be NSFW.
Clik here to view.

DS 7.5 - Automation Tasks are in Queued or Pending state

Problem:Automation Tasks are in Queued or Pending state with "Waiting for the agent to get the task" message.Cause:The PectAgent (SMA in automation) does not get registered and tasks don't get...

View Article


List of Reports and Associated Queries within the Symantec Management...

IntroductionThis articles contains a lot of data relating to all things reporting within ITMS. This article is meant to help you browse through reports by Product, or search the article to find the...

View Article

List of Reports and Associated Queries within the Symantec Management...

IntroductionThis articles contains a lot of data relating to all things reporting within ITMS. This article is meant to help you browse through reports by Product, or search the article to find the...

View Article

Improving client job conditions allowing custom return codes (Windows OS Bit...

REQUIREMENTS Create a deployment job that first detects whether the targeted Windows machine is 32 or 64 bit then initiates the appropriate installer. OBSTACLES Unlike DS 6.9, there are no built in...

View Article

Symantec Backup Exec 2014 Blueprints - SharePoint

The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints".These Blueprints are designed to show backup and recovery challenges around specific...

View Article


Symantec Backup Exec 2014 Blueprints - SQL

The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints".These Blueprints are designed to show backup and recovery challenges around specific...

View Article

Image may be NSFW.
Clik here to view.

How to Configure Scan Exclusions in SEP for Linux

With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). However, some folder exclusions still have to be configured via the...

View Article


Software Inventory - File Details and Software Components

Software inventory consists of at least two types of details. They are: File details – provides basic file information, i.e., name, size, location, version, etc.Software component details – Allows for...

View Article

Image may be NSFW.
Clik here to view.

Steps to create WinPE4.0 through Boot Disk Creator (BDC) – Limited Support

What’ New in this release:The following table lists the new features that are added in this release:FeatureDescriptionBootWizBootWiz is enhanced to support the creation of WinPE4.0 package.Support for...

View Article


Image may be NSFW.
Clik here to view.

Report for Security Accounts in NS

Sometimes you may see that list of accounts created over time is getting long, and you may need to have ir reported, exported or printed.  I was missing such report, so I have created this simple...

View Article

Veritas Cluster Server I/O Fencing Architecture Guide

Executive SummaryI/O Fencing provides protection against data corruption and can guarantee data consistency in a clustered environment.  Data is the most valuable component in today’s enterprises....

View Article

Image may be NSFW.
Clik here to view.

Configuring Okta as SAML provider for Symantec Mobility Suite

What is Symantec Mobility Suite?Symantec Mobility Suite securely serves up apps to mobile devices and implements remote device management services. Symantec Mobility Suite manages apps and app...

View Article
Browsing all 1863 articles
Browse latest View live