Quantcast
Channel: Symantec Connect - ブログエントリ
Viewing all 5094 articles
Browse latest View live

Where to find the ISO to create an SDR disk

0
0

 

-          Browse to www.backupexec.com on the right hand side of this page click on  Traialware as highlighted below

-          On the Trialware page choose Backup exec and then Download Now

-          Review and agree to the terms and conditions and you will be taken to a software download page

-          You may be prompted to enter/create your SymAccount login crendentials

-          At the bottom of the list on this page you will find the SDR ISO downloads “Backup Exec 2012 SP1 _ Simplified”

-          Choose the download that applies 32bit/64 bit


All Videos From Symantec for All Versions of Exchange Backup and Restore with Netbackup!

0
0

Its an excellent Tech Note by Symantec for All Avaialble Videos related to all Versions of Exchange Backups and Restore with Netbackup

I Want to share it because some new users and some new certified Netbackup would find it difficult to deploy Exchange server with netbackup and all documents and videos at one platform

 

VIDEO: NetBackup Support Screencast Demo - list of available videos

http://www.symantec.com/business/support/index?page=content&id=HOWTO41825

 

 

Links provided are to the technote for the video which contains the URL link to the video, as well as a full transcript of the video.
 
Exchange 2010
 
Exchange 2010 Backups
 
 
 
 
 
 
Exchange 2010 Restores
 
 
Exchange 2010 Other Topics
 
 
 
Exchange 2007
 
Exchange 2007 Backups
 
 
 
 
 
 
 
 
 
 
 
 
Exchange 2007 Restores
 
 
 
 
 
 
 
 
 
 
Exchange 2007 Other Topics
 
 
 
 
Exchange 2003
 
Exchange 2003 Backups
 
 
 
 
 
 
 
 
 
 
Exchange 2003 Restores
 
 
 
 
 
Exchange 2003 Other Topics
 
 
 
 
Non-Exchange Videos
 

Backup Exec 2014 BEMCLI Enhancements

0
0

Today's release of Backup Exec 2014 nearly doubles the size of BEMCLI from 222 to 395 cmdlets, with 72 of the original cmdlets enhanced with new parameters and functionality.

Here's a quick list of what's new:

- Native PowerShell v2 and v3+ support

- Full support (create/edit/rename/delete) for all backup job types (BackupDefinition, OneTimeBackupJob, and SyntheticBackupDefinition)

- All agent selection types supported for backup jobs (including virtual machines)

- Full support for mulit-server selections per backup job

- Support for centralized and managed server configuration

- Push-install of windows agents

- Support for all applications and server types

- Enhanced scheduling support

- Full support for notification recipients

 

 

Over the coming days and weeks, I'll be blogging about the new features in depth.  Stay tuned!

 

Symantec Data Insight 4.5 Documentation Available

0
0
Symantec Data Insight 4.5 product guides (PDF and HTML pages) are now available on the SORT documentation page.

Symantec Data Insight  4.5 product guides (PDF and HTML pages) are now available on the SORT documentation page.

The Symantec Data Insight  4.5 documentation set includes the following manuals:

  • Symantec Data Insight Release Notes
  • Symantec Data Insight Self-Service Portal Quick Reference Guide
  • Symantec Data Insight Installation Guide
  • Symantec Data Insight User's Guide
  • Symantec Data Insight Administrator's Guide
  • Third-Party Legal Notices

Stay Smart Online, Australia!

0
0

This week is Stay Smart Online Week in Australia, an Australian government initiative designed to help Australians understand the simple steps they can take to protect their personal and financial information online. Today, we hear from our Pacific Marketing team on ways Symantec is helping parents and kids deal with cyberbullying.

 

Here at Symantec, we strive to provide educational resources, online tools, and information to people all over the globe on topics such as online safety, cybercrime, and emerging threats. Some of the most frequent questions our experts are asked are around how parents and caregivers can keep children safe online. Recognising and dealing with cyberbullying is of particular concern to many people, children and their caregivers alike.

For example, according to Symantec’s Norton Family Report Edition – released this week - 32% of Australian kids have been harmed by cybercrime and/or a negative online situation during 2012-2013.

Additionally, 76% of children who reported being victims of cybercrime, or negative online activity, admitted to hiding what they do online from adults, including their parents and teachers.

In support of Stay Smart Online Week, we’ve developed a tip sheet for parents, and one for children, to address some of the most common concerns surrounding this key component of cybercrime - cyberbullying.

image-1_1.jpg        

What is cyberbullying?

Cyberbullying is carried out through an Internet service such as email, chat room, discussion group, online social networking, instant messaging, or web pages. It can also include bullying by SMS through mobile phones.

How can I minimise my child’s risk of being cyberbullied?

