How To Import Preboot Operating Systems Into Ghost Solution Suite 3 (Standard...
Ghost Solution Suite 3 requires a preboot operating system to perform imaging tasks. Our default preboot operating system is WinPE 5.1. This tutorial will show you how to import this into Ghost...
View ArticleSymantec Advancing Security Campaign Strategy and Styleguide
Advancing Security means taking a stand and doing security the right way. It means taking control of information and doing what it takes to keep it safe. Advancing Security means turning the tables on...
View ArticleGraphical Configuration of Patch Management 7.5 for Red Hat Linux
On the previous article:https://www-secure.symantec.com/connect/articles/graphical-configuration...we had configured the patch management for Windows. Now, we will show you how to configure patch...
View ArticleKeep your business on with HP Helion and Veritas Continuity
Features you want in a comprehensive serviceAsset RecoveryIn the previous blog we touched upon the manageability aspect of HP Helion and Veritas Continuity solution. As a continuation to the blog...
View ArticlePlanning and Implementing Ghost Solution Suite 3
The Ghost Solution Suite 3 is a best in class imaging suite aimed at small- to medium-sized organizations. The suite offers a variety of options for image capture and deploy operations, both for scale...
View ArticleRecovering BE with a non-default BEDB
By default, BE will install a SQL Express instance called BKUPEXEC, to hold the BEDB. The BEDB is the database which holds things like your default BE settings, jobs and job history. BE does not...
View ArticleHow to be Ahead of Outbreaks!
How to be ahead of Outbreaks!There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the...
View ArticleUsing Send Email Process Action to Satisfy SLA
IntroductionSymantec’s Servicedesk solution is a world class Service Process Automation tool, automating Incident, Change and Problem Management processes for its end users. This document addresses a...
View ArticleInventory Plug-in Upgrade Policy 7.6 HF4 Incorrectly Includes Mac, Linux and...
After upgrading to SMP & Inventory Solution 7.6 HF4, the Inventory Solution Plug-in Upgrade policy incorrectly indicates that Unix, Linux and Mac (ULM) computers need to upgrade the inventory...
View ArticleHow to Import a CSV List of Computers to the Unix, Linux and Mac Agent Push...
The Unix, Linux and Mac (ULM) agent install page in SMP console has a button to "Import computers from a selected file". This button is a blue arrow point to a white rectangle. Corresponding to this,...
View ArticleVeritas CFS Media Server Workloads: Best Practices
Veritas CFS Media Server WorkloadsSequential read I/O throughput testDate: 18th September 2015 Colin EldridgeShrinivas ChandukarWhat is the purpose of this document?This initial document is designed to...
View ArticleA closer look at shared memory and buffers
Data is sent from the client to a 'buffer'. From here it is sent to storage (tape of disk).Think of data as 'water' and the buffer as a 'bucket' (in fact multiple buckets). The data (water) fills up...
View ArticleWorkflow - Tips and Tricks
In this Article I'm going to share some Workflow Tips and Tricks,Go to the Workflow Task Tray"<Install Folder>:\Program Files\Symantec\Workflow\Tools\LogicBase.Local.TaskTray.exe"Down to the Task...
View ArticleHow to Restrict Content to Open in WorkFile Only
How to successfully restrict Symantec Work Mail to open attachments in Work File only.Environmental Requirements:Symantec Mobility Licensing: MAM or SuiteSymantec Work File Licensing: Basic (for iOS...
View ArticleCustom Application Inventory for Mac
Have you ever tried to locate MAC App data in the database? Have you tried to write a report to show just MAC Apps?Here is a very simple 10 minute way to setup a Custom MAC App Inventory.1. Create a...
View ArticleWindows Network Drivers -A WinPE, NDIS and OS Version Graphical Overview
IntroductionThe deployment of a Windows computer is a task that Enterprise Endpoint Management vendors like to think they've nailed. Over the years I've seen a few solutions, and the one prickly area...
View ArticleHow to Create an All-in-One “Production-style” Test Mobility Manager
The attached document illustrates step-by-step instructions for configuring an all-in-one production-style Mobility tenant. This article is intended to be used for testing purposes...
View ArticleHow to make NFS shares highly available using Atleast resource dependency?
What is ‘Atleast resource dependency’?Atleast resource dependency is useful where parent resource depends on multiple child resources but parent resource does not require all child resources to be...
View ArticlePosition Workflow Forms at Y-Top, X-Center
Original article is posted here.The two settings Workflow provides for the position of your forms is handled here:When the checkbox is selected, your form turns out like this:being both centered...
View ArticleWorkflow and SQL - Parameterizing Conditions
Original article is posted here.There has been far too many times that I’ve had to go back and recompile a SQL integration library, simply because I needed to compare a different column than the...
View Article