Symantec eLibrary




Members of the Symantec eLibrary receive free access to hundreds of regularly updated on-demand web-based training modules covering the breadth and depth of Symantec's product portfolio. 15-75 minute module sessions cover "Install, Configure and Deploy," "Manage and Administer" and "Troubleshooting Techniques" in detail. The eLibrary is ideal for supplementing classroom training and/or providing training to employees who cannot travel or afford time away from the office.

Membership is free so register today

View the demo on how to register.
Already a Member?
Log in to view the training modules.


Note: You must have subscribed to the Symantec eLibrary to log in as a Member. If not, click the green Register button to the left to subscribe.

Need help?
See browser setting and troubleshooting tips.
Contact us for more help.

To view modules check your browser settings and disable all pop-up blockers.


Training Modules in eLibrary



New Content Added to the Symantec eLibrary October 2014
  • New Content:

    New Enterprise Vault 11 Modules!
    Sixty Four new “Enterprise Vault 11” modules added to the Enterprise Vault 11 category

    New NetBackup 7.6 Module!
    One new “NetBackup 7.6” module added to the NetBackup 7.6 category




How to Contact Support
  • How to Contact Support
    This module discusses how to obtain technical support from Symantec, what self-help resources are available, and what information to gather before calling support.



ApplicationHA
  • Symantec ApplicationHA 6.0 for VMware Differences
    This module explains the changes in ApplicationHA 6.0 with VMware. In this module, you learn how to understand availability layers and VMware HA integration, and to describe an overview of ApplicationHA 5.1 SP2, and ApplicationHA 6.0, as well as off the shelf application support. You also learn how to explain the integration of ApplicationHA with Veritas Operations Manager and Backup Exec.


  • Symantec ApplicationHA 6.0 for KVM, LDOM and LPAR
    This module describes the changes in ApplicationHA 6.0 for KVM, Oracle VM (LDOM), and LPAR. In this module, you learn how to understand availability layers and how this can be integrated with Veritas Cluster Server for increased application visibility and availability. You also learn how to understand application recovery with Veritas Cluster Server and Application HA, and how to recommend ApplicationHA deployment solutions with Veritas Cluster Server for KVM, LDOM and LPAR.


  • ApplicationHA 5.1- Overview
    In this module, you learn about the components of the VMware vSphere 4.1 datacenter environment. You also learn about how ApplicationHA integrates into the vSphere architecture.


  • ApplicationHA 5.1- Installing ApplicationHA
    In this module, you learn how to install ApplicationHA Console Server as well as guest components for both Linux and Windows virtual machines. You also learn how to install the VMware vSphere Client in order to validate the ApplicationHA installation.


  • ApplicationHA 5.1- Configuration and Administration
    In this module, you learn how to prepare applications and configure application monitoring using the ApplicationHA tab in the vSphere Client. You also learn about administering ApplicationHA.


  • ApplicationHA 5.1- Additional Symantec Solutions for Vmware
    In this module, you learn about storage, high availability, and disaster recovery solutions from Symantec that can be implemented in physical and virtual environments. You also learn about management tools to simplify datacenter management.


  • ApplicationHA 5.1- Architecture and Advanced Configuration
    In this module, you learn about the Veritas Cluster Server architecture on which ApplicationHA is based. You also learn how to use the VCS command-line interface to customize the ApplicationHA configuration, as well as how to troubleshoot problems.



Asset Management Suite 7.1
  • AMS 7.1 Administration: Course Introduction
    This module provides an overview of the lessons, course objectives, and intended audience for the Asset Management Suite 7.1 Administration course.


  • AMS 7.1 Administration: Product Overview (1 of 15)
    This module provides a high-level overview of the purpose and components of Asset Management Suite.


  • AMS 7.1 Administration: Installing Asset Management Suite (2 of 15)
    This module discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.


  • AMS 7.1 Administration: The Symantec Management Platform Resource Model (3 of 15)
    This module discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.


  • AMS 7.1 Administration: Migrating, Discovering and Importing Asset (4 of 15)
    This module discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7.1, and how to discover and import network assets.


  • AMS 7.1 Administration: Security and Organizational Views and Groups (5 of 15)
    This module provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.


  • AMS 7.1 Administration: Setting Up the Organizational Structure (6 of 15)
    This module discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.


  • AMS 7.1 Administration: Creating Assets (7 of 15)
    This module discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite.


  • AMS 7.1 Administration: Importing Assets with CMDB Solution and Data Connector (8 of 15)
    This module explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.


  • AMS 7.1 Administration: Maintaining Assets (9 of 15)
    This module discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.


  • AMS 7.1 Administration: Working with Contracts (10 of 15)
    This module discusses how to create and manage contract resources in Asset Management Suite and how to run preconfigured contract reports.


  • AMS 7.1 Administration: Working with Software Licensing (11 of 15)
    This module discusses the software license compliance model used in Asset Management Suite, how to set up software license management, and how to run preconfigured software licensing reports.


  • AMS 7.1 Administration: Working with Procurement (12 of 15)
    This module discusses how to set up and manage the procurement process in Asset Management Suite and how to run preconfigured procurement reports.


  • AMS 7.1 Administration: Working with Barcode Solution (13 of 15)
    This module discusses how to set up and use barcode functionality in Asset Management Suite to receive and create new assets, and to track and manage inventory.


  • AMS 7.1 Administration: Reporting Asset Management Information Using IT Analytics (14 of 15)
    This module discusses how to configure and use IT Analytics to review Key Performance Indicator, dashboard, detailed, and cube reports.


  • AMS 7.1 Administration: Working with the Asset Management Workflows (15 of 15)
    This module discusses the optional asset management workflows that can be deployed in an organization to enable users to perform some common asset management functions.



Asset Management Suite 7.0
  • AMS 7.0 — Course Introduction
    This lesson provides an overview of the lessons, course objectives, and intended audience for the Asset Management Suite 7 Administration course.


  • AMS 7.0 — Lesson 1: Product Overview
    This lesson provides a high-level overview of the purpose and components of Asset Management Suite.


  • AMS 7.0 — Lesson 2: Installing Asset Management Suite 7
    This lesson discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.


  • AMS 7.0 — Lesson 3: The Symantec Management Platform Resource Model
    This lesson discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.


  • AMS 7.0 — Lesson 4: Migrating, Discovering and Importing Asset
    This lesson discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7, and how to discover and import network assets.


  • AMS 7.0 — Lesson 5: Security and Organizational Views and Groups
    This lesson provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.


  • AMS 7.0 — Lesson 6: Setting Up the Organizational Structure
    This lesson discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.


  • AMS 7.0 — Lesson 7: Creating Assets
    This lesson discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite 7.


  • AMS 7.0 — Lesson 8: Importing Assets with CMDB Solution and Data Connector
    This lesson explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean-up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.


  • AMS 7.0 — Lesson 9: Maintaining Assets
    This lesson discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.


  • AMS 7.0 — Lesson 10: Working with Contracts
    This lesson discusses how to create and manage contract resources in Asset Management Suite 7 and how to run preconfigured contract reports.


  • AMS 7.0 — Lesson 11: Working with Software Licensing
    This lesson discusses the software license compliance model used in Asset Management Suite 7, how to set up software license management, and how to run preconfigured software licensing reports.


  • AMS 7.0 — Lesson 12: Working with Procurement
    This lesson discusses how to set up and manage the procurement process in Asset Management Suite 7 and how to run preconfigured procurement reports.


  • AMS 7.0 — Lesson 13: Working with Barcode Solution
    This lesson discusses how to set up and use barcode functionality in Asset Management Suite 7 to receive and create new assets, and to track and manage inventory.


  • Service and Asset Management and CMDB 6.5
    The Service and Asset Management Suite and CMDB online course covers how to properly setup and manage your asset environment. If you are tasked with entering asset information, importing data from active directory or other locations, tracking purchased or leased hardware and associating your assets with users and locations, this course will demonstrate the proper way to accomplish your goals. Other topics include managing software purchases and lease agreements to insure you are compliant.



Asset Management Suite 7.5
  • Asset Management Suite 7.5: Administration- Course Introduction (1 of 15)
    This module provides an overview of the lessons, course objectives, and intended audience for the Symantec Asset Management Suite 7.5: Administration course.


  • AMS 7.5: Product Overview (2 of 15)
    This module provides a high-level overview of the purpose and components of Asset Management Suite.


  • AMS 7.5: Installing AMS (3 of 15)
    This module discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.


  • AMS 7.5: The Symantec Management Platform Resource Model (4 of 15)
    This module discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.


  • AMS 7.5: Migrating, Discovering and Importing Asset (5 of 15)
    This module discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7.5, and how to discover and import network assets.


  • AMS 7.5: Security and Organizational Views and Groups (6 of 15)
    This module provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.


  • AMS 7.5: Setting Up the Organizational Structure (7 of 15)
    This module discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.


  • AMS 7.5: Creating Assets (8 of 15)
    This module discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite.


  • AMS 7.5: Importing Assets with CMDB Solution and Data Connector (9 of 15)
    This module explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.


  • AMS 7.5: Maintaining Assets (10 of 15)
    This module discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.


  • AMS 7.5: Working with Contracts (11 of 15)
    This module discusses how to create and manage contract resources in Asset Management Suite and how to run preconfigured contract reports.


  • AMS 7.5: Working with Software Licensing (12 of 15)
    This module discusses the software license compliance model used in Asset Management Suite, how to set up software license management, and how to run preconfigured software licensing reports.


  • AMS 7.5: Working with Procurement (13 of 15)
    This module discusses how to set up and manage the procurement process in Asset Management Suite and how to run preconfigured procurement reports.


  • AMS 7.5: Working with Barcode Solution (14 of 15)
    This module discusses how to set up and use barcode functionality in Asset Management Suite to receive and create new assets, and to track and manage inventory.


  • AMS 7.5: Reporting Asset Management Information Using IT Analytics (15 of 15)
    This module discusses how to configure and use IT Analytics to review Key Performance Indicator, dashboard, detailed, and cube reports.



Backup Exec 2012
  • BE2010-R3-SP3 and BE2012-SP2 Differences: What’s New in Backup Exec 2010 R3 SP3 and Backup Exec 2012 SP2 (1 of 9)
    This module give a product overview and discusses support for various platforms.


  • BE2010-R3-SP3 and BE2012-SP2 Differences: Installing Backup Exec 2010 R3 SP3 and Backup Exec 2012 SP2 (2 of 9)
    This module discusses prerequisites, requirements and installation procedure.


  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft Windows Server 2012 features - Part 1 (3 of 9)
    Module discusses support for Windows Data Deduplication Volumes, Resilient File System and VSS Writer.


  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft Windows Server 2012 features – Part 2 (4 of 9)
    Module continues discussing support for Windows Recovery Partition, other supported features and unsupported features.


  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft Windows 2012 Hyper-V (5 of 9)
    Discusses VHDX, Hyper-V VMs, Cluster Shared Volumes, incremental backups, backup and restore, and unsupported features.


  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for VMware vSphere 5.1 (6 of 9)
    This module concentrates on support for VMWare 5.1, VMs running MS Windows 2012, and VM backup and restore.


  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft Exchange (7 of 9)
    Module describes support, backup, and restore for MS Exchange 2013, and 2010-SP3.


  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft SharePoint 2013 (8 of 9)
    This module discusses Backup Exec 2012 support for MS SharePoint 2013.


  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft SQL Server (9 of 9)
    This module discusses support for Microsoft SQL Server.


  • BE 2012 Admin: Install & Config: Course Introduction (1 of 33)
    In this module, you learn about the course in brief.


  • BE 2012 Admin: Install & Config: Backup Exec Fundamentals (2 of 33)
    In this module, you learn about data backup and Symantec’s backup solution. You also learn about the key benefits, functionality, and architecture of Backup Exec 2012.


  • BE 2012 Admin: Install & Config: Installing BE 2012 (3 of 33)
    In this module, you learn how to install a Backup Exec server and use the Backup Exec Administration Console. You also learn how to update and upgrade to Backup Exec 2012.


  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo A (4 of 33)
    In this demonstration, you learn how to perform a custom installation of Backup Exec 2012.


  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo B (5 of 33)
    In this demonstration, you learn how to start Backup Exec 2012, view, and understand the information displayed in the various Widgets of the Home tab.


  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo C (6 of 33)
    In this demonstration, you learn to view, work with, and interpret the information and elements in the Backup and Restore tab, Storage tab and Reports tab of the Backup Exec 2012 console.


  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo D (7 of 33)
    In this demonstration, you learn how to create a configured view in Backup Exec 2012.


  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo E (8 of 33)
    In this demonstration, you learn how to create and configure a new Backup Exec logon account.