  1. Develop some ground rules, together with your children, around computer, mobile, and Internet usage.
  2. As part of the ground rules, you may want to monitor or limit the amount of time your children have access to the Internet or mobile phones.
  3. Don’t wait until your kids have reached high school before talking about cyberbullying. Initiate an open dialogue as soon as they begin going online, so they know they can come to you with any questions right from the start.
  4. Let your children know what to do if they witness cyberbullying. Make sure your children know they must not engage in cyberbullying, even if all they are asked to do is visit a site, open an email, pass along a cruel message, or add their comments to a mean social networking page. Give them the confidence to respond to a cyberbullying victim with kindness, support and friendship.
  5. Keep talking about it. An ongoing open dialogue with your children will help you spot potential warning signs, or help them through a difficult situation – whether they are a target or a witness.

What do I do if my child experiences cyberbullying?

  1. Tell your child not to respond. A response gives the bully or bullies the reaction they seek – silence will confuse them.
  2. Keep a copy of any bullying messages. You never know when a full record of events will be needed by a school official or law enforcement.
  3. If appropriate, report the cyberbullying to the website or provider, or to the principal, a teacher or counsellor at your child’s school.

 

Cyberbullying has the potential to impact a young person’s mental health. In Australia, Symantec partners with beyondblue, a nonprofit organisation working to increase awareness and understanding of anxiety and depression, to raise awareness of the harmful effects of cyberbullying.

For more information about Symantec’s commitment to protecting children and families online, visit the Your Information section of the Corporate Responsibility website. 

 

Pacific Marketing

El Antivirus no es Suficiente

0
0

Con colaboración de Mario Reyes, Gerente de Ingeniería para Symantec en México

Con el creciente uso de Internet y la gran cantidad de dispositivos que ahora pueden conectarse a la red, la cantidad de información que genera una empresa o un usuario es algo nunca antes visto. Internet ya no es como hace 10 años y el panorama de las amenazas ha cambiado considerablemente; los cibercriminales se han diversificado y ahora buscan nuevos objetivos. En este contexto tener solo un antivirus ya no es suficiente para detener los sofisticados ataques actuales y cualquier empresa, independientemente de su tamaño, debe considerar ir más allá con una protección integral que le permita proteger su información de las nuevas amenazas.

Si consideramos que los antivirus fueron creados para prevenir, detectar, remover o eliminar programas maliciosos y otras amenazas, en el escenario actual y por sí mismos, ya no son suficientes pues solo protegen contra el software maligno que ya sabemos que existe. En otras palabras, el antivirus es una tecnología reactiva, así que aunque hacen una gran labor para atrapar nuevas variantes de amenazas existentes, no pueden detener todo y pueden ser evadidos por un cibercriminal con amplios conocimientos informáticos.

Es por eso que, por ejemplo, los delincuentes cibernéticos que quieren atacar o robar información específicamente de un grupo, empresa o tipo de usuarios, revisan, hacen pruebas y reescriben su código malicioso (malware) hasta que están seguros que pueden eludir los antivirus.

El escenario de seguridad actual requiere una protección proactiva para reforzar al antivirus básico. Sin esa protección adicional, sería como si se defendieran con un solo brazo (antivirus), dejando al descubierto el resto de los frentes. Symantec ha observado este escenario y ha ido agregando tecnologías proactivas de protección que van más allá del antivirus básico desde ya hace unos cuantos años.

Symantec Endpoint Protection ya incluye múltiples capas de protección que lo ayudan a mantenerse protegido contra amenazas existentes, como así también analizar la reputación, características y comportamiento de archivos sospechosos para determinar si se trata de un código malicioso y frenar amenazas nuevas y desconocidas, gracias a su tecnología de SONAR y Symantec Insight.  De todas maneras, la clave para las organizaciones y clientes empresariales, es habilitar y aplicar todas las funciones de seguridad, no solo los antivirus, para así estar protegidos de las amenazas.  Todas estas tecnologías se encuentran en el producto estándar sin necesidad de adquirir funciones adicionales.

Además de la protección proactiva de SEP, recientemente anunciamos una nueva oferta de productos y servicios de protección de avanzada de amenazas cibernéticas (ATP son sus siglas en inglés), que expanden nuestras capacidades de protección a protección, detección y respuesta.  La primera edición de esta nueva oferta es nuestro Managed Security Services – Advanced Threat Protection, que asocia la información de amenazas de endpoints con información de productos de redes de seguridad líderes de Cisco Sourcefire, Check Point Software y Palo Alto Networks para detectar rápidamente los incidentes de seguridad más importantes.

Más adelante, Symantec lanzará una nueva solución ATP que asociará información de amenazas de Symantec Endpoint Protection con los productos de seguridad de correo electrónico y gateway de Symantec para ayudar a determinar qué incidentes de seguridad deben abordarse primero.  Con ambas soluciones, las organizaciones podrán lograr mejor protección y reducir sus gastos operativos de seguridad.

