Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

How to send attachment in the Automation Policy e-mail?

In IT Management Suite 7.6, you can add an attachment to the Automation Policy e-mail. Note that no UI changes are introduced and it is just a way to define attachment in the existing UI.You can use...

View Article


VBScript to Wrap a Windows Firewall Dump through Netsh

When documenting our server installations, one of the time-consuming documentation line-items is the Windows Firewall. For our service development flexibility and speed, our Windows firewall management...

View Article


Image may be NSFW.
Clik here to view.

Deploy Internet Explorer 11 with Prerequisite Patches - SWD or Task

All, I have only recently been able to have the time and sit down to script this all out for my organization We have no issues (crossed fingers) with this script after deploying to over 20K endpoints...

View Article

Image may be NSFW.
Clik here to view.

New Features\Changes in DA in 11 SP1 release.

To Support IMAP and SMTP Feature, there were few changes made in Discovery accelerator and compliance accelerator for EV 11 SP1.  There is no major changes in the functionality as such .Below is the...

View Article

Quick sample: Using vbscript to post data to the SMP

I have used a very short vbscript for the last few month in order to get some data out of the SMP agent interfaces, or to ascert certain (misbehaving) features.Today it proved itself to be very handy...

View Article


How-To: Add PGP WDE Drivers to MDT & SCCM WinPE Boot Media

Symantec has a lot of great documentation for creating WinPE boot media with the PGP drivers baked in for one-off situations. Unfortunately those instructions don't speak to organizations with MDT...

View Article

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

The Challenge: Enabling Mobility While Protecting the EnterpriseWith the rise of mobile devices in the workplace, businesses face a conundrum. Eager to reap the benefits of mobility, yet justifiably...

View Article

Mobile Apps in the Workplace: Balancing Freedom with Protection

Apps are everywhere today, in life and in work. In 2013, there were 100 billion app downloads.  Finding and downloading apps is now the third most popular activity among mobile users, just behind...

View Article


Securing Mobile App Data - Comparing Containers and App Wrappers

The realities of BY OD create significant challenges when it comes to securing the corporate data residing on your users' mobile devices. Mobile users want to use the latest technology with easy access...

View Article


Embracing Android in the Enterprise

The challenges of being an enterprise pioneer in the “Wild West” The increasing significance of Android for the enterprise becomes more apparent every day. On the plus side, Android's open source...

View Article

optimization rate for shadow copy component backup

For shadow copy component backup with accelerator enabled, Maybe you would find that no matter whether to change data on disk volume, the shadow copy components backup job will send all data to...

View Article

NBU 7.6 Blueprint Security Feb 2015

The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints".These Blueprints are designed to show backup and recovery challenges around specific...

View Article

Image may be NSFW.
Clik here to view.

How to restore files with specific extension using NetBackup commandline tools.

Often customer does face the situation where Backup Operator does need to restore specific set of files and B&R GUI is not a sollution.Nowadays such situations does increase in volume due to...

View Article


How to make an I217 network adapter work with GSS 2.51 WinPE.

Making Ghost WinPE / Vista 32-bit to work with Intel i217-lm chipset. By Terry WaskowichFirst: This is not a Symantec supported solution.         Do Not call Symantec for support with this solution....

View Article

The Old and New; The Difficulties of Keeping Up To Date

IT investment into software and hardware inevitably fluctuates over time. This has been the case in recent years, with many organisations having to choose carefully what to invest money in, and what to...

View Article


Symantec Storage Foundation - Replicator Option - Aplicabilidades

Cada vez mais as empresas tem se preocupado em proteger seus dados em um outro ambiente fora do seu proprio Datacenter, seja com um backup remoto ou até mesmo um complexo ambiente de DR capaz de...

View Article

Using ADPlus Utility to Collect the Crash Dumps for ITMS (Altiris)

Whenever there are issues where Symantec Management Agent crashes, a user can follow the steps below to collect the crash dumps and further send it to Symantec Support for further analysis.ADPlus.vbs...

View Article


Image may be NSFW.
Clik here to view.

ITMS 7.6 | Agentless WMI Performance Metrics Pack

Description about custom agentless policyThis custom "Agentless Monitor pack" contains agentless "WMI" metrics which are monitoring agentless computers performance and Altiris Services performance as...

View Article

Image may be NSFW.
Clik here to view.

Compliance Sampling and Support for SMTP/Social content in Compliance...

 The article below describes the changes made in Compliance accelerator in version 11 SP1 to support new content types SMTP, IMAP and Social.To support sampling for the new content type the compliance...

View Article

Enterprise Vault SAN Storage to Hitachi HCP

(This is deliberately very high level, every configuration is different, but summarises the process.)DigestWe recently completed a move from SAN to Hitachi HCP HTTP/REST storage using the streamer...

View Article
Browsing all 1863 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>