  • BE 2012 Admin OD ILT: Install and Config: Storage Devices (9 of 33)
    In this module, you learn about the types of devices you can use with Backup Exec. You also learn how to configure devices from within the Backup Exec Administration Console. Finally, you learn how to establish device pools to be used by Backup Exec.


  • BE 2012 Admin: Install & Config: Storage Devices - Demo A (10 of 33)
    In this demonstration, you learn how to install Backup Exec tape drivers.


  • BE 2012 Admin: Install & Config: Storage Devices - Demo B (11 of 33)
    In this demonstration, you learn how to create a disk storage device using the Configuration Wizard.


  • BE 2012 Admin: Install & Config: Storage Devices - Demo C (12 of 33)
    In this demonstration, you learn how to view and interpret disk storage device properties.


  • BE 2012 Admin: Install & Config: Storage Devices - Demo D (13 of 33)
    In this demonstration, you learn how to create a storage pool using the Configuration Wizard.


  • BE 2012 Admin: Install & Config: Storage Devices - Demo E (14 of 33)
    In this demonstration, you learn how to view and interpret storage default values.


  • BE 2012 Admin: Install & Config: Data Management (15 of 33)
    In this module, you learn how to organize media into media sets. You also learn why media catalogs are essential to restore operations.


  • BE 2012 Admin: Install & Config: Backing Up Data (16 of 33)
    In this module, you learn how to create and configure backup jobs, and how to run backup jobs manually and according to a schedule. You also learn about the Granular Restore Technology feature and about system state backup.


  • BE 2012 Admin: Install & Config: Backing Up Data - Demo A (17 of 33)
    In this demonstration, you learn how to add a server to Backup Exec 2012.


  • BE 2012 Admin: Install & Config: Backing Up Data - Demo B (18 of 33)
    In this demonstration, you learn how to create a server group.


  • BE 2012 Admin OD ILT: Install and Config: Backing Up Data - Demo C (19 of 33)
    In this demonstration, you learn how to back up files and folders.


  • BE 2012 Admin: Install & Config: Backing Up Data - Demo D (20 of 33)
    In this demonstration, you learn how to create a one-time backup job.


  • BE 2012 Admin: Install & Config: Backing Up Data - Demo E (21 of 33)
    In this demonstration, you learn to create a new back up job using the settings from an existing backup.


  • BE 2012 Admin: Install & Config: Backing Up Data - Demo F (22 of 33)
    In this demonstration, you learn how to add a stage to a backup job.


  • BE 2012 Admin: Install & Config: Backing Up Data - Demo G (23 of 33)
    In this demonstration, you learn how to perform a system state backup.


  • BE 2012 Admin: Install & Config: Restoring Data (24 of 33)
    In this module, you learn about the basic functionality of restore jobs and the guided methods to restore and search for data. You also learn how to run restore jobs.


  • BE 2012 Admin: Install & Config: Restoring Data - Demo A (25 of 33)
    In this demonstration, you learn how to restore data to its default location.


  • BE 2012 Admin: Install & Config: Restoring Data - Demo B (26 of 33)
    In this demonstration, you learn how to restore data to an alternate location.


  • BE 2012 Admin: Install & Config: Restoring Data - Demo C (27 of 33)
    In this demonstration, you learn how to restore date using the Search Wizard.


  • BE 2012 Admin: Install & Config: Simplified Disaster Recovery (28 of 33)
    In this module, you learn about the basics of Simplified Disaster Recovery. You also learn about the new features in Simplified Disaster Recovery and the process to create a custom Simplified Disaster Recovery disk. Finally, you learn how to perform disaster recovery using Simplified Disaster Recovery.


  • BE 2012 Admin: Install and Config: Simplified Disaster Recovery - Demo A (29 of 33)
    In this demonstration, you learn how to determine the critical and non-critical system devices and backup critical system components using a Simplified Disaster Recovery enabled backup job.


  • BE 2012 Admin: Install & Config: Simplified Disaster Recovery - Demo B (30 of 33)
    In this demonstration, you learn how to perform a complete online restore of a computer.


  • BE 2012 Admin: Install & Config: Virtual Machine Conversion (31 of 33)
    In this module, you learn about the basic concepts of virtual machine conversion and the supported virtual conversion configurations. In addition, you learn about the different virtual machine conversion options. Finally, you learn about the process and workflows for virtual machine conversion.


  • BE 2012 Admin: Install & Config: Virtual Machine Conversion - Demo A (32 of 33)
    In this demonstration, you learn how to backup a computer and convert it to a virtual machine after the backup completes.


  • BE 2012 Admin: Install & Config: Database Maintenance (33 of 33)
    In this module, you learn how to use the Backup Exec Utility for database maintenance operations. You also learn about the requirements and process to change the location of the Backup Exec database.


  • BE 2012 Admin: Manage & Admin: Remote Agents (1 of 8)
    In this module, you learn about functions and capabilities of the Agent for Windows. You also learn how to install and protect computers using the Agent for Windows. In addition, you learn about the functions of the Agent for Linux and how to backup Linux servers using the agent.


  • BE 2012 Admin: Manage & Admin: Agent for Applications & Databases (2 of 8)
    In this module, you learn about the function of the Agent for Applications and Databases. You also learn how to install the Agent for Applications and Databases, and the applications supported by the Agent for Applications and Databases. Finally, you learn how to protect an Active Directory environment using the Agent for Microsoft Active Directory.


  • BE 2012 Admin: Manage & Admin: Agent for Microsoft SQL Server (3 of 8)
    In this module, you learn about the components and functions of a Microsoft SQL Server database, and the capabilities of the Agent for Microsoft SQL Server. You also learn how to back up and restore a Microsoft SQL Server database using Backup Exec.


  • BE 2012 Admin: Manage & Admin: Agent for Microsoft Exchange Server (4 of 8)
    In this module, you learn about the basic components of Microsoft Exchange and the capabilities of the Agent for Microsoft Exchange Server. You also learn about the server requirements for backing up Microsoft Exchange. In addition, you learn about Backup Exec 2012 support for Exchange 2010 and the process to backup and restore Microsoft Exchange data. Finally, you learn about the restore options available for Microsoft Exchange.


  • BE 2012 Admin: Manage & Admin: Agent for Microsoft SharePoint Server (5 of 8)
    In this module, you learn about the purpose and function of the Agent for Microsoft SharePoint Server and the system requirements for the agent. You also learn how to back up and restore SharePoint Server 2003, 2007, and 2010.


  • BE 2012 Admin: Manage & Admin: Virtual Environment Agents (6 of 8)
    In this module, you learn about virtualization technologies and its benefits. You also learn about the installation procedure for the Agent for VMware and Hyper-V. In addition, you learn about the benefits of the Agent for VMware and how to back up and restore VMware data. Finally, you learn about the benefits of the Agent for Microsoft Hyper-V, how to back up and restore Hyper-V data, and how Backup Exec backs up Microsoft application data on virtual machines.


  • BE 2012 Admin: Manage & Admin: Deduplication Option (7 of 8)
    In this module, you learn about deduplication and Open Storage Technology fundamentals, and Backup Exec support for deduplication. You also learn how to install and configure the Deduplication Option, and run a deduplication job. In addition, you learn about optimized duplication for GRT.


  • BE 2012 Admin: Manage & Admin: Appendix D - Archiving Options for BE 2012 (8 of 8)
    In this module, you learn about the concept of data archival, the key components of the Archiving Option, and the Archiving Option support for Microsoft Exchange and file systems. You also learn how to install the Archiving Option, and archive Microsoft Exchange mailboxes and File Systems. Finally, you learn how to restore data from archives, and protect Archiving Option components.


  • What Is New in Backup Exec 2012 (1 of 6)
    In this module, you learn about the new features and enhancements made to Backup Exec 2012 core. You also learn about the new features and enhancements made to Backup Exec 2012 agents. Finally, you learn about the new features and enhancements made to Backup Exec 2012 options.


  • Understanding the Backup Exec 2012 Graphical User Interface (2 of 6)
    In this module, you learn about the rationale for the new Backup Exec 2012 graphical user interface. You also learn about the layout and elements used for various Backup Exec functions. Finally, you learn about the new Backup Exec 2012 views, tasks, and the functions performed in each view.


  • Configuring Storage in Backup Exec 2012 (3 of 6)
    In this module, you learn about the rationale for the new Backup Exec 2012 Storage view. You also learn about the layout and elements used for various storage functions. In addition, you learn about the new features and enhancements made to the Backup Exec 2012 Storage view. Finally, you learn how to create and configure storage objects.


  • Backup Exec Private Cloud Services (4 of 6)
    In this module, you learn about Backup Exec private cloud services. You also learn about the types of Backup Exec private cloud services offerings, how to configure Backup Exec private cloud services, and the key installation requirements. In addition, you learn about the features of private cloud services in Backup Exec 2012. Finally, you learn how to troubleshoot Backup Exec private cloud services issues.


  • Patch Management Enhancements (5 of 6)
    In this module, you learn about previous patch management issues and the patch management enhancements made to Backup Exec 2012. You also learn about the LiveUpdate process flow and how to configure discovery schedules. Finally, you learn about the different methods to update AWS.


  • End of Life Items (6 of 6)
    In this module, you learn about the Backup Exec options, agents, and job and interface objects that have been terminated. You also learn about the operating systems, products, and tools that are no longer supported, and software versions that are not tested.



Backup Exec 2014
  • BE 2014 Blueprints - Agent for Windows.pdf
    These Blueprints are designed to show customer challenges and how Backup Exec solves these challenges. Each Blueprint consists of: —Pain Points: what challenges customers face; —Whiteboard: Shows how Backup Exec solves the customer challenges; —Recommended Configuration: Shows recommended installation; —Do’s: Gives detailed configurations suggested by Symantec; —Don'ts: What configurations & pitfalls customers should avoid; —Advantages: Summarizes the Backup Exec advantages. Use these Blueprints to: —Understand the customer challenges and how Backup Exec solves them; —Present the Backup Exec best practice solution. Note: This course requires latest version of Adobe Reader to launch.


  • BE 2014 Blueprints - Blueprint for Backup Exec 3600 R3 Appliance.pdf


  • BE 2014 Blueprints - D2D2T Advantages.pdf


  • BE 2014 Blueprints - Deduplication.pdf


  • BE 2014 Blueprints - Exchange.pdf


  • BE 2014 Blueprints - Hyper-V.pdf


  • BE 2014 Blueprints - Large Environments.pdf


  • BE 2014 Blueprints - Optimized Duplication.pdf


  • BE 2014 Blueprints - OST Powered Appliances.pdf


  • BE 2014 Blueprints - P2V and B2V.pdf


  • BE 2014 Blueprints - Performance Tuning.pdf


  • BE 2014 Blueprints - Private Cloud Services.pdf


  • BE 2014 Blueprints - Remote Office Protection.pdf


  • BE 2014 Blueprints - SharePoint.pdf


  • BE 2014 Blueprints - Simplified Disaster Recovery.pdf


  • BE 2014 Blueprints - Small Environments.pdf


  • BE 2014 Blueprints - SQL.pdf


  • BE 2014 Blueprints - VMware.pdf


  • BE 2014: Overview (1 of 43)
    This module describes the new features and enhancements made to Backup Exec 2014. It also covers the new features and enhancements made to Backup Exec 2014 agents, options, and utilities. Finally, it covers the end-of-life platforms and features in Backup Exec 2014.


  • Installing BE 2014 (2 of 43)
    This module describes the Backup Exec 2014 installation process along with the requirements and prerequisites for installing Backup Exec 2014. It also covers the licensing options and the components installed with Backup Exec. Finally, it describes the steps to perform a typical installation and information displayed in the Migration Report.


  • BE 2014: Licensing (3 of 43)
    This module describes the Backup Exec 2014 Licensing editions and licensing schemes for Backup Exec 2014 agents and options. It also covers the prerequisites and deployment information for installing Small Business Server and Small Business Edition licenses, Capacity Edition licenses, and Backup Exec V-Ray Edition licenses. Additionally, it describes the upgrade path for the Desktop and Laptop Option in Backup Exec 2012 and Backup Exec 2014. Finally, it covers the license related logging and debugging information included in the Debug Monitor.


  • BE 2014 Installation Enhancements: New Default Database (4 of 43)
    This module describes the Backup Exec 2014 default database features and the requirements and prerequisites for installing Microsoft SQL Server 2008 R2 SP2 Express. It also covers the Microsoft SQL Server 2008 R2 SP2 Express installation process, the upgrade process, and upgrade paths. Finally, it covers how to troubleshoot installation and configuration issues.


  • BE 2014 Installation Enhancements: BE Credentials (5 of 43)
    This module describes the improvements made to the Backup Exec Logon Accounts Manager. It also covers how to set a schedule for performing resource credential checks.