Hoy en día es importante que pensemos en la seguridad de nuestra información como si fuera la protección de nuestra casa. No basta con cerrar la puerta. Debemos complementar con una buena cerradura, alarma, monitoreo, cerrar ventanas y educar a los niños para que no abran la puerta a extraños, entre otras cosas. Todo con el fin de reducir los riesgos. Lo mismo sucede en el mundo corporativo, sin importar el sector al que uno pertenezca, pues todos tenemos algún dato o información que podría ser valioso para alguien más, incluida nuestra competencia. Así que busquemos proteger la información con la mejor y más completa tecnología. 

Recuerde, el antivirus no está muerto, sino que por sí solo, no es suficiente. 

AV Não É Suficiente Para as Organizações

0
0

Com o uso constante da internet e a infinidade de dispositivos disponíveis, existem uma enorme quantidade de informações que estão sendo geradas e compartilhadas online mais do que nunca. Como resultado, o foco dos cibercriminosos mudou e o antivírus já não é suficiente para proteger os usuários contra ataques sofisticados. A Symantec liderou a primeira era de segurança com antivírus, e continua a ser uma parte importante da nossa carteira, mas o cenário de segurança digital mudou muito desde então, e por isso deve-se implementar mais do que um antivírus para enfrentar os desafios das ameaças atuais.

Os software de antivírus (AV), usado para prevenir, detectar e remover ou desarmar os programas de computador maliciosos e ameaças de malware, não é mais proteção suficiente por si próprio, pois só protege contra o mau software que já conhecem. Essencialmente, antivírus é apenas uma tecnologia reativa. É importante saber sobre uma ameaça para escrever uma detecção. Desse modo, embora o AV faça um bom trabalho de captura de novas variantes de ameaças existentes, ele não pega tudo. Além disso, ele pode ficar sobrecarregado por um determinado atacante habilidoso. Por exemplo, ataques dirigidos que somente irá atacar um determinado grupo de empresas, pode com um simples teste, revisar e reescrever seu malware até que eles saibam que irão evitar a detecçãopelo AV.

O cenário de segurança de hoje requer proteção contra ataques de forma pró-ativa para complementar o AV básico. Usando apenas AV é como lutar com um braço amarrado nas costas. Para isso, a Symantec acrescentou tecnologias de proteção pró-ativas que vão além do antivírus há vários anos.

Symantec Endpoint Protection já inclui múltiplas camadas de proteção que ajudam a proteger contra as ameaças existentes, e também analisar a reputação, as características e o comportamento dos arquivos suspeitos para determinar se eles são malwares para interromper novas e desconhecidas ameaças. A chave para os clientes corporativos, no entanto, é ativar e implantar todos esses recursos de segurança, não apenas AV, a fim de serem protegidos contra os golpes virtuais. Todas essas tecnologias são incorporadas ao produto padrão, sem nada adicional necessário para comprar. Symantec Endpoint Protection é construído sobre esta protecção de multi-camadas, incluindo o Symantec SONAR, que oferece proteção contra novas e desconhecidas ameaças.

Além da proteção proativa do Symantec Endpoint Protection, recentemente foi anunciado um conjunto de Proteção Avançada (ATP) de produtos e serviços que ampliam a capacidade desde proteção, detecção e resposta. A primeira edição desta nova oferta é o Serviço Gerenciado de Segurança - Proteção avançada contra ameaças, que correlaciona informações sobre ameaças de endpoints com informações dos principais produtos de segurança de rede da Cisco Sourcefire e Palo Alto Networks, para identificar mais rapidamente os incidentes de segurança mais importantes. A Symantec também apresentou uma solução de proteção avançada contra ameaças, que correlaciona informações sobre ameaças do Symantec Endpoint Protection com produtos de segurança de e-mail e segurança de gateway da Symantec que ajuda também a determinar quais os incidentes de segurança para atacar primeiro. Ambas as soluções permitem que as organizações alcancem uma melhor proteção global e diminui a despesa operacional de segurança.

Apesar do AV não estar realmente morto, também ele não é o suficiente por si só. Antivirus é uma capacidade de linha de base necessária para qualquer produto de proteção, mas é apenas uma peça que está embutida no arsenal mais amplo de tecnologias avançadas de proteção para manter os usuários e as empresas e suas informações seguras. Olhando para o futuro, a Symantec está a continuar a construir mais serviços e soluções com ainda mais inovadoras tecnologias que podem ajudar a identificar as ameaças, priorizá-las e ajudar a detê-las para manter seus clientes protegidos.

Status update from the Symantec LUA product team

0
0

Happy new year to you all!

The Symantec LUA team released version 2.3.1 in Dec. Just a quick status update for you in relation to how things have been going since then.

We've seen over 200 successful customer installs/upgrades of LUA 2.3.1 so far and feedback has been very positive.

