Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Report for Security Roles in NS

Twitter カードのスタイル:  summary For maintenance purpose you may like this report:You can easily create your new SQL Report with Role Name, Created/Modified Date and Description:Here is the query for...

View Article


Image may be NSFW.
Clik here to view.

TorLocker ransomware variant designed to target Japanese users

New file-encrypting ransomware variant is the first to specifically target Japanese users. Twitter カードのスタイル:  summary Ransomware is nothing new to Japan. Symantec’s research has found that Japan ranks...

View Article


Image may be NSFW.
Clik here to view.

日本のユーザーを狙って設計された TorLocker ランサムウェアの亜種

ファイルを暗号化するランサムウェアの新しい亜種は、日本のユーザーを標的としています。 Twitter カードのスタイル:  summary...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Vault Search (EVS) - Creating FIRST Custom Search Provisioning Group

(Upgrade Scenario only) If you have upgraded your EV environment from 10.0.x to 11.0 and if you want to run a pilot of Enterprise Vault Search for a limited number of users then you can do so by...

View Article

Image may be NSFW.
Clik here to view.

Enterprise Vault Search (EVS) – Upgrade EV Search

If you have upgraded Enterprise Vault environment from 10.0.x to 11.0 you will notice that the new search application is not accessible to the users and they are still directed to the legacy search...

View Article


Image may be NSFW.
Clik here to view.

DeployAnywhere is returning error: ".INF is failed in inf...

DA logs location and use on tech-notes below:http://www.symantec.com/docs/DOC7408http://www.symantec.com/docs/HOWTO95200 "DA logs are copied to production during the "Reboot To" production task...

View Article

Image may be NSFW.
Clik here to view.

Computers which aren't reporting inventory to NS - 'N' Days

Twitter カードのスタイル:  summary Very often user wants to know and see list of managed endpoints, which aren't reporting their basic inventory to NS Server - Last 'N' DaysAttached "Computers which are not...

View Article

Image may be NSFW.
Clik here to view.

Malicious links: Spammers change malware delivery tactics

Significant spike in malicious spam emails containing links, as attackers move away from attachments in their efforts to spread Downloader.Ponik and Downloader.Upatre. Twitter カードのスタイル:  summary...

View Article


Second Provider Joins the GOV.UK ‘Verify’ Public Beta

Twitter カードのスタイル:  summary Verify is the UK government’s authentication scheme that is being developed to confirm the identity of online public service users via the GOV.UK portal. Existing provider...

View Article


Image may be NSFW.
Clik here to view.

The Symantec and Clean C Partnership in South Africa

Symantec strives to create a positive impact both on a global and local scale through volunteering initiatives, grants, software donations, and by supporting employees in their personal volunteer and...

View Article

Backup Exec Youtube - ¡Anchamar crea dos videos nuevos!

Backup & Restore de Exchange 2013 Continuando con la colaboración de nuestro Canal de Symantec, en esta ocasión Anchamar - Tecnologías de la Información, a través de su Director Técnico Antonio...

View Article

Demand For Advanced Threat Protection Soars – And Symantec Responds

Targeted attack campaigns grew by 91% and data breaches increased by 62% during 2013, according to Symantec’s 2014 Internet Security Threat Report. All the indications are that enterprises everywhere...

View Article

Image may be NSFW.
Clik here to view.

Let’s Talk Diversity

Cecily Joseph Talks Diversity at Net Impact '14 It's time to move beyond diversity as a feel-good talking point and bring about actual results.The concept of diversity as a driver of innovation and...

View Article


Image may be NSFW.
Clik here to view.

Mobile spyware makers are on shaky ground as the law begins to catch up with...

Mobile spyware authors market their products as legitimate, but the software’s secretive nature give stalkers, thieves, and abusive partners the means to spy on their victims’ every move.Read More

View Article

Image may be NSFW.
Clik here to view.

DS 7.5 - HP Elite 8300 SFF and HP Elite 8200 SFF having issues booting into...

If you are experiencing problems booting into WinPE 4.0 it may be because you are missing some NIC or Storage driver.(For troubleshooting purposes also try to change the BIOS options from AHCI to...

View Article


Image may be NSFW.
Clik here to view.

Introducing AWS Storage Gateway VTL support for Backup Exec 2014

Twitter カードのスタイル:  summary We are excited to announce Amazon Web Service (AWS) Storage Gateway VTL support for Backup Exec 2014. The AWS Storage Gateway VTL enables Backup Exec 2014 customers to...

View Article

Image may be NSFW.
Clik here to view.

A Software Defined Alternative to All Flash Arrays

Read More

View Article


Reaffirming Symantec’s Commitment to Security and Privacy for the Online World

Twitter カードのスタイル:  summary As the largest security software company in the world, Symantec has earned the trust of consumers, businesses and governments alike to secure and manage their information...

View Article

Image may be NSFW.
Clik here to view.

Determining if you are compliant with your capacity license for FSA/SharePoint

Determining # of TB used for EV Archiving Per TB licensing Recently I have been asked by several customers how to determine the total number of TB's used in their capacity license.  SharePoint and...

View Article

Support Perspective: Downloader.Upatre

Support is seeing an influx of calls on a spam attack with a Downloader.Upatre threat.Because the threat is a downloader and the downloaded files have differing behaviors the following is general...

View Article
Browsing all 5094 articles
Browse latest View live