  • Installing the BE 2014 Server on Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2 (6 of 43)
    This module describes the platform support and prerequisites for installing the Backup Exec 2014 server on Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2 systems. It also covers the component updates and installation impacts. Finally, it describes the Kernel Mode Driver modifications and installation log locations.


  • Upgrading to BE 2014 (7 of 43)
    This module covers the upgrade paths available for Backup Exec 2014 and the upgrade process. It also describes the job migration process and the enhancements to the migration report. In addition, the module covers the basic techniques to troubleshoot Backup Exec 2014 upgrade issues.


  • Upgrading to BE 2014 CASO (8 of 43)
    This module describes the Backup Exec 2014 CASO functionality. It also covers how to upgrade a Backup Exec 2012 CASO environment to Backup Exec 2014. In addition, the module covers components upgraded in a CASO environment. Finally, it describes how to perform a rolling upgrade and view the migration report.


  • BE 2014: Graphical User Interface Enhancements (9 of 43)
    This module covers the enhancements made to the status bar in Backup Exec 2014. It also covers the enhancements made to switching server details and viewing granular server details. In addition, the module describes the enhancements made to the backup selection list pertaining to resource ordering and global and backup-level excludes. Finally, it describes the enhancements made to the job name and job description fields in Backup Exec 2014.


  • BE 2014 Job Monitor (10 of 43)
    This module describes the job monitoring options in Backup Exec 2014, and the Backup Exec 2014 Job Monitor. It also covers the standard and compact views in the job monitor. Finally, the module covers the commands and filters for viewing jobs and job history.


  • BE 2014 Core: Storage Enhancements (11 of 43)
    This module describes the storage options available in Backup Exec 2014. It also describes the reasons for depreciating Kernel-mode drivers from Backup Exec 2014 and the key modifications made to Backup Exec 2014.


  • BE 2014 Data Lifecycle Management (12 of 43)
    This module covers the fundamentals and benefits of DLM. It also describes the DLM evolution, architecture, and terminology. In addition, the module covers DLM rules pertaining to expiration, retention, and dependency. The module also describes the DLM enhancements made to handling disk cartridge devices. Finally, it describes how to troubleshoot issues related to DLM.


  • BE 2014 Core: Retired Servers Group (13 of 43)
    This module describes the need for the Retired Servers group. It also covers the features and functionality of the Retired Servers group. In addition, the module covers how to retire a server.


  • BE 2014 Core: Mixed Backup Method (14 of 43)
    This module covers the mixed backup method, its functionality, and support in Backup Exec 2014.


  • BE 2014 Core: Multi-server Backup Definitions (15 of 43)
    This module describes multi-server backup definitions. It also covers how to create, edit, and monitor a multi-server backup definition. In addition it describes the enhancements made to archive job options.


  • Enhancements to System State Backups and Active Directory Granular Restore (16 of 43)
    This module describes the enhancements made to System State backups in Backup Exec 2014. It also describes the Backup Exec 2014 enhancements made to GRT backups and restores of Microsoft Windows Server 2012 R2 Active Directory.


  • BE 2014 Restore Enhancements (17 of 43)
    This module describes how to restore data from a single backup set or multiple backup sets. In addition, it describes how to restore data from a device or media. Finally, the module covers how to restore data from backup sets created by a specific backup job.


  • BE 2014 Scheduling Enhancements (18 of 43)
    This module covers the Backup Options Schedule tab modifications. It also covers the restricted hourly schedule and its recurrence patterns. Additionally, the module describes scheduling options and the recurrence pattern of the Monthly option – Days of the Month schedule and the Monthly option – Dates of the Month schedule. Finally, it covers the Include Dates and Per-job Exclude Dates, Jobs without a schedule and setting the job log level to capture Backup Exec Server logs.


  • BE 2014 Schedule Upgrade (19 of 43)
    This module covers the Backup Exec versions that can be upgraded to Backup Exec 2014. It also describes about the different scenarios to upgrade to Backup Exec 2014. In addition, the module covers the workflow of the Backup Exec scheduler during an upgrade. Finally, it describes the behavior of the Backup Exec scheduler during different upgrade scenarios.


  • Enhancements to BE 2014 Alerts (20 of 43)
    This module describes how to configure alerts in Backup Exec 2014. It also describes the enhancements made to alerts in Backup Exec 2014.


  • BE 2014 Support for Resilient File System (ReFS) (21 of 43)
    This module covers Resilient File System and Alternate Data Streams. It also describes Backup Exec 2014 support for Resilient File System – Alternate Data Streams.


  • BE 2014 Core: Support for Microsoft Windows Server 2012 Storage Spaces (22 of 43)
    This module describes the Backup Exec 2014 support for Microsoft Windows Server 2012 storage spaces.


  • BE 2014 Core: Support for 4k Disks (23 of 43)
    This module covers the basics of large sector sizes and the support for large sectors in Microsoft Windows Server 2012 and Backup Exec 2014. It also covers the backup requirements and GRT support of 4K disks. Finally, the module covers the issues related to 4K disks and how to troubleshoot large sector issues.


  • BE 2014 Enhancements for Windows User and System Registries (24 of 43)
    This module describes the registry updates for Microsoft Windows Server 2012 R2. It also covers how to back up and restore Microsoft Windows Server 2012 R2 user and system registries.


  • BE 2014 Support for Backup and Recovery of Microsoft Windows Recovery Environment (25 of 43)
    This module describes the features and functionality of the Windows Recovery Environment. It also describes the Backup Exec 2014 support for the Windows Recovery Environment. Finally, the module covers the backup and recovery process for Windows Recovery Environment.


  • Renaming the BE Server (26 of 43)
    This module covers the Backup Exec server rename issues. It also covers the Backup Exec 2014 server rename. In addition, the module describes the catalog self-healing basics. Finally, it covers the catalog self-healing process for a standalone Backup Exec server rename, a managed Backup Exec server rename, and a central administration server rename.


  • BE 2014 Advanced Open File Option Enhancements (27 of 43)
    This module covers the basics of Volume Shadow Copy providers. It also covers the iSCSI hardware VSS provider in Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2. Finally, the module describes the enhancements made to Backup Exec VSS provider selection logic.


  • BE 2014 Simplified Disaster Recovery Enhancements (28 of 43)
    This module describes how to install the Backup Exec 2014 Simplified Disaster Recovery Disk Creation Wizard and how to create a Backup Exec 2014 SDR disk. In addition, it also describes the Microsoft Windows Server 2012 and Windows 8 features supported by Backup Exec 2014 SDR. Finally, the module covers how to troubleshoot common SDR issues.


  • Delayed Cataloging Enhancements (29 of 43)
    This module describes delayed cataloging and the different delayed catalog operation options. It also describes the effect of Backup Exec cataloging on data byte count calculation.


  • BE Debug Monitor Enhancements (30 of 43)
    This module covers the basics of the Backup Exec Debug Monitor utility. It also describes the various limitations of Debug Monitor in earlier versions. Finally, the module covers the enhancements made to the Debug Monitor in Backup Exec 2014.


  • BE 2014: Enhancement to BE Utility (31 of 43)
    This module describes Backup Exec server security certificate management using the BEUtility tool. It also covers the self-healing approach in the server rename operation.


  • BE 2014 BEDBG (32 of 43)
    This module covers the basic functionality of BEDBG in Backup Exec 2014. It also covers the process flow of BEDBG in Backup Exec 2014.


  • BE 2014 BE Management Command Line Interface Enhancements (33 of 43)
    This module covers the basics of the Backup Exec Management Command Line Interface. It also describes the enhancements made to BEMCLI in Backup Exec 2014. Finally, it covers how to configure and work with BEMCLI.


  • BE 2014: Physical to Virtual Enhancements (34 of 43)
    This module describes the incremental conversion support. It also describes the one-time conversion to a virtual machine feature. In addition, the module describes the Backup Exec 2014 support for exclusion of disks from conversion. Finally, it describes the conversion support for 2 TB or larger disks.


  • BE 2014 Installation Enhancements: Push Installing Agent for Windows to Multiple Virtual Machines (35 of 43)
    This module describes the enhancements made to the Add a Server wizard for VMware vCenter server or ESX host and the Microsoft Hyper-V host. It also covers the steps to push-install the Backup Exec Agent for Windows to VMware or Hyper-V virtual machines.


  • BE 2014: Agent for VMware Enhancements (36 of 43)
    This module describes the new features in VMware vSphere 5.5. It also covers the VMware vSphere 5.5 features supported by Backup Exec 2014. Finally, the module describes the enhancements made to the Agent for VMware.


  • BE 2014: Agent for Hyper-V Enhancements (37 of 43)
    This module covers the Microsoft Windows Server 2012 R2: Hyper-V. It also describes Backup Exec 2014 support for various Hyper-V features and enhancements.


  • BE 2014: Microsoft SQL Server Agent Enhancements (38 of 43)
    This module describes the features and platforms supported by the Agent for Microsoft SQL Server in Backup Exec 2014. It also describes the enhancements made to Backup Exec 2014 to support Microsoft SQL Server. Finally, the module covers the Microsoft SQL server features that are not supported in Backup Exec 2014.


  • BE 2014: Agent for Microsoft SharePoint Enhancements (39 of 43)
    This module covers the basics of Backup Exec Agent for SharePoint and the supported SharePoint platforms. It also describes the new features in Microsoft SharePoint 2013 and Backup Exec 2014 GRT support for Microsoft SharePoint 2013. In addition, the module describes how to perform GRT backups and restores in Backup Exec 2014. Finally, it describes the claims-based authentication and how to troubleshooting SharePoint issues.


  • Site Mailbox (40 of 43)
    This module covers the role and functionality of Site Mailboxes. It also covers the internal working of Site Mailboxes. Finally, the module describes how to backup and restore Site Mailboxes.


  • BE 2014: Microsoft Exchange Server Agent Enhancements (41 of 43)
    This module describes the features and platforms supported by the Backup Exec Agent for Microsoft Exchange. It also covers the changes made to the Backup Exec Agent for Microsoft Exchange to support Microsoft Exchange 2013 GRT backups. Finally, it describes how to troubleshoot common Microsoft Exchange related issues.


  • BE 2014: Agent for Lotus Domino Enhancements (42 of 43)
    This module covers the limitations of existing restore options for Lotus Domino. It also describes the Create a copy of the database option. In addition, the module describes the internal changes made to the restore process. Finally, it covers the user interface enhancements to support new restore option.


  • BE 2014 Deduplication Enhancements (43 of 43)
    This module describes Deduplication version 7 in Backup Exec 2014. It also covers the Backup Exec 2014 dedup integrity and recoverability enhancements. In addition, the module covers the Dedup 64 TB support and performance enhancements. Finally, it describes the Dedup supportability improvements.


  • Symantec Backup Exec 2014 Blueprint for Data Lifecycle Management
    Symantec Backup Exec 2014 BluePrint for Data Lifecycle Management discusses the functional behavior of data life cycle management in Backup Exec 2014 It consists of : Pain Points: Lists the challenges that a customer faces Whiteboard: Shows how Backup Exec solves the customer challenges Recommended Configuration: Shows recommended installation Dos: Gives detailed configurations suggested by Symantec Don'ts: What configurations and pitfalls customers must avoid Advantages: Summarizes the Backup Exec advantages.



Backup Exec 2014 - Japanese
These modules are translated versions of the Backup Exec 2014: Differences course content in PDF format. When you click on Launch button, you can view or download a pdf file that contains the English and Japanese versions of the content, which you can review offline.
  • BE 2014: Overview (1 of 43)
    This module describes the new features and enhancements made to Backup Exec 2014. It also covers the new features and enhancements made to Backup Exec 2014 agents, options, and utilities. Finally, it covers the end-of-life platforms and features in Backup Exec 2014.


  • Installing BE 2014 (2 of 43)
    This module describes the Backup Exec 2014 installation process along with the requirements and prerequisites for installing Backup Exec 2014. It also covers the licensing options and the components installed with Backup Exec. Finally, it describes the steps to perform a typical installation and information displayed in the Migration Report.


  • BE 2014 Licensing (3 of 43)
    This module describes the Backup Exec 2014 Licensing editions and licensing schemes for Backup Exec 2014 agents and options. It also covers the prerequisites and deployment information for installing Small Business Server and Small Business Edition licenses, Capacity Edition licenses, and Backup Exec V-Ray Edition licenses. Additionally, it describes the upgrade path for the Desktop and Laptop Option in Backup Exec 2012 and Backup Exec 2014. Finally, it covers the license related logging and debugging information included in the Debug Monitor.