As a recap, 2.3.1 introduced the following enhancements:

  • The LUA web server service will now automatically restart if it crashes or terminates unexpectedly.
  • LUA will now automatically install and utilise an optimised private Java Runtime Environment (version 1.6 update 27). This also means it is no longer necessary to separately install a public JRE for use by LUA.
  • It is now possible for LUA to automatically run multiple specified distribution tasks after a download task completes.
  • New quick link added to the user interface which allows customers to quickly and easily capture all LUA-related troubleshooting information that Symantec Technical Support may require if answering a query or investigating a reported issue.
  • Other new quick links added to the user interface: How to configure a Remote Distribution Center, Product Selection Guide: Which SEP 12.1 sub components to select
  • Added ability for LUA to automatically send email notification on successful completion of a task (as well as failure of a task).
  • LUA will now automatically send an email notification when disk space is running low on the drive to which LUA is installed (the LUA database is at risk of becoming corrupted if disk space runs low).
  • Email notification appearance has been enhanced (now HTML based).
  • Security within the user interface has been enhanced to ensure protection from specific potential attack scenarios.
  • LUA will now periodically send anonymous product information to Symantec (can be disabled if required).
  • LUA now installs and utilises the latest available versions of Apache Tomcat (7.0.21) and PostgreSQL (9.0.4).
  • Resolved a specific compatibility issue so that LUA can now be used to effectively manage content for BackupExec.
  • 25 other third-party components upgraded.

It is worth also knowing that LUA 2.3.0 and previous releases utilize versions of PostgreSQL which have reached end of life.

Due to all the above reasons, we encourage LUA customers to upgrade to version 2.3.1 asap. The upgrade process itself typically takes less than 15 mins and is very straightforward.

Version 2.3.1 can be obtained by contacting Symantec Technical Support or if you drop me a direct message, I can also provide a link through which you can download it.

On behalf of the LUA team, I want to send along big thanks to all those customers that provided invaluable beta testing feedback as part of the 2.3.1 development process. The good news is the team has already started work on version 2.3.2 which we're targetting to release later this year. Thank you for all your support to date and I will update you all again as the Beta cycles for 2.3.2 get closer.

One last note, I have a dedicated Twitter account through which I'm providing LUA specific updates, if you wish to be kept up to date also via that method, you can follow me @symc_LUA.

Best Regards,

Graham

(LUA PM)

LUA 2.3.x release notes for reference: http://www.symantec.com/business/support/index?page=content&id=TECH155523
 


Is cyber crime a board room issue?

0
0

In a previous blog, I described a number of dilemmas around cybersecurity - notably how its presence as a board room topic sits uneasily with the IT department’s poor perception of security, which couples with an increasing realisation that cyber threats cannot be addressed with IT alone. Even as technology becomes intrinsic to business life in this, hyper-connected world, the bad guys are developing ever more targeted threats as we see in our recent Internet Security Threat Report (ISTR).

It’s not up to us security experts to rain on this parade or tell the businesses we advise they’re doing it all wrong - I doubt they would listen even if we did. Our enterprise customers tell us their businesses wouldn’t be where they were today without taking risks, be they financial, organisational or indeed, technological. Any business leader who has had to grow the organisation, or has entered a new territory, or bet the company on a new product line, sees cyber security as more of the same.

So, if we are not going to shout disaster like some curmudgeonly Greek Chorus, what should we do? Rather than adopting a preventative, risk-avoidance stance that involves telling people what they can’t do all the time, the answer is to start from a business perspective, and put security threats, their consequences and responses into that context.

For a start, the business will use the technology it sees as most useful, whether or not this introduces new threats - try taking away the CEO’s tablet computer, for example. Also, given that security can never be fully watertight, it becomes more important to understand threats in advance, and then to be responsive enough to deal with them effectively.

One area of particular interest is how generated information can become part of the solution. You’d have to have been locked in cold storage for the last couple of years to have missed the hype around big data, how the quantities of information generated and the amount of processing now available have created a vast resource to be mined. We have known for some time how valuable is the information we gather to power some of our products and to drive initiatives such as the ISTR, for example:

Symantec Insight™ - a cloud-based security technology which uses a file’s age, frequency, location, and anonymous telemetry data to identify new, mutating threats.

Symantec Online Network for Advanced Response (SONAR) - also cloud-based, this detects new threats based on behavioural monitoring and analysis. SONAR works closely with Insight™.

Symantec Disarm - a patent pending technology which takes file attachments such as Microsoft Office documents and PDF documents, and creates new versions with any harmful payloads removed.

Link and IP Following in Symantec Email Security.Cloud - this checks web sites linked by emails, and reports if any malicious software is present at the destination site, or if the destination has earned a negative reputation.

At the same time we are looking to provide similar intelligence to our customers, so they can target it at their own objectives and exploit it in their own way. So, for example, customers in a certain vertical, or of a particular size, can mine the same information that we have access to, creating specific feeds, alerts and policies – DeepSight Security Intelligence.

