Symantec and Red Hat: Resiient and Cost-efficient Virtualized Environments
Red Hat and Symantec together offer enterprise IT organizations a highly available and highly scalable virtualization infrastructure for traditional and cloud-enabled applications.Red Hat Enterprise...
View ArticleEnterprise Vault Search (EVS) – Server Side Settings
In Enterprise Vault 11.0 significant changes have been made to the search application (EVS). Apart from multiple browser support and a new UI there are few other features which are introduced at the...
View ArticleSymantec Backup Exec 2014 Blueprints - Small Environments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints".These Blueprints are designed to show backup and recovery challenges around specific...
View ArticleSymantec Backup Exec 2014 Blueprints - Remote Office Protection
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints".These Blueprints are designed to show backup and recovery challenges around specific...
View ArticleHow to cleanup excessive disk usage on SEPM and SEP client 12.1.xxx
A. Take a Backup of Database OR Follow the Disaster Recovery Steps for 12.1 http://www.symantec.com/docs/TECH160736 B. Symantec Endpoint Protection – How to cleanup excessive disk usage This document...
View ArticleOs novos caminhos da virtualização
A cada dia que passa, mais temos visto os antigos ambientes complexos e custosos serem resumidos a um grande sistema virtual. Ambientes antes limitados a hardware físico tem sofrido o boom da...
View ArticleHow To Create a JavaScript/CSS Progress Bar in Workflow
This article demonstrates a method for invoking custom JavaScript/HTML/CSS from within a 'Form Builder' component. The following Web Sites were used as inspiration for this article:Loading...
View ArticleA Simple Alternative to DeployAnywhere for Hardware Independent Imaging Drivers
IntroductionWe've been doing Hardware Independent Imaging (HII) since DS 6.5, long before DeployAnywhere came along. When were first determining the process, we looked at several driver management...
View ArticleMobile Application Management: Entendendo o Papel de um Contêiner
Introdução Atualmente os usuários querem usar tecnologias mais recentes para acessar os aplicativos e dados corporativos, e isso acaba criando a necessidade de permitir o uso de dispositivos pessoais...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 6
This article is the sixth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous five are below:How to utilize SEP 12.1 for Incident...
View ArticleSymantec backup not Backup in tape
Hi ,Symantec Backup Exec. 2012 is not backup in tape showing blank .. please feed back me with soluctionBackup Exec 2012.jpg
View ArticleCreating Stand-Alone Ghost Boot Disks With Deployment Solution 6.9 SP6
Most imaging options in Deployment Solution 6.9 SP6 require very little direct intervention with client machines, instead being managed remotely via PXE or Automation Folders. In some cases a...
View ArticleFSS e suas aplicabilidades
Com o lançamento da suite Symantec Storage Foundation 6.1 foi apresentada uma nova feature denominada FSS (Flexible Storage Sharing). Esta feature tem como objetivo uma quebra de paradigma. A...
View ArticleChrome does not show in AddRemProg
You could notice, that when you install Google Chrome, it may not show in ARP Inventory.Google Chrome Enterprise installs under Program Files and then is properly scanned by Software Inventory...
View ArticleFive Questions To Ask About Your Email Archiving Policy
There are many aspects of an Enterprise Vault Exchange-based Email Archiving Policy. Just a few years ago everything you could want to do was all in one policy, but it has been changed so that there is...
View ArticleGhostcasting with Altiris Deployment Solution 6.9 SP6
There are various things that can cause issues with image deployment in Deployment Solution 6.9, many of which may require lengthy troubleshooting. Sometimes, time is not a luxury an imaging...
View ArticleHow to use Unmanaged Tokens in Altiris 7.x script tasks
IntroductionScript Tasks in Altiris 7.x have 2 types of Tokens available. The more well know token type can be found in the 7.x Symantec Management Console under Settings > Deployment > Tokens....
View ArticleSymantec Messaging Gateway and TLS in a post-POODLE Internet
SSL has long been the foundation of secure Internet communications. At the tail end of 2014, several vulnerability postings battered and bruised the SSL protocol and a POODLE was a primary wagger of...
View ArticleSSE Reports for ITMS 7.x
SSE is a collection of reports commonly used by Backline support and Sustained Engineering. They are very useful for monitoring, administering and troubleshooting.An example can be seen at link below:...
View ArticleNetBackup 7.6 Blueprints - SharePoint
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints".These Blueprints are designed to show backup and recovery challenges around specific...
View Article