  • BE 2014 Installation Enhancements: New Default Database (4 of 43)
    This module describes the Backup Exec 2014 default database features and the requirements and prerequisites for installing Microsoft SQL Server 2008 R2 SP2 Express. It also covers the Microsoft SQL Server 2008 R2 SP2 Express installation process, the upgrade process, and upgrade paths. Finally, it covers how to troubleshoot installation and configuration issues.


  • BE 2014 Installation Enhancements: BE Credentials (5 of 43)
    This module describes the improvements made to the Backup Exec Logon Accounts Manager. It also covers how to set a schedule for performing resource credential checks.


  • Installing the BE 2014 Server on Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2 (6 of 43)
    This module describes the platform support and prerequisites for installing the Backup Exec 2014 server on Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2 systems. It also covers the component updates and installation impacts. Finally, it describes the Kernel Mode Driver modifications and installation log locations.


  • Upgrading to BE 2014 (7 of 43)
    This module covers the upgrade paths available for Backup Exec 2014 and the upgrade process. It also describes the job migration process and the enhancements to the migration report. In addition, the module covers the basic techniques to troubleshoot Backup Exec 2014 upgrade issues.


  • Upgrading to BE 2014 CASO (8 of 43)
    This module describes the Backup Exec 2014 CASO functionality. It also covers how to upgrade a Backup Exec 2012 CASO environment to Backup Exec 2014. In addition, the module covers components upgraded in a CASO environment. Finally, it describes how to perform a rolling upgrade and view the migration report.


  • BE 2014: Graphical User Interface Enhancements (9 of 43)
    This module covers the enhancements made to the status bar in Backup Exec 2014. It also covers the enhancements made to switching server details and viewing granular server details. In addition, the module describes the enhancements made to the backup selection list pertaining to resource ordering and global and backup-level excludes. Finally, it describes the enhancements made to the job name and job description fields in Backup Exec 2014.


  • BE 2014 Job Monitor (10 of 43)
    This module describes the job monitoring options in Backup Exec 2014, and the Backup Exec 2014 Job Monitor. It also covers the standard and compact views in the job monitor. Finally, the module covers the commands and filters for viewing jobs and job history.


  • BE 2014 Core: Storage Enhancements (11 of 43)
    This module describes the storage options available in Backup Exec 2014. It also describes the reasons for depreciating Kernel-mode drivers from Backup Exec 2014 and the key modifications made to Backup Exec 2014.


  • BE 2014 Data Lifecycle Management (12 of 43)
    This module covers the fundamentals and benefits of DLM. It also describes the DLM evolution, architecture, and terminology. In addition, the module covers DLM rules pertaining to expiration, retention, and dependency. The module also describes the DLM enhancements made to handling disk cartridge devices. Finally, it describes how to troubleshoot issues related to DLM.


  • BE 2014 Core: Retired Servers Group (13 of 43)
    This module describes the need for the Retired Servers group. It also covers the features and functionality of the Retired Servers group. In addition, the module covers how to retire a server.


  • BE 2014 Core: Mixed Backup Method (14 of 43)
    This module covers the mixed backup method, its functionality, and support in Backup Exec 2014.


  • BE 2014 Core: Multi-server Backup Definitions (15 of 43)
    This module describes multi-server backup definitions. It also covers how to create, edit, and monitor a multi-server backup definition. In addition it describes the enhancements made to archive job options.


  • Enhancements to System State Backups and Active Directory Granular Restore (16 of 43)
    This module describes the enhancements made to System State backups in Backup Exec 2014. It also describes the Backup Exec 2014 enhancements made to GRT backups and restores of Microsoft Windows Server 2012 R2 Active Directory.


  • BE 2014 Restore Enhancements (17 of 43)
    This module describes how to restore data from a single backup set or multiple backup sets. In addition, it describes how to restore data from a device or media. Finally, the module covers how to restore data from backup sets created by a specific backup job.


  • BE 2014 Scheduling Enhancements (18 of 43)
    This module covers the Backup Options Schedule tab modifications. It also covers the restricted hourly schedule and its recurrence patterns. Additionally, the module describes scheduling options and the recurrence pattern of the Monthly option – Days of the Month schedule and the Monthly option – Dates of the Month schedule. Finally, it covers the Include Dates and Per-job Exclude Dates, Jobs without a schedule and setting the job log level to capture Backup Exec Server logs.


  • BE 2014 Schedule Upgrade (19 of 43)
    This module covers the Backup Exec versions that can be upgraded to Backup Exec 2014. It also describes about the different scenarios to upgrade to Backup Exec 2014. In addition, the module covers the workflow of the Backup Exec scheduler during an upgrade. Finally, it describes the behavior of the Backup Exec scheduler during different upgrade scenarios.


  • Enhancements to BE 2014 Alerts (20 of 43)
    This module describes how to configure alerts in Backup Exec 2014. It also describes the enhancements made to alerts in Backup Exec 2014.


  • BE 2014 Support for Resilient File System (ReFS) (21 of 43)
    This module covers Resilient File System and Alternate Data Streams. It also describes Backup Exec 2014 support for Resilient File System – Alternate Data Streams.


  • BE 2014 Core: Support for Microsoft Windows Server 2012 Storage Spaces (22 of 43)
    This module describes the Backup Exec 2014 support for Microsoft Windows Server 2012 storage spaces.


  • BE 2014 Core: Support for 4k Disks (23 of 43)
    This module covers the basics of large sector sizes and the support for large sectors in Microsoft Windows Server 2012 and Backup Exec 2014. It also covers the backup requirements and GRT support of 4K disks. Finally, the module covers the issues related to 4K disks and how to troubleshoot large sector issues.


  • BE 2014 Enhancements for Windows User and System Registries (24 of 43)
    This module describes the registry updates for Microsoft Windows Server 2012 R2. It also covers how to back up and restore Microsoft Windows Server 2012 R2 user and system registries.


  • BE 2014 Support for Backup and Recovery of Microsoft Windows Recovery Environment (25 of 43)
    This module describes the features and functionality of the Windows Recovery Environment. It also describes the Backup Exec 2014 support for the Windows Recovery Environment. Finally, the module covers the backup and recovery process for Windows Recovery Environment.


  • Renaming the BE Server (26 of 43)
    This module covers the Backup Exec server rename issues. It also covers the Backup Exec 2014 server rename. In addition, the module describes the catalog self-healing basics. Finally, it covers the catalog self-healing process for a standalone Backup Exec server rename, a managed Backup Exec server rename, and a central administration server rename.


  • BE 2014 Advanced Open File Option Enhancements (27 of 43)
    This module covers the basics of Volume Shadow Copy providers. It also covers the iSCSI hardware VSS provider in Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2. Finally, the module describes the enhancements made to Backup Exec VSS provider selection logic.


  • BE 2014 Simplified Disaster Recovery Enhancements (28 of 43)
    This module describes how to install the Backup Exec 2014 Simplified Disaster Recovery Disk Creation Wizard and how to create a Backup Exec 2014 SDR disk. In addition, it also describes the Microsoft Windows Server 2012 and Windows 8 features supported by Backup Exec 2014 SDR. Finally, the module covers how to troubleshoot common SDR issues.


  • Delayed Cataloging Enhancements (29 of 43)
    This module describes delayed cataloging and the different delayed catalog operation options. It also describes the effect of Backup Exec cataloging on data byte count calculation.


  • BE Debug Monitor Enhancements (30 of 43)
    This module covers the basics of the Backup Exec Debug Monitor utility. It also describes the various limitations of Debug Monitor in earlier versions. Finally, the module covers the enhancements made to the Debug Monitor in Backup Exec 2014.


  • BE 2014: Enhancement to BE Utility (31 of 43)
    This module describes Backup Exec server security certificate management using the BEUtility tool. It also covers the self-healing approach in the server rename operation.


  • BE 2014 BEDBG (32 of 43)
    This module covers the basic functionality of BEDBG in Backup Exec 2014. It also covers the process flow of BEDBG in Backup Exec 2014.


  • BE 2014 BE Management Command Line Interface Enhancements (33 of 43)
    This module covers the basics of the Backup Exec Management Command Line Interface. It also describes the enhancements made to BEMCLI in Backup Exec 2014. Finally, it covers how to configure and work with BEMCLI.


  • BE 2014: Physical to Virtual Enhancements (34 of 43)
    This module describes the incremental conversion support. It also describes the one-time conversion to a virtual machine feature. In addition, the module describes the Backup Exec 2014 support for exclusion of disks from conversion. Finally, it describes the conversion support for 2 TB or larger disks.


  • BE 2014 Installation Enhancements: Push Installing Agent for Windows to Multiple Virtual Machines (35 of 43)
    This module describes the enhancements made to the Add a Server wizard for VMware vCenter server or ESX host and the Microsoft Hyper-V host. It also covers the steps to push-install the Backup Exec Agent for Windows to VMware or Hyper-V virtual machines.


  • BE 2014: Agent for VMware Enhancements (36 of 43)
    This module describes the new features in VMware vSphere 5.5. It also covers the VMware vSphere 5.5 features supported by Backup Exec 2014. Finally, the module describes the enhancements made to the Agent for VMware.


  • BE 2014: Agent for Hyper-V Enhancements (37 of 43)
    This module covers the Microsoft Windows Server 2012 R2: Hyper-V. It also describes Backup Exec 2014 support for various Hyper-V features and enhancements.


  • BE 2014: Microsoft SQL Server Agent Enhancements (38 of 43)
    This module describes the features and platforms supported by the Agent for Microsoft SQL Server in Backup Exec 2014. It also describes the enhancements made to Backup Exec 2014 to support Microsoft SQL Server. Finally, the module covers the Microsoft SQL server features that are not supported in Backup Exec 2014.


  • BE 2014: Agent for Microsoft SharePoint Enhancements (39 of 43)
    This module covers the basics of Backup Exec Agent for SharePoint and the supported SharePoint platforms. It also describes the new features in Microsoft SharePoint 2013 and Backup Exec 2014 GRT support for Microsoft SharePoint 2013. In addition, the module describes how to perform GRT backups and restores in Backup Exec 2014. Finally, it describes the claims-based authentication and how to troubleshooting SharePoint issues.


  • Site Mailbox (40 of 43)
    This module covers the role and functionality of Site Mailboxes. It also covers the internal working of Site Mailboxes. Finally, the module describes how to backup and restore Site Mailboxes.


  • BE 2014: Microsoft Exchange Server Agent Enhancements (41 of 43)
    This module describes the features and platforms supported by the Backup Exec Agent for Microsoft Exchange. It also covers the changes made to the Backup Exec Agent for Microsoft Exchange to support Microsoft Exchange 2013 GRT backups. Finally, it describes how to troubleshoot common Microsoft Exchange related issues.


  • BE 2014: Agent for Lotus Domino Enhancements (42 of 43)
    This module covers the limitations of existing restore options for Lotus Domino. It also describes the Create a copy of the database option. In addition, the module describes the internal changes made to the restore process. Finally, it covers the user interface enhancements to support new restore option.


  • BE 2014 Deduplication Enhancements (43 of 43)
    This module describes Deduplication version 7 in Backup Exec 2014. It also covers the Backup Exec 2014 dedup integrity and recoverability enhancements. In addition, the module covers the Dedup 64 TB support and performance enhancements. Finally, it describes the Dedup supportability improvements.



Backup Exec
  • BE 12.5 - Windows Servers Enhancements
    This module explains the enhanced functionality implemented in Symantec Backup Exec 12.5 for Windows Servers to support SQL Server 2008, Oracle 11g, and the 64-bit edition of Domino 8. Also covered in this are SharePoint Agent enhancements and NDMP Option enhancements.


  • BE2010 - Differences: What is New in Backup Exec 2010
    This module provides a brief description of the new features and enhancements introduced in Backup Exec 2010. The end-of-life items in Backup Exec 2010 are also discussed in this module.


  • BE2010 - Differences: Installation and Upgrade
    This module describes the enhancements made to the Backup Exec 2010 installation wizard and explains how to install Backup Exec 2010 and RAWS. In addition, the module also explains how to upgrade from an earlier version of Backup Exec to Backup Exec 2010.


  • BE2010 - Differences: Support for Windows Server 2008 R2 and Windows 7
    This module describes the new features and enhancements made to Backup Exec 2010 to support Windows Server 2008 R2 and Windows 7 clients.


  • BE2010 - Differences: Virtualization Enhancements
    This module describes the enhancements made to the Backup Exec Agent for Microsoft Hyper-V and the Backup Exec Agent for VMware Virtual Infrastructure.


  • BE2010 - Differences: Archiving Options for Backup Exec 2010
    This module describes the Archiving Options introduced in Backup Exec 2010 for Microsoft Exchange and File System.


  • BE2010 - Differences: Backup Exec Agent for Enterprise Vault Enhancements
    This module describes the enhancements made to the Backup Exec Agent for Enterprise Vault in Backup Exec 2010.