While our historical roots are as a products-and-services company, with a security portfolio targeted at preventing problems and resolving any issues, we are embracing an information-rich future in which being forewarned is fore-armed. This means working more closely with both customers and suppliers: just as we recognise no single technology will ever be able to solve all issues, so we are expanding both our business partnerships and technical integration points.

Cyber security may still have to break through the glass ceiling, to demonstrate its value and gain business ownership, but it is headed in the right direction. While the business may one day fully embrace its cyber responsibility, it is incumbent on us to provide the capabilities organisations need to manage their cyber risks alongside the business challenges they face.

NEW: Symantec Brightmail IQ Services

0
0

If you point your web browser to http://www.brightmail.com/IQServices you'll see our new online portal providing email security data to Brightmail administrators, email administrators and the general public.

The Global Intelligence Network is a core part of the Brightmail product family.  It feeds data to Symantec Brightmail Operations, providing the breadth and depth of the global mailflow knowledge which drives the fantastic antispam effectiveness. 

Symantec Brightmail IQ Services provides a window into the data we hold, informing users of the latest messaging trends, and allowing them to query their email sending reputation in real time.

Keep an eye on the trending volumes of spam, the most popular categories and spam content types as well as monitoring the global top mail senders and top spam senders. 

This is a really cool 1.0 release and really the first time we've opened up our Global Intelligence Network information to the general public.  Further developments are coming so let us know what other information you'd like to see there. 

 

 

//ian 

 

Adult Webcam Spam: All Roads Lead To Kik Messenger

OpenSSL Patches Critical Vulnerabilities Two Months After Heartbleed

#SymEdition Webcast: Symantec's Portfolio of Advanced Threat Protection Solutions

0
0

Symantec recently announced an entirely new approach to advanced threat protection (http://bit.ly/1mR5qsS) unveiling a roadmap of integrated solutions that demonstrates the security innovation power that only it can deliver to help customers solve their most complex problems.

In our upcoming analyst webcast, hear from Brian Dye, SVP Information Security Group, and Piero DePaoli, Sr Director Product Marketing, for a deeper look at Symantec's ATP strategy, product roadmap as well as our new offerings. Following a short video presentation, we will host a live Q&A session with both Brian and Piero.

When: Tuesday, June 17, 9:00am PT / 5:00pm UK Time

We hope that you will be able to join us for this informative webcast. Please contact Chhavi_Ahuja@symantec.com or Esther_Kim@symantec.com for more information.

Data Lifecycle Management in BE 2012

0
0

Let me start with some of my background first, since this is my very first blog. I have been with Symantec Backup Exec team more than 12 years.   In the past 12 years, I have been working on the development of both NetBackup and Backup Exec products. My area of focus has been on the development and design of the shared catalog components.   In the recent few years, I have been heavily involved in designing many different Backup Exec features.  In  2010, after more than 10 years of service, I was recognized as a Distinguished Engineer. This recognition was due to my overall contributions to the company.  During the development of BE 2012, I was leading the design and development of Data Lifecycle Management, Metadata Web Service and Simplified Restore Workflow features.  I was also heavily involved in the design and development of many other new features.

 

There are many new features that have been introduced in BE 2012.  It probably would be a good idea to blog about some of these new features.   Before I dive in some highlights of one of the new features-- “Data Lifecycle Management “ (DLM), let me start with some insights of why we created the DLM feature. Before Backup Exec 2012, Backup Exec had always managed the lifecycle of backup data using a tape centric method, no matter what the backup data type was. This included data that was backed up to .BKF container files (tape emulated disk container file) on disk or to tapes.  The media set was designed to manage removable media like tape.   This design has been working great with removable media like tape for years.   In recent few years, the disk storage has been adopted as the primary target storage for backup due to its enablement of advanced recovery capabilities (e.g. GRT), fast performance and continuous decreasing cost per Mega Bytes. 

 

There are two key issues of media centric management using media sets, especially for disk backup. When using disk based backup, the following issues apply:

1.     No guarantee of backup data integrity for recovery.   Lacking of knowledge of data dependency (incremental backup data would not be very useful if its previous incremental or full backup data is gone).  Therefore, users have to know how to configure two media sets with correct overwrite and append periods for their full and incremental backup jobs, to avoid the scenario that the media containing full backup data is overwritten before the media containing its associated incremental backup data.

2.     Lazy disk storage reclamation.  The disk storage used by expired backup data won’t be reclaimed in time.  It is because the lifecycle of backup data is managed by media, not by backup data itself. Therefore, The media won’t be overwritten until all backup sets on this media are expired.   The append period of media set is used to control this gap.  (e.g. if the overwrite period is 4 weeks and append period is 1 week, then the retention of this media is 5 weeks.)  With limited disk storage space, the expired backup data should be deleted immediately to free up disk space for new backup jobs.  This posts a real issue for customers today. Plus, you cannot simply add additional disk storage as easily as adding another tape.  Therefore, media centric management of backup data on disk storage is not a desirable solution anymore.   The data centric management design is the key concept of our new feature “Data Lifecycle Management” introduced in BE 2012.

 

 

Therefore we introduced DLM in BE 2012 to address these issues. Here are some highlights of the new feature “Data Lifecycle Management “ (DLM).  The new feature “DLM” is designed to manage all backup data stored on all types of disk storage except removable disk cartridge.  Here are some important points you should be aware of:

·      Data retention:

o   The retention of backup data is associated with backup set instead of media.

o   The retention of backup data is a property of job definition and configured using single retention value (e.g. 4 weeks).  It is not aproperty of media set using both overwrite period and append period.

o   Single backup set BKF:

§  A single BKF file can contain only one or partial backup set.

§  A backup set can be spanned over more than one BKF file.

·      DLM grooming process:

o   DLM process will proactively check for expired backup sets and groom those backup sets and associated backup data to free disk space occupied by expired backup data.

o   DLM process will be kicked off every 4 hours or whenever receiving low disk storage event.

o   The dependency of full and associated incremental backup sets will be checked to prevent broken chain of full/incremental backup sets.   In other words, DLM won’t groom expired full and incremental backup sets if there is a dependent incremental backup set that has not expired.

o   DLM won’t delete the last copy of the latest recovery point chain.

§  The definition of the recovery point chain:

·      Associated full and incremental backup sets that are generated from the same job for the same resource using the same selection list.  (e.g. \\Server\C:, \\Server\MSSQL\BEDB)

·      Delete operation from Backup set view:

o   Deleting a backup set from backup set view will delete the backup set and associated backup data from disk storage.

o   The dependency of full/incremental backup sets will be checked on deletion.   The depending incremental backup sets will be shown and prompted.  User will have the option to either cancel the delete operation or delete the selected backup set/associated backup data and all shown depending backup sets/associated backup data.

·      Retain operation from Backup set view:

o   User can manually retain a backup set and assign it with a reason code and description.

o   DLM grooming process won’t groom retained backup set/data and the backup sets/data it depends on.

o   Delete operation from backup set view is disabled for retained backup set/data.

 

There are other details related to DLM grooming process and design philosophy I can blog more if there are enough interests.  Hopefully, today’s blog is helpful.

 

Anker Tsaur

Distinguished Engineer

Backup Exec Team

Symantec Corporation

Celebrating World Environment Day 2014 – Symantec’s First Solar Powered, Self-Sustaining Facility Coming to Mountain View!

0
0

Today is World Environment Day (WED) - a day each year that the United Nations Environment Programme (UNEP) has marked to “stimulate worldwide awareness of environmental issues,” and to encourage everyone to take action to preserve our environment. The day is celebrated by countries, regions, cities, government, companies, and individuals across the world.

At Symantec, environmental stewardship is an integral part of Symantec’s business strategy, both in terms of managing impacts related to the company’s operations and the development of new products and services for our customers. In celebration of World Environment Day I am happy to bring you an update on one of our most recent and exciting projects at Symantec’s headquarters in Mountain View.

Symantec Mountain View’s Solar Project

At Symantec, the electricity we use to power our data center and labs, along with associated greenhouse gas (GHG) emissions continues to represent our largest environmental impact. We are addressing this issue by evaluating methodologies for our facilities to be run in the most efficient way possible. For example, in 2013 we joined BSR’s Future of Internet Power Initiative, a group of leading IT companies looking to identify and publicize best practices around low-carbon power sourcing for data centers in the United States, as well as helping Internet companies work more effectively with key policymakers and utilities.

Another way we accomplish this is by exploring innovative ways to increase our use of renewable energy. Recently, management at our Mountain View campus asked themselves – what more can we do in Mountain View to bring sustainability to the forefront in innovative ways? As we began this discussion, we had seen many of our Silicon Valley peers and neighbors benefitting from solar installations. When we started to examine this option more, we uncovered a great opportunity in Mountain View.

By leveraging our own property – in this case, our car garage - could we create a self-sustaining facility? The answer seemed to be yes, but there was still a lot of research to do.

So last April, we took a step back and asked ourselves – do the benefits of solar outweigh the costs? After deeply analyzing the benefits and tradeoffs (with the help of potential vendors), it became obvious that solar power generation would pay back in many ways including:

  • Reduces the cost of the annual energy bill by ~90%
  • Increases property value
  • Reduces carbon emissions
  • Increases brand value and customer trust
  • Takes advantage of federal, state, and local tax incentives
  • Locks in a fixed energy production rate for the next ~25+ years

So due to the hard work of our facilities team and our solar partner, we are now embarking on what will be Mountain View’s first solar installation. Soon, the building housing our cafeteria and fitness center will be completely run on solar power generated from panels installed on top of the parking garage.