  • BE2010 - Differences: Migrating Data from Enterprise Vault to Backup Exec 2010
    This module describes the Migrator feature introduced in Backup Exec 2010. The Migrator feature migrates older archived items from high cost Enterprise Vault storage to low cost tertiary storage.


  • BE2010 - Differences: Support for Exchange 2010
    This module describes the enhancements made to Backup Exec 2010 to support Microsoft Exchange 2010.


  • BE2010 - Differences: Deduplication Option for Backup Exec 2010
    This module describes the Backup Exec Deduplication feature introduced in Backup Exec 2010. Deduplication identifies and eliminates redundant data, reducing the amount of disk required to store the deduplicated data.


  • BE2010 Install & Configure - Course Introduction (1 of 7)
    This module provides a brief description of the new features and enhancements introduced in Backup Exec 2010.


  • BE2010 Install & Configure - Backup Exec Fundamentals (2 of 7)
    This module describes the Backup Exec architecture, installation prerequisites and procedure, and discusses how to configure and run a basic backup and restore job.


  • BE2010 Install & Configure - Devices and Media (3 of 7)
    This module describes the devices and media supported by Backup Exec, and the procedure to configure and manage devices. The module also covers managing media and describes Media catalogs.


  • BE2010 Install & Configure - Backing Up Data (4 of 7)
    This module describes the basics components of a backup job, and how to configure and run backup jobs. The module also covers GRT-enabled backups and system state backups.


  • BE2010 Install & Configure - Establishing Backup Policies (5 of 7)
    This module discusses policies, templates, relationship rules, and the procedure to create a policy-based backup job.


  • BE2010 Install & Configure - Restoring Data (6 of 7)
    This module describes how to configure and run restore jobs.


  • BE2010 Install & Configure - Performance Tuning and Database Maintenance (7 of 7)
    This module describes device management and discusses the procedures to manage and maintain the Backup Exec database.


  • BE2010 Manage & Administer - Remote Agents (1 of 8)
    This module describes how to configure and work with Remote agents, like Remote Agent for Windows Systems, Remote Agent for Linux and UNIX Servers, and Active Directory Recovery Agent.


  • BE2010 Manage & Administer - Database Agents (2 of 8)
    This module presents an overview of the Database agents and their installation procedure. This module also lists the databases that are supported by various Backup Exec agents.


  • BE2010 Manage & Administer - Agent for Microsoft SQL Server (3 of 8)
    This module describes the functionality of the Agent for Microsoft SQL Server and the process to backup and restore SQL Server database.


  • BE2010 Manage & Administer - Agent for Microsoft Exchange Server (4 of 8)
    This module discusses the functionality of the Agent for Microsoft Exchange Server and the process to backup and restore Microsoft Exchange Server. This module also covers the procedures to backup and restore Microsoft Exchange 2010.


  • BE2010 Manage & Administer - Agent for SharePoint Server (5 of 8)
    This module describes the functionality of the Agent for Microsoft SharePoint and the process to backup and restore Microsoft SharePoint .


  • BE2010 Manage & Administer - Virtual Environment Agents (6 of 8)
    This module describes the enhancements made to the Backup Exec Agent for Microsoft Hyper-V and the Backup Exec Agent for VMware Virtual Infrastructure.


  • BE2010 Manage & Administer - Archiving Options for Backup Exec 2010 (7 of 8)
    This module describes the Archiving Options introduced in Backup Exec 2010 for Microsoft Exchange and File System.


  • BE2010 Manage & Administer - Deduplication Option (8 of 8)
    This module describes the Backup Exec Deduplication feature introduced in Backup Exec 2010. Deduplication identifies and eliminates redundant data, reducing the amount of disk required to store the deduplicated data.


  • BE2010 - Working with Microsoft Exchange Granular Recovery Technology
    This module describes how Granular Recovery Technology works with Microsoft Exchange and the features of the Exchange Agent.


  • BE2010 - Configuring and Troubleshooting Tape Hardware
    This module describes tape hardware types and their features and the configuration and troubleshooting procedures.


  • BE2010 - Deduplicating Data Using Backup Exec
    This module briefly describes the data deduplication technology that Backup Exec implements.


  • BE2010 - Using the Symantec Backup Exec Agent for VMware Virtual Infrastructure
    This module explains the features of the Symantec Backup Exec Agent for VMware Virtual Infrastructure, how it works, troubleshooting tips, and best practices.


  • BE2010 - Maintaining the Backup Exec 2010 Environment
    This module explains how to install Backup Exec hotfixes and service packs, maintain and protect Backup Exec databases, and maintain backup devices.


  • BE2010 - Backing Up and Restoring Enterprise Vault
    This module describes Enterprise Vault and its components, the Enterprise Vault Agent, and the procedure to back up and restore Enterprise Vault.


  • BE2010 - Using Granular Recovery Technology with Microsoft SharePoint
    This module discusses the configuration and use of Granular Recovery Technology with Microsoft SharePoint.


  • BE2010 - Backup-to-Disk Best Practices
    This module briefly describes the backup-to-disk folder feature and the backup-to-disk best practices


  • BE2010 - Migrating Data from Enterprise Vault to Backup Exec 2010
    This module describes the process to migrate data from Enterprise Vault servers to Backup Exec.


  • BE2010 - Archiving Exchange Data Using Backup Exec
    This module explains how to archive Microsoft Exchange data by using Backup Exec.


  • BE2010 - Archiving File System Data Using Backup Exec
    This module explains how to archive File System data using Backup Exec.


  • BE 12.5 - Backing Up and Restoring Enterprise Vault
    This module briefly introduces Enterprise Vault concepts. It also discusses the essential concepts of the Backup Exec Agent for Enterprise Vault, and the procedure to backup and restore Enterprise Vault and its components.


  • BE 12.5 - Exchange Backup and Restore Best Practices
    This module addresses some of the recommended best practices for Exchange Sever backups and restores. The following best practives are discissed: Preparing Exchange Server for Backup, Backing Up the Exchange Information Store Data, Recovering Data for Exchange Information Store, Restoring Data for Exchange Server 2000 and 2003, Disaster Recovery of an Exchange Server.


  • BE 12.5 - Backup Exec Support for Microsoft Virtual Server 2005 and Hyper-V
    This module discusses the fundamental concepts of Symantec Backup Exec Microsoft Virtual Agent. It also describes the procedure to backup and restore Microsoft Virtual Server 2005 and Hyper-V.


  • BE 12.5 - Backup and Recovery of VMware Virtual Infrastructure
    This module discusses the functionality, configuration, and implementation of VMware Virtual Infrastructure. In addition, it discusses how to use the capabilities of Symantec Backup Exec 12.5 for Windows Servers to protect the VMware environment and some of the best practices for backup and recovery.


  • BE 12 - Enhanced Backup and Recovery
    Learn how to back up and recover encrypted data and compressed data. Backing up IIS, Terminal Server Services, Active Directory and Microsoft Windows 2008 server will also be covered.


  • BE 12 - Installing and Managing Advanced Open File Option (AOFO)
    Learn how to install and utilize the Advanced Open File Option.


  • BE 12 - Advanced Open File Option (AOFO) and the Volume Shadow Copy Service (VSS)
    Learn the basics about VSS and how it works. Also, learn what system configurations require VSS or VSP, how to configure them for a backup job and how to troubleshoot them.


  • BE 12 - Installing and Managing Central Admin Server Option (CASO)
    Learn how to install and use the Central Admin Server Option.


  • BE 12 - CASO Best Practices
    Learn the best practices for using catalogs, creating backup jobs, restoring information and using alerts and reports with the Central Admin Server Option.



Backup Exec Appliance
  • BE3600-Appliance-R3_What’s new in Backup Exec 3600 R3 Appliance (1 of 10)
    This module describes the new features and enhancements introduced in the Backup Exec 3600 R3 Appliance. It also explains the limitations of the Backup Exec 3600 R3 Appliance.


  • BE3600-Appliance-R3_Connecting to the Backup Exec 3600 R3 Appliance (2 of 10)
    This module explains the Backup Exec 3600 R3 Appliance Web interface and its usage.


  • BE3600-Appliance-R3_Upgrading to Backup Exec 3600 R3 Appliance (3 of 10)
    This module describes the upgrade paths available for Backup Exec 3600 R3 Appliance. It also explains the Backup Exec 3600 R3 Appliance upgrade process and discusses how to troubleshoot upgrade issues.


  • BE3600-Appliance-R3_Updating Backup Exec 3600 Appliance (4 of 10)
    This module describes the offline updates mode and its advantages. It also explains the process to install and configure Microsoft Windows Server Update Service and Symantec LiveUpdate Server.


  • BE3600-Appliance-R3_Symantec Critical System Protection (5 of 10)
    This module describes the functionality SCSP, and its implementation details in Backup Exec 3600 R3 Appliance.


  • BE3600-Appliance-R3_NIC Teaming (6 of 10)
    This module describes the concept of NIC Teaming. It also explains the supported NIC Teaming modes for the Backup Exec 3600 R3 Appliance, and the procedure to configure NIC Teaming.


  • BE3600-Appliance-R3_Monitoring and Troubleshooting BE 3600 R3 Appliance Hardware (7 of 10)
    This module describes the different methods to monitor various components of the Backup Exec 3600 R3 Appliance. It also explains the benefits of AutoSupport and how to troubleshoot AutoSupport issues. In addition, it discusses how to interpret hardware failures and their causes.


  • BE3600-Appliance-R3_Appliance Disaster Recovery (8 of 10)
    This module describes the tasks involved in the Backup Exec 3600 R3 Appliance disaster recovery process. It also explains the preservation of Backup Exec components during disaster recovery and the scenarios that require the Appliance disaster recovery process to be initiated.


  • BE3600-Appliance-R3_USB Reimage Failsafe Protection (9 of 10)
    This module describes the USB target platform device feature and the process for reimaging the Backup Exec Appliance.


  • BE3600-Appliance-R3_Backup Exec 3600 R3 Appliance Localization (10 of 10)
    This module describes the Appliance localization support. It also explains how to configure Appliance localization, and troubleshoot known Appliance localization issues.


  • Backup Exec 3600 Appliance: Setup and Basic Management Tasks
    This video describes the initial configuration and basic management tasks for the Backup Exec 3600 data protection appliance.


  • Backup Exec 3600 Appliance: System Replacement: Preparation and Recovery
    This video describes the steps to prepare a malfunctioning system for replacement, as well as how to recover the new unit to the state of the original.


  • BE 3600 Appliance Demo - Bad Drive Replacement (MP3 video)
    This video provides a brief overview of how to replace a hot swappable hard drive in Backup Exec 3600, including how to determine which drive needs replacement.


  • BE 3600 Appliance Demo - Bad Power Supply Replacement (MP3 video)
    This video provides a brief overview of how to replace a hot swappable power supply in Backup Exec 3600, including how to determine which power supply needs replacement.


  • BE 3600 Disaster Recovery - Bad Appliance Demo
    This module demonstrates how to remove discs from a failed chassis and steps to take to reinstitute the system in a working appliance.


  • BE 3600 Disaster Recovery - Bad Drives Demo
    This module demonstrates how to replace failed discs in an existing appliance and steps to take to re-configure the raid5 array in a working appliance.


  • Backup Exec 3600 Appliance: Fundamentals
    In this module, you learn you learn about the Backup Exec 3600 appliance and the benefits of using it. You also learn about the appliance features and the common appliance deployment scenarios. Finally, you learn about the common appliance server roles, such as the Central Administration Server Option, Managed Media Server, and Stand-alone Media Server.


  • Backup Exec 3600 Appliance: Hardware Specifications
    In this module, you learn about the hardware architecture of the Backup Exec 3600 appliance and the power supply specifications. In addition, you learn about the features of disk modules and drives and how to mount the appliance in the rack. Finally, you learn about the environmental conditions essential for proper functioning of the appliance.


  • Backup Exec 3600 Appliance: Software Specifications
    In this module, you learn about the software programs, agents, options, and tools preinstalled on the Backup Exec 3600 appliance. You also learn about the default factory settings for the appliance and the appliance installation flow. In addition, you learn how to perform the pre-configuration checks for the appliance. Finally, you learn how to perform appliance initial configuration and post-configuration tasks.


  • Backup Exec 3600 Appliance: Tasks and Procedures
    In this module, you learn about the Backup Exec 3600 appliance Web interface, appliance administration using PowerShell, and the methods to update and upgrade the appliance. You also learn how to enable and disable Remote Desktop and monitor the components of the appliance.


  • Backup Exec 3600 Appliance: Features
    In this module, you learn about the appliance support for virtual environments and cloud services. You also learn about the scenarios that require the disaster recovery process to be initiated and the steps in the disaster recovery process. Finally, you learn how to launch the Backup Exec administration console.