It’s an impressive project that we are very excited about. In total, we’ll install nearly 1,500 solar panels on the garage roof.

Untitled.jpg

Symantec’s first solar installation: Nearly 1,500 solar panels installed on a parking garage in Mountain View will allow Building E (housing Symantec’s Cafe and Fitness Center) to be completely run on solar power.

Additionally, an interactive screen will be displayed in the Symantec Cafe where employees can see real-time updates on the solar project.

Untitled2.jpg.png

An interactive screen will be featured in the Mountain View cafeteria displaying – in real-time – power generation from the solar project.

What’s next for solar power at Symantec?

The use of solar power is increasing rapidly across the United States and globally. Last year, about a quarter of new power generation capacity in the US was from solar – second only to natural gas.

US President Barack Obama recently announced commitments by over 300 organizations to invest in energy efficiency and solar energy. Additionally, the White House made their own statement by recently installing solar panels on their rooftop, and advocating strongly for the advancement of the American solar industry. And an increase in the use of solar power – primarily from the utility sector – has cut the cost of solar energy systems by more than 50 percent. 

There are numerous benefits to solar power, all of which drove us to pursue this opportunity. It decreases pollution, it creates jobs, and it brings us closer to our goals for energy efficiency and GHG emissions reductions.

All of this, coupled with a widespread passion and awareness for preserving our planetary resources, is making it easier for businesses, governments and residents to rely on this clean energy resource. As with any project, this is a first step, but we recognize the vast opportunities and benefits that solar power brings and look forward to tracking the successful progress of our first solar installation. 

 

Karminder Raj Singh, Leader - Global Space Planning and Projects


ハートブリード脆弱性から 2 か月で公開された OpenSSL の重大な脆弱性修正パッチ

0
0

2 つの脆弱性はいずれも重大ですが、果たして Heartbleed 脆弱性ほど深刻なものでしょうか。

Manually Archiving Lots of Emails with Enterprise Vault

0
0

We’ve all done it from time to time, and we’ve all probably suffered the consequences - and we’re professionals!  We shy away afterwards and feel a little bit foolish. What is it I’m talking about?

Manually archiving lots and lots of emails with the Enterprise Vault Outlook Add-in.

I know in my time at Symantec I worked on a few issues where there were quite bad problems and poor user experience caused by trying to manually archive thousands of items in a folder at one time. I’ve even done it several times myself, without thinking.

But what about you? What about the users that you look after?

Do users do this? Do they have a poor experience? When I’ve tried it recently (in order to write this blog post) I tried highlighting a bunch of items in Outlook 2010 with the EV 11 Outlook Add-in (and EV 11 server) and timing how long it took to archive the item, whether all items were archived successfully, and what the general experience was like. Here are my results:
 

ItemsTime (seconds)Success?Comments
100 (Outlook Online)40YesItems are marked quite quickly, and control returns to Outlook after 5 seconds or so
100 (Outlook Online)45Yes 
50090YesItems are marked quite quickly still, and control returns to Outlook after 10-15 seconds or so
50085Yes 
1000240YesOutlook became responsive after 40-50 seconds
1000250Yes 
5000830YesTakes 25 seconds for the pop-up asking me to confirm archiving to appear. 3.5 minutes before Outlook became responsive
5000790Yes 

Now the individual time that the archiving took isn't that relevant. What is relevant is that it got very bad, and it was consistently that way.  As you can see it’s not a pretty sight. A long time ago (in a faraway place) I can remember suggesting a feature which limited the number of items that a user is allowed to archive. I thought I had already posted it to the forums, but couldn't find it..  So here is that idea on the Symantec Connect forums, from just now:

https://www-secure.symantec.com/connect/ideas/when-user-selects-many-items-archive-just-mark-them

https://www-secure.symantec.com/connect/ideas/limit-ability-manually-archive-x-items

So I ask again: Do you have users who do this? Should you try educating them? Or … you can vote up my ideas :)

Windows 8.1 How to Docs and Videos

0
0

I have collected some helpful links to help you learn how to use and manage Windows 8.1 OS.

 

How to guidesand training

Windows 8.1 Power User Guide for Business from MicrosoftThis 20 pages brochure-type guide is designed for end-users who want to learn more about the advanced features of Windows 8.1, such as Taskbar customization, Task Manager, Internet Explorer 11, Mobility Center, Windows To Go, Miracast, OneDrive for Business, and File Explorer. Power users will enjoy learning about how they can get the most out of their Windows 8.1 devices.  
Windows 8.1 Update Power User Guide for BusinessThis 20 pages brochure-type guide is designed for end-users who want to learn more about the advanced features of Windows 8.1, such as Taskbar customization, Task Manager, Internet Explorer 11, Mobility Center, Windows To Go, Miracast, OneDrive for Business, and File Explorer. Power users will enjoy learning about how they can get the most out of their Windows 8.1 devices.
Windows 8.1 Update Quick Guide for Business16 page brochure-type quick guide provides a basic introduction to key Windows 8.1 features and capabilities in business settings – how to get around, navigate, manage apps, work on desktop, and personalize Windows 8.1. It can be used as first introduction of Windows 8.1 to business users.
Windows 8.1 Update Quick Guide for Business_Raw files for printingThis package allows you to produce your own hard copies of the Windows 8.1 Update Quick Guide for Business and give it away as training assets to your users. This zip file includes the content in PDF and Adobe InDesign formats that you can use as-is or customize to match the requirements of your organization.
Windows Windows 8.1 Update Power User Guide for Business (Raw files for printing)This package allows you to produce your own hard copies of the Windows 8.1 Update Power User Guide for Business and give it away as training assets to your end-users. This zip file includes the content in PDF, and Adobe InDesign formats that you can use as-is or customize to match the requirements of your organization.

 

 

 

Videos
 
 
Windows 8.1 Update Guides and How-to videosA series of short videos designed for business users to learn about basic Windows 8.1 features and capabilities via guided, step-by-step instruction. These videos can be used as self-learning tools for users and facilitate Windows 8.1 adoption
Get around faster with the charmsNo matter where you are in Windows, the five charms – Search, Share, Start, Devices, and Settings – provide easy access to common tasks and are quick ways to get to actions you do often, like search the web and your PC, print documents, and email photos and links to your colleagues. The five charms are always available from the right side of your screen.

Your familiar desktop, only better

The desktop you are used to – with its familiar folders and icons – is still here, it’s actually better than before, with a new task manager and streamlined file management. And you can always get to your desktop—and back to your Start screen again—with a tap or click. Learn the desktop basics and how to boot directly to the desktop in this video.

Make Windows 8.1 all about you

Windows is all about you and the stuff you love. Resize and group tiles to keep people, sites, and apps in perfect order. Change your Start screen background to fit your personality, or coordinate with a company color scheme. No matter what your style is, your Start screen is a perfect reflection of you.

Quick link Menu and File Explorer

The desktop you are used to – with its familiar folders and icons – is still here, it’s actually better than before. In this video, let’s take a look at some of the advanced desktop features – Quick Link Menu and File Explorer – to help you efficiently accomplish your everyday tasks in a way that works best for you.

 

Taskbar, Multiple Monitors, Task Manager

The desktop you are used to – with its familiar folders and icons – is still here, it’s actually better than before. You can customize the taskbar on your desktop and work efficiently across multiple monitors. You also have access to a powerful Task Manager that helps you use your programs and apps effectively.

Using Internet Explorer 11

Experience a web browser that puts your focus where it should be—on the web, not your browser. Browser tabs and navigation controls appear only when you need them. The tabs bar shows sneak peeks of the web pages you already have open, and one-touch or one-click controls let you easily open a new tab, close tabs, or switch between tabs.

Exploring PC Settings

With Windows 8.1, you can easily access the most important settings from PC settings. In this video, we will cover the details such as PC and Devices, SkyDrive sync settings, Privacy, and Ease of Access. All of these options give you freedom to work the way you want to across devices.

 

How to personalize the Start Screen and make use of the start button

 

 

 

 

 

 

 

 

 

 

Webinar: The Medical Device Conundrum - Patient Safety vs. Cybersecurity

0
0
Thursday, June 19, 2014 | 2:00 PM ET/11:00 AM PT | Duration: 1 hour
Increasingly, medical devices are being networked to improve efficiency, enhance clinical value, and support patient safety initiatives. Yet, this increasing integration results in higher exposure to cyber threats like hacker attacks and malware, and increasingly creates dependency and reliance on the complex interaction of all components. 
 
It is, in a sense, a “system of systems” problem and hospitals’ BioMedical Engineering and IT Departments are challenged to protect this complex and critical part of their infrastructure against an exponentially growing and increasingly sophisticated threat landscape.
 
In this webinar, you will:
  • Develop an understanding of the underlying and complex medical device cybersecurity challenges we are facing
  • Learn how to minimize risks
  • Be introduced to available best practices and resources. 

Register for the webinar >>

IPV6 errors in Windows

0
0

We have discovered that Windows 2003 server and Windows 2008 R2 have a bug that if your network addresses reside in the public range, such as 162, it will automatically enable IPV6.  If you go to regedit and go to local machine -->system -->current control set -->services -->TCPIP6 -->Perameters and set the following:  DisabledComponents  (32 bit reg DWORD)  set to 1 or all f (fffffffffffffff).  This will disable IPV6.

Viewing all 5094 articles
Browse latest View live




Latest Images