Backup Exec System Recovery
  • Administration - Lesson 01: Overview of Backup Exec System Recovery
    This module introduces Backup Exec System Recovery and discusses its main purpose and features.


  • Administration - Lesson 02: Disaster Recovery Planning
    This module discusses the concept and components of Disaster Recovery Planning and explores how Backup Exec System Recovery addresses the systems continuity requirements of the Disaster Recovery Plan.


  • Administration - Lesson 03: Installing, Upgrading, and Configuring Backup Exec System Recovery
    This module steps through the installation of Backup Exec System Recovery. It also discusses upgrading and configuring Backup Exec System Recovery 2010.


  • Administration - Lesson 04: Creating Backups
    This module discusses the different options and methods for creating backups with Backup Exec System Recovery.


  • Administration - Lesson 05: Restoring Recovery Points
    This module describes the different methods for using disk-based recovery points to recover systems and data.


  • Administration - Lesson 06: Restoring Individual Files and Folders
    This module discusses the various methods Backup Exec System Recovery offers for restoring individual files and folders.


  • Administration - Lesson 07: Performing Backup and Restore in a Windows 2008 R2 and Windows 7 Client Environment
    This module describes the new features and enhancements made to BESR 2010 to support Windows Server 2008 R2 and Windows 7 Clients.


  • Administration - Lesson 08: Virtualizing Recovery Points
    This module discusses the benefits and processes of converting recovery points into virtual machines and back again to physical machines.


  • Administration - Lesson 09: Installing Backup Exec System Recovery 2010 Management Solution
    This module describes the need, functionality, components and installation of Backup Exec System Recovery 2010 Management Solution.


  • Administration - Lesson 10: Managing Backup Exec System Recovery 2010 Management Solution
    This module describes the post-installation tasks and the layout of the GUI of Backup Exec System Recovery 2010 Management Solution. It further describes how to manage and monitor backup and restore tasks, as well as generate reports using Backup Exec System Recovery 2010 Management Solution.


  • BESR2010 for Linux – Overview and Installation
    This module provides an overview of the Backup Exec System Recovery 2010 Linux edition and also describes its installation.


  • BESR2010 for Linux – Backup and Restore
    This module describes the backup and restore operation in the Backup Exec System Recovery 2010 Linux edition.



Brightmail Gateway
  • Brightmail Gateway 8.0 - Introduction
    This module provides an introduction to Brightmail Gateway 8.0. It also covers key features and architecture in detail.


  • Brightmail Gateway 9.0 - Introduction to Brightmail Gateway 9.0
    This module provides an introduction to Brightmail Gateway 9.0. It also describes its features and architecture.


  • Brightmail Gateway 9.0 - Installation and Configuration
    This module covers how to install and configure Brightmail Gateway 9.0.


  • Brightmail Gateway 9.0 - Adaptive Reputation Management
    This module describes Adaptive Reputation Management in Brightmail Gateway 9.0


  • Brightmail Gateway 9.0 - Antispam Policies
    This module covers how to create antispam policies in Brightmail Gateway 9.0. It also introduces bounce attack prevention.


  • Brightmail Gateway 9.0 - Antivirus Policies
    This module covers how to create antivirus policies in Brightmail Gateway 9.0. It also covers configuration of LiveUpdate and scan settings.


  • Brightmail Gateway 9.0 - Content Compliance Policy
    This module covers how to setup content compliance scanning. It also describes how to use content compliance policy for structured data matching.


  • Brightmail Gateway 9.0 - Managing User and Host Configuration
    This module covers how to manage user and host configuration in Brightmail Gateway 9.0.


  • Brightmail Gateway 9.0 - Managing Control Center Settings
    This module covers how to configure control center settings of Brightmail Gateway 9.0.


  • Brightmail Gateway 9.0 - Managing Instant Messaging Settings
    This module covers how to manage instant messaging filtering in Brightmail Gateway 9.0.


  • Brightmail Gateway 8.0 - Installation and Configuration
    This module describes how to install and configure Brightmail Gateway 8.0. Overview of Brightmail Gateway Control Center is also discussed.


  • Brightmail Gateway 8.0 - Adaptive Reputation Management
    This module describes Adaptive Reputation Management feature introduced in Brightmail Gateway 8.0. You learn how to configure good and bad senders policies. You also learn to configure connection classification.


  • Brightmail Gateway 8.0 - Antispam Policies
    This module describes how to configure Email Spam Policies in Brightmail Gateway 8.0. You learn to configure spam quarantine and spam scan settings. You also learn to configure sender authentication.


  • Brightmail Gateway 8.0 - Antivirus Policies
    This module describes how to configure Email Virus Policies in Brightmail Gateway 8.0. You learn how to configure settings for LiveUpdate and virus quarantine.


  • Brightmail Gateway 8.0 - Content Compliance Policy
    This module describes how to set up content compliance scanning in Brightmail Gateway 8.0. You also learn to use content compliance policies for structured data matching.


  • Brightmail Gateway 8.0 - Managing User and Host Configuration
    This module describes how to manage user and host configuration through Brightmail Gateway 8.0 Control Center.


  • Brightmail Gateway 8.0 - Managing Control Center Settings
    This module describes how to manage Brightmail Gateway 8.0 settings through Brightmail Gateway 8.0 Control Center.


  • Brightmail Gateway 8.0 - Using LDAP for Brightmail Gateway 8.0
    This module covers different LDAP services supported by Brightmail Gateway 8.0. You learn how to create and manage LDAP-based group policies.


  • Brightmail Gateway 8.0 - Managing Instant Messaging Filtering
    This module provides an introduction to IM filtering in Brightmail Gateway 8.0. You learn to create IM virus and IM spam policies.



Client Management Suite 7.1
  • CMS 7.1 Administration - Course Introduction
    In this module, you learn the course objectives, intended audience, and contents of the course.


  • CMS 7.1 Administration: Lesson 1 - Understanding Client Management Suite
    In this module, you learn the benefits of Client Management Suite, which solutions and components comprise Client Management Suite, how it can automate and streamline business processes in an organization, and how it can integrate with other products.


  • CMS 7.1 Administration: Lesson 2 - Installing Client Management Suite
    In this module, you learn about installation prerequisites and then learn the three-fold installation process: installing Symantec Installation Manager (SIM), installing Client Management Suite with Symantec Installation Manager.


  • CMS 7.1 Administration: Lesson 2 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 3 - Symantec Management Console
    In this module, you learn how to access the console, become familiar with the different views of the console, navigating the console to locate computers, policies, tasks and software, and view detailed information in each view.


  • CMS 7.1 Administration: Lesson 3 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 4 - Software Management Framework
    In this module, you learn how Client Management Suite leverages the Symantec Management Platform’s Software Management Framework to ensure that the correct software gets installed, how the Software Management Framework was designed to promote integration between solutions by providing a common way to identify, organize, and detect software, and what components make up the Software Management Framework.


  • CMS 7.1 Administration: Lesson 4 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 5 - Overview of Inventory Solution
    In this module, you learn about the different methods to gather inventory using Inventory Solution, and how to install and configure the necessary plug-ins needed to gather inventory.


  • CMS 7.1 Administration: Lesson 5 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 6 - Managing Inventory with Tasks and Policies
    In this module, you are introduced to the Inventory Portal. In addition, you learn how to create an Inventory Task and Policy to collect detailed and targeted inventory from managed computers.


  • CMS 7.1 Administration: Lesson 6 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 7 - Custom Inventory
    In this module, you learn how to create custom inventory data classes, tasks, scripts, and policies to view and report custom inventory. You also learn that custom inventory scripts use application programming interface objects and routines to create NSE files to pass information to the agent.


  • CMS 7.1 Administration: Lesson 7 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 8 - Using Baselines to Manage Computers
    In this module, you learn how to create and configure file and registry baseline tasks, use the Configuration Editor and Snapshot Editor, and view baseline inventory in the Resource Manager.


  • CMS 7.1 Administration: Lesson 8 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 9 - Software Delivery
    In this module, you learn the about the different methods to deliver software, how managed delivery is a policy-based delivery method that can be used to deliver multiple software resources with different tasks. You also learn the benefits of Quick Delivery and when to use it.


  • CMS 7.1 Administration: Lesson 9 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 10 - Managing and Delivering Software with other Tasks
    In this module, you learn how to update Windows Installer source paths and perform repairs. You also learn how to install applications into virtual layers with a managed software delivery policy and manage the layers with a task.


  • CMS 7.1 Administration: Lesson 10 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 11 - Using Application Metering to Manage Computers
    In this module, you learn how to create Application Metering policies and view and report Application Metering data. You also learn that Application Metering policies define the actions to perform when an application is started, and add applications to the Blacklisted Applications policy.


  • CMS 7.1 Administration: Lesson 11 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 12 - Software Portal
    In this module, you learn the benefits of the Software Portal for user self-service, how to request software using the software Portal and manage those requests. You also learn how to publish software to the portal and process user requests.


  • CMS 7.1 Administration: Lesson 12 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 13 - Patch Management
    In this module, you learn about Patch Management and how it works (Patch Management Workflow), and how to configure Patch Management Solution. You also learn install and manage the Software Update Agent.


  • CMS 7.1 Administration: Lesson 13 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 14 - Software Bulletins and Updates
    In this module, you learn about the importance of the Patch Remediation Center and its main functions, how to create and deploy updates using the Software Update policies, and what the responsibilities of the Software Update agent are and how to access this from the Symantec Management Agent.


  • CMS 7.1 Administration: Lesson 14 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 15 - Deployment Solution 7.1 SP1 Overview
    In this module, you become familiar with the purpose of Deployment Solution, how to configure Deployment Solution, and how to install the Deployment Solution Plug-in and automation folders.


  • CMS 7.1 Administration: Lesson 15 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 16 - Remote Assistance
    In this module, you learn how to install the Symantec pcAnywhere Solution and the plug-in on managed computers, the different methods to initiate a pcAnywhere session, and how pcAnywhere interacts with a remote computer. You also learn about Out of Bound Management and Real-Time System Manager to help manage computers.


  • CMS 7.1 Administration: Lesson 16 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • CMS 7.1 Administration: Lesson 17 - Reporting and Basic Troubleshooting
    In this module, you learn how to access reports, how to configure IT Analytics to view reports, create a custom report, and identify common reports. You also learn basic troubleshooting of Client Management Suite using common tools such as Event Viewer, the Log Viewer, and the log file.


  • CMS 7.1 Administration: Lesson 17 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.



Client Management Suite 7.0
  • Client Management Suite 7.0: Core Administration - Overview of Client Management Suite 7
    This module provides an overview of Client Management Suite 7, including the benefits, system requirements, installation requirements and how CMS can provide IT services to end users.


  • Client Management Suite 7.0: Core Administration - Software Management Framework
    This module discusses how the Software Management Framework promotes integration between solutions by providing a common way to identify, organize, and detect software and how it works within the Symantec Management Platform.


  • Client Management Suite 7.0: Core Administration - Installing and Configuring Software Management Solution
    This module describes the components of Software Management and the process to install and configure Software Management, its agents and plug-ins.


  • Client Management Suite 7.0: Core Administration - Managed Delivery
    This module will discuss the different methods to deliver software.


  • Client Management Suite 7.0: Core Administration - Quick Delivery
    This module covers Quick Delivery features including several delivery methods for deploying software packages to workstations.


  • Client Management Suite 7.0: Core Administration - Managing Software with Other Tasks
    This module will discuss managing software with other tasks including Quick Delivery and how to update Windows Installer source paths and perform repairs on Windows Installer applications. It also covers Installing applications into virtual layers with a managed software delivery policy and managing layers with tasks.


  • Client Management Suite 7.0: Core Administration - User Requests and Reports
    This module discusses user requests, reports and the steps to request and manage software using the Software Portal.


  • Client Management Suite 7.0: Core Administration - Installing and Configuring Inventory Solution
    This module covers installing and configuring Inventory Solution including components, activities, collection methods and data classes.


  • Client Management Suite 7.0: Core Administration - Managing and Using Inventory Tasks and Policies
    This module will discuss managing and using Inventory Tasks and Policies and covers key parts of the Inventory Portal that are used to gather a basic inventory. It also covers how to run detailed file Inventories, targeted software inventory policies and stand-alone inventory packages.


  • Client Management Suite 7.0: Core Administration - Managing Computers with Custom Inventory
    This module covers Custom Inventory and how to create and modify the custom inventory data classes used to store data. It also shows how to create and run a custom inventory task and how to set advanced options.


  • Client Management Suite 7.0: Core Administration - Using Baselines to Manage Computers
    This module describes Baseline Inventory and two strategies used in performing baseline inventories. It also covers how to create, configure and file baseline tasks using the File Baseline Configuration Editor and the File and Registration Baseline Snapshot Editors.


  • Client Management Suite 7.0: Core Administration - Using Application Metering to Manage Computers
    This module discusses how Application Policies are used to monitor and deny application. It also covers the types of data sent by Application Metering, how to view the data in the Resource Manager, and how to run Application Metering reports.


  • Client Management Suite 7.0: Core Administration - Patch Management Overview
    This module covers the main functions of Patch Management Solution. It also lists the prerequisites for upgrading or performing a new install and describes the flow of data Patch Management Solution uses.


  • Client Management Suite 7.0: Core Administration - Patch Management Configuration
    This module discusses Patch Management Configuration for the core, Microsoft Server Tasks, and the Software Update Agent. It also shows how to configure replication between multiple Notification Servers for Patch Management Solution.


  • Client Management Suite 7.0: Core Administration - Software Bulletins and Updates
    This module covers the Patch Remediation Center and the Software Update Wizard used to deploy Microsoft bulletins. It also shows how to create a Software Update Policy and how to access plug-ins using the Altiris Agent.


  • Client Management Suite 7.0: Core Administration - Reporting
    This module covers reports including the Patch Management for Windows compliance reports.



Cluster Server
  • I/O Fencing Enhancements in VCS 5.1
    This module describes enhancements to the I/O fencing method of data protection in a Veritas cluster environment. The new configuration utilities and fencing modes supported in VCS 5.1 are described, as well as the new coordination point server (CPS) implementation.


  • High Availability Design
    This module describes design principles for local high availability applications and wide-area disaster recovery solutions using Veritas clustering and replication products from Symantec.


  • VCS 5.1 for Windows - High Availability Concepts
    In this module, you learn about the merits of high availability in the data center environment and how clustering is used to implement high availability. You also learn how applications are managed in a high availability environment and about the key requirements in a clustering environment.


  • VCS 5.1 for Windows - VCS Building Blocks
    In this module, you learn about Veritas Cluster Server terminology and Veritas Cluster Server communication mechanisms. You also learn about the Veritas Cluster Server architecture.


  • VCS 5.1 for Windows - Preparing a Site for VCS
    In this module, you learn about VCS hardware and software requirements. You also learn how to gather cluster design information to prepare for the VCS installation.


  • VCS 5.1 for Windows - Installing VCS
    In this module, you learn how to install SFW HA by using the Symantec product installer and display the configuration files created during installation. You also learn how to view the VCS configuration created during installation and install the Cluster Manager Java Console.


  • VCS 5.1 for Windows - VCS Operations
    In this module, you learn how to perform common cluster administrative operations, manage applications under the control of VCS service groups, and manage resources within VCS service groups. You also learn to use the VCS simulator.


  • VCS 5.1 for Windows - VCS Configuration Methods
    In this module, you learn how to start and stop VCS. You also learn about the different types of configuration methods, as well as how to control access to VCS administration functions.


  • VCS 5.1 for Windows - Preparing Services for VCS
    In this module, you learn how to prepare applications for the VCS environment, perform one-time configuration tasks, and test applications before placing them under VCS control. You also learn how to stop resources and manually migrate an application.


  • VCS 5.1 for Windows - Online Configuration
    In this module, you learn how to configure service groups and add resources using the online configuration tools. You also learn how to resolve common configuration errors, and test the service group to ensure that it is correctly configured.


  • VCS 5.1 for Windows - Offline Configuration
    In this module, you learn how to perform offline configuration procedures and resolve common errors made during offline configurations. You also learn how to test the service group to ensure that it is correctly configured.


  • VCS 5.1 for Windows - Configuring Notification
    In this module, you learn how to configure a highly available notification service to ensure that the appropriate personnel are notified when certain events occur in the cluster. You also learn how to use triggers for notifications


  • VCS 5.1 for Windows - Handling Resource Faults
    In this module, you learn how VCS responds to resource faults, and the procedure to recover from resource faults. You also learn how to customize fault behavior by setting attributes that control VCS behavior, and configure fault notifications and triggers.


  • VCS 5.1 for Windows - Cluster Communications
    In this module, you learn about the components that enable cluster nodes to communicate over the network interconnect, and how VCS determines cluster membership. You also learn about cluster interconnect configuration and its functions.


  • VCS 5.1 for Windows - System and Communication Faults
    In this module, you learn about how VCS responds to system and cluster interconnect failures.


  • VCS 5.1 for Windows - Troubleshooting
    In this module, you learn how to monitor VCS operations and apply troubleshooting techniques in a VCS environment. You also learn how to create an archive of VCS related files.


  • VCS 5.1 for Windows - Clustering Applications
    In this module, you learn about how application services work in a highly available environment, and how agents manage applications in a VCS cluster. You also learn about the VCS bundled GenericService and ServiceMonitor agents.


  • VCS 5.1 for Windows - Clustering SQL Server
    In this module, you learn about the guidelines and procedures for installing Microsoft SQL Server in a Veritas cluster environment. You also learn about the installation and configuration of the VCS database agent for SQL Server 2005.


  • VCS 5.1 for Windows - Clustering Exchange Server
    In this module, you learn about the guidelines and procedures for installing Microsoft Exchange server in a Veritas cluster environment. You also learn about installation and configuration of the VCS application agent for Exchange server.


  • VCS 5.1 for Windows - Clustering File Shares
    In this module, you learn about the recommended practice to prepare resources and manually test file share services before configuring a File Share service group. You also learn about the VCS resources for managing file shares and the FileShare configuration wizard.


  • VCS 5.1 for Windows - Reconfiguring Cluster Membership
    In this module, you learn how to remove and add nodes to existing clusters. You also learn how to merge two running clusters.


  • VCS 5.1 for Windows - Service Group Dependencies
    In this module, you learn about common example application relationships, service group dependencies and their example uses. You also learn how to configure service group dependencies and alternative methods for controlling service group interactions.


  • VCS 5.1 for Windows - Startup and Failover Policies
    In this module, you learn about the rules and policies for service group startup and failover. You also learn to use limits and prerequisites to control service group startup and failover, and use the simulator to model startup and failover policies.


  • VCS 5.1 for Windows - Data Center Availability
    In this module, you learn how to manage multiple clusters on different platforms and how to manage enterprise storage. You also learn how to improve disaster recovery and Enterprise message management.


  • VCS 5.0 MP3 for Solaris: Install & Config--Course Introduction (1 of 16)
    This module describes the overall course organization and resources.


  • VCS 5.0 MP3 for Solaris: Install & Config: High Availability Concepts (2 of 16)
    In this module, you learn fundamental concepts of high availability environments, focusing on clustering technologies.


  • VCS 5.0 MP3 for Solaris: Install & Config: VCS Building Blocks (3 of 16)
    In this module, you learn Veritas Cluster Server terminology to enable you to understand the basic components of a cluster. The relationship between these building blocks shows how the VCS architecture implements high availability.


  • VCS 5.0 MP3 for Solaris: Install & Config: Preparing a Site for VCS (4 of 16)
    In this module, you learn how to prepare to install VCS and configure the cluster environment. Software and hardware requirements and recommendations are discussed, as well as tools for analyzing environments.


  • VCS 5.0 MP3 for Solaris: Install & Config: Installing VCS (5 of 16)
    In this module, you learn how to install and configure VCS using the Common Product Installer. By viewing key configuration file examples, you see how your selections are used by the CPI to create the VCS implementation.


  • VCS 5.0 MP3 for Solaris: Install & Config: VCS Operations (6 of 16)
    In this module, you learn how to use VCS tools to perform common operations on service group resources. This module also describes how you can use the VCS Simulator to learn how to manage clusters.


  • VCS 5.0 MP3 for Solaris: Install & Config: VCS Configuration Methods (7 of 16)
    In this module, you learn how to start and stop VCS. You also see an overview of different types of configuration methods, as well as how to control access to VCS administration functions.


  • VCS 5.0 MP3 for Solaris: Install & Config: Preparing Resources for VCS (8 of 16)
    In this module, you learn how to prepare the hardware and software resources to be placed under VCS control. Following the recommended practice ensures that you can perform an effective and efficient VCS configuration.


  • VCS 5.0 MP3 for Solaris: Install & Config: Online Configuration (9 of 16)
    In this module, you learn how to configure service groups and resources in a running VCS cluster. Examples of several resources are shown using the Java graphical user interface and the command-line interface.


  • VCS 5.0 MP3 for Solaris: Install & Config: Offline Configuration (10 of 16)
    In this module, you learn how to configure service groups and resources by editing the cluster configuration file and restarting cluster services.


  • VCS 5.0 MP3 for Solaris: Install & Config: Configuring Notification (11 of 16)
    In this module, you learn how to configure a highly available notification service to ensure that the appropriate personnel are notified when certain events occur in the cluster.


  • VCS 5.0 MP3 for Solaris: Install & Config: Handling Resource Faults (12 of 16)
    In this module, you learn how VCS responds to faulted resources. You also learn how to customize fault behavior by adjusting attributes that control VCS behavior.


  • VCS 5.0 MP3 for Solaris: Install & Config: Cluster Communications (13 of 16)
    In this module, you learn about the components that enable cluster nodes to communicate over the network interconnect. Cluster membership formation is described as a key protection mechanism during startup and failover events.


  • VCS 5.0 MP3 for Solaris: Install & Config: System and Communication Failures (14 of 16)
    In this module, you learn how VCS responds to system and communication faults in cluster environments that do not implement fencing.


  • VCS 5.0 MP3 for Solaris: Install & Config: I/O Fencing (15 of 16)
    In this module, you learn how the I/O fencing implementation in VCS protects data on shared storage. I/O fencing is the recommended method for data protection.


  • VCS 5.0 MP3 for Solaris: Install & Config: Troubleshooting (16 of 16)
    In this module, you learn how to monitor VCS and determine causes of problems. You also learn which VCS files must be included in standard system backups, and how to create a snapshot of the VCS software environment.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Introduction (1 of 10)
    This module describes the organization of the VCS Cluster Management course.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Reconfiguring Cluster Membership (2 of 10)
    In this module, you learn how to remove and add nodes to existing clusters. You also learn how to merge running clusters. This workshop module reinforces all concepts and practices presented in other VCS modules.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Service Group Dependencies (3 of 10)
    In this module, you learn how to enforce application relationships using service group dependencies. You also learn alternative methods for controlling service group behavior in situations where service group dependencies are not applicable.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Startup and Failover Policies (4 of 10)
    In this module, you learn how to use policies to control how VCS starts up and fails over service groups. You also learn how to use the Simulator to model behavior, ensuring that your configuration is correct before implementing policies in a real-world environment.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Multiple Network Interfaces (5 of 10)
    In this module, you learn how to configure redundant network interfaces for improved high availability of network services. You also learn about alternative network configurations using parallel service groups, as well as Proxy and Phantom resources.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Data Center Availability (6 of 10)
    In this module, you learn about additional administrative tools for managing enterprise cluster environments.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Example App Configurations-Introduction (7 of 10)
    This module describes the organization of the VCS Example Application Configurations course.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Example App Configurations-Ex 1: Cluster Apps (8 of 10)
    In this module, you learn how agents are used to make applications highly available. You learn how to configure the Application agent supplied with VCS, and other agents available for specific applications.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Example App Configurations-Ex 2: Clustering Databases (9 of 10)
    In this module, you learn how agents are used to make databases highly available. You learn how to configure the Oracle agent supplied with VCS, and other agents available for specific databases.


  • VCS 5.0 MP3 for Solaris: Manage & Admin-Example App Configurations-Ex 3: Clustering NFS Shares (10 of 10)
    In this module, you learn how to configure the NFS and Share agents to manage NFS shared file systems. You also learn how to configure the NFSRestart agent for lock reclamation after a failover.



Cluster Server 6
  • VCS 6.0 for UNIX: Manage & Admin – Example App Config – Course Introduction (1 of 4)
    This module provides an overview of the courseware.


  • VCS 6.0 for UNIX: Manage & Admin – Example App Config: Lesson 1 – Clustering Applications (2 of 4)
    In this module, you learn how agents are used to make applications highly available. You learn how to configure the Application agent supplied with VCS, and other agents available for specific applications.


  • VCS 6.0 for UNIX: Manage & Admin – Example App Config: Lesson 2 – Clustering Databases (3 of 4)
    In this module, you learn how agents are used to make databases highly available. You learn how to configure the Oracle agent supplied with VCS, and other agents available for specific databases.


  • VCS 6.0 for UNIX: Manage & Admin - Example App Config: Lesson 3 - Clustering NFS Shares (4 of 4)
    In this example lesson you learn about clustering NFS shares, and are introduced to the VCS share and NFS resource types, including preparing NFS for high availability.


  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Introduction (1 of 8)
    This module describes prerequisites for completing this courseware and provides an overview of the course topics.


  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: VMware vSphere High Availability Architecture (2 of 8)
    This topic describes the architecture of the VMware vSphere datacenter environment.


  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Symantec High Availability Architecture in VMware (3 of 8)
    This topic describes the Symantec architecture for supporting high availability in VMware environments.


  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Deploying Symantec HA in VMware (4 of 8)
    In this topic, you learn to install the Symantec HA Console and deploy Veritas Cluster Server in virtual machines.


  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Configuring Availability Using the HA Console (5 of 8)
    This topic describes how to use configuration wizards in the HA Console to configure high availability for common applications.


  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Symantec High Availability Operations (6 of 8)
    In this topic, you learn how to use the HA Console to monitor applications and perform cluster operations.


  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Configuring Other VCS Agents (7 of 8)
    This topic describes how to configure other agents for managing applications on virtual machines.


  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Other Symantec High Availability Solutions (8 of 8)
    In this module, you learn about other high availability solutions from Symantec that are supported in VMware environments.


  • Virtual Business Service
    This module discusses how to use the new Virtual Business Services feature, which is based on both Veritas Cluster Server 6.0 and Veritas Operations Manager 4.1, to manage multi-tier applications in a heterogeneous environment. In this module, you learn how to install and configure all the components needed for the VBS feature and how to use the new dependency types to configure the fault policy and behavior desired for the multi-tier application. You also learn how to configure a DR VBS pair, how to switch the production VBS to the DR site when necessary, and how to use the audit trails and logs available to you to support the VBS environment.


  • VCS 6.0 Win: Install and Config: High Availability and Clustering Concepts (1 of 14)
    In this module, you learn fundamental concepts of high availability environments, focusing on clustering technologies.


  • VCS 6.0 Win: Install and Config: VCS Building Blocks (2 of 14)
    In this module, you learn Veritas Cluster Server terminology to enable you to understand the basic components of a cluster. The relationship between these building blocks shows how the VCS architecture implements high availability.


  • VCS 6.0 Win: Install and Config: Preparing a Site for VCS (3 of 14)
    In this module, you learn how to prepare to install VCS and configure the cluster environment. The module discusses software and hardware requirements and recommendations and the licensing scheme.


  • VCS 6.0 Win: Install and Config: Installing and Upgrading VCS (4 of 14)
    In this module, you learn how to install and configure VCS using the product installer. By viewing key configuration file examples, you see how your selections are used by the product installer to create the VCS implementation. The module also discusses the various upgrade paths and rolling upgrade.


  • VCS 6.0 Win: Install and Config: VCS Operations (5 of 14)
    In this module, you learn how to use VCS tools to perform common operations on service group resources. This module also describes how you can use the VCS Simulator to learn how to manage clusters.


  • VCS 6.0 Win: Install and Config: VCS Configuration Methods (6 of 14)
    In this module, you learn how to start and stop VCS. The module also provides an overview of different types of configuration methods and controlling access to VCS administration functions.


  • VCS 6.0 Win: Install and Config: Preparing Services for VCS (7 of 14)
    In this module, you learn how to prepare the hardware and software resources to be placed under VCS control. You also learn how to test the application service and stop and migrate an application service.


  • VCS 6.0 Win: Install and Config: Online Configuration (8 of 14)
    In this module, you learn how to configure service groups and resources in a running VCS cluster. Examples of several resources are shown using graphical, and command-line interfaces. You also learn how to solve common configuration errors and testing the service group.


  • VCS 6.0 Win: Install and Config: Offline Configuration (9 of 14)
    In this module, you learn how to configure service groups and resources by editing the cluster configuration file and restarting cluster services. You also learn how to solve common configuration errors and testing the service group.


  • VCS 6.0 Win: Install and Config: Configuring Notification (10 of 14)
    In this module, you learn how to configure a highly available notification service to ensure that the appropriate personnel are notified when certain events occur in the cluster.


  • VCS 6.0 Win: Install and Config: Handling Resource Faults (11 of 14)
    In this module, you learn about Intelligent Resource Monitoring (IMF). In addition, you also learn how VCS responds to faulted resources. You also learn how to customize fault behavior by adjusting attributes that control VCS behavior.


  • VCS 6.0 Win: Install and Config: Cluster Communications (12 of 14)
    In this module, you learn about the components that enable cluster nodes to communicate over the network interconnect. Cluster membership formation is described as a key protection mechanism during startup and failover events.


  • VCS 6.0 Win: Install and Config: System and Communication Faults (13 of 14)
    In this module, you learn about system failures and cluster interconnect failures.


  • VCS 6.0 Win: Install and Config: Monitoring and Troubleshooting (14 of 14)
    In this module you learn about monitoring VCS, troubleshooting VCS, and archiving VCS related file.


  • VCS 6.0 Win: Manage and Admin Example: Clustering Applications (1 of 8)
    In this module, you learn about the application service, VCS agents for managing applications, GenericService agent, and serviceMonitor agent.


  • VCS 6.0 Win: Manage and Admin Example: Clustering File Shares (2 of 8)
    In this module, you learn how to prepare file shares for high availability. In addition, you learn about the VCS resources for managing file shares and configuring file shares.


  • VCS 6.0 Win: Manage and Admin Example: Clustering Exchange Server (3 of 8)
    In this module, you learn about the VCS Database Agent for Exchange Server 2010 and supported Exchange Server configurations for high availability. In addition, you learn to install Exchange Server in a VCS environment and configure an Exchange Service Group.


  • VCS 6.0 Win: Manage and Admin Example: Clustering SQL Server (4 of 8)
    In this module, you learn about the SQL server in the VCS Environment, VCS Agents for SQL Server 2008, managing registry keys, installing SQL Server in the cluster, configuring a SQL Server Service Group, and monitoring databases.


  • VCS 6.0 Win: Manage and Admin Example: Clustering SharePoint Server (Optional) (5 of 8)
    In this module you learn how to install SharePoint Server 2010 in a SFW HA 6.0 cluster environment and configure SharePoint Server service groups. You also learn how to verify the SharePoint cluster configuration.


  • VCS 6.0 Win: Manage and Admin Cluster Management Lesson 1: Service Group Dependencies (6 of 8)
    In this module, you learn how to enforce application relationships using service group dependencies. You also learn about methods for controlling service group behavior.


  • VCS 6.0 Win: Manage and Admin Cluster Management Lesson 2: Startup and Failover Policies (7 of 8)
    In this module, you learn how to use policies to control how VCS starts up and fails over service groups. You also learn how to use the Simulator to model behavior, ensuring that your configuration is correct before implementing policies in a real-world environment.


  • VCS 6.0 Win: Manage and Admin Cluster Management Lesson 3: Managing Data Centers (8 of 8)
    In this module, you learn about the Veritas Operations Manager. You also learn to install and use Veritas Operations Manager.


  • VCS 6.0 for UNIX: Install & Config: Lesson 2 – VCS Building Blocks (3 of 16)
    In this module, you learn Veritas Cluster Server terminology to enable you to understand the basic components of a cluster. The relationship between these building blocks shows how the VCS architecture implements high availability.


  • VCS 6.0 for UNIX: Install & Config: Course Introduction (1 of 16)
    This module provides an overview of the courseware.


  • VCS 6.0 for UNIX: Install & Config: Lesson 1 – High Availability Concepts (2 of 16)
    In this module, you learn fundamental concepts of high availability environments, focusing on clustering technologies.


  • VCS 6.0 for UNIX: Install & Config: Lesson 3 – Preparing a Site for VCS Implementation (4 of 16)
    In this module, you learn how to prepare to install VCS and configure the cluster environment. Software and hardware requirements and recommendations are discussed, as well as tools for analyzing environments.


  • VCS 6.0 for UNIX: Install & Config: Lesson 4 – Installing VCS (5 of 16)
    In this module, you learn how to install and configure VCS using the Common Product Installer. By viewing key configuration file examples, you see how your selections are used by the CPI to create the VCS implementation.


  • VCS 6.0 for UNIX: Install & Config: Lesson 5 – VCS Operations (6 of 16)
    In this module, you learn how to use VCS tools to perform common operations on service group resources. This module also describes how you can use the VCS Simulator to learn how to manage clusters.


  • VCS 6.0 for UNIX: Install & Config: Lesson 6 – VCS Configuration Methods (7 of 16)
    In this module, you learn how to start and stop VCS. You also see an overview of different types of configuration methods, and you learn how to control access to VCS administration functions.


  • VCS 6.0 for UNIX: Install & Config: Lesson 7 – Preparing Services for High Availability (8 of 16)
    In this module, you learn how to prepare the hardware and software resources to be placed under VCS control. Following the recommended practice ensures that you can perform an effective and efficient VCS configuration.


  • VCS 6.0 for UNIX: Install & Config: Lesson 8 – Online Configuration (9 of 16)
    In this module, you learn how to configure service groups and resources in a running VCS cluster. Examples of several resources are shown using the Java graphical user interface and the command-line interface.


  • VCS 6.0 for UNIX: Install & Config: Lesson 9 – Offline Configuration (10 of 16)
    In this module, you learn how to configure service groups and resources by editing the cluster configuration file and restarting cluster services.


  • VCS 6.0 for UNIX: Install & Config: Lesson 10 – Configuring Notification (11 of 16)
    In this module, you learn how to configure a highly available notification service to ensure that the appropriate personnel are notified when certain events occur in the cluster.


  • VCS 6.0 for UNIX: Install & Config: Lesson 11 – Handling Resource Faults (12 of 16)
    In this module, you learn how VCS responds to faulted resources. You also learn how to customize fault behavior by adjusting attributes that control VCS behavior.


  • VCS 6.0 for UNIX: Install & Config: Lesson 12 – Intelligent Monitoring Framework (13 of 16)
    In this module, you learn about how the Asynchronous Monitoring Framework is used to perform intelligent monitoring of select resources.


  • VCS 6.0 for UNIX: Install & Config: Lesson 13 – Cluster Communications (14 of 16)
    In this module, you learn about the components that enable cluster nodes to communicate over the network interconnect. You also learn about cluster membership and how VCS responds to system and communication faults in cluster environments that do not implement fencing.


  • VCS 6.0 for UNIX: Install & Config: Lesson 14 – Data Protection Using SCSI 3-Based Fencing (15 of 16)
    In this module, you learn how the I/O fencing implementation in VCS protects data on shared storage. I/O fencing is the Symantec-recommended method for data protection.


  • VCS 6.0 for UNIX: Install & Config: Lesson 15 – Coordination Point Server (16 of 16)
    In this module, you learn how to implement data protecting using server-based coordination points.


  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt – Course Introduction (1 of 6)
    This module provides an overview of the courseware.


  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 1 – Service Group Dependencies (2 of 6)
    In this module, you learn how to enforce application relationships using service group dependencies. You also learn alternative methods for controlling service group behavior in situations where service group dependencies are not applicable.


  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 2 – Reconfiguring Cluster Memberships (3 of 6)
    In this module, you learn how to add nodes to existing clusters. You also learn how to merge running clusters. This module reinforces all concepts and practices presented in other VCS modules.


  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 3 – Startup and Failover Policies (4 of 6)
    In this module, you learn how to use policies to control how VCS starts up and fails over service groups. You also learn how to use the Simulator to model behavior, ensuring that your configuration is correct before implementing policies in a real-world environment.


  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 4 – Alternate Network Configurations (5 of 6)
    In this module, you learn how to configure redundant network interfaces for improved high availability of network services. You also learn about alternative network configurations using parallel service groups, as well as Proxy and Phantom resources.


  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 5 – High Availability in the Enterprise (6 of 6)
    In this module, you learn about additional administrative tools for managing enterprise cluster environments. You also learn about high availability and disaster recovery for virtual environments.



CommandCentral Storage
  • CC Storage 5.2: Troubleshooting Basics (1 of 4)
    In this module, you learn how to view CommandCentral Storage diagnostic information and gather and interpret CommandCentral Storage logs. You also learn about the generic CommandCentral Storage troubleshooting methodology. Finally, you learn about CommandCentral Storage limitations and features that are no longer supported.


  • CC Storage 5.2: Troubleshooting Installation Issues (2 of 4)
    In this module, you learn to describe the CommandCentral Storage installation footprints. You also learn to troubleshoot CommandCentral Storage installation issues. Finally, you learn to interpret CommandCentral Storage installation logs.


  • CC Storage 5.2: Troubleshooting Discovery Issues (3 of 4)
    In this module, you learn how to troubleshoot CommandCentral Storage host discovery issues. You also learn about using HAL commands to troubleshoot hosts and explorer discovery issues. Finally, you learn about the Unified Agent basics and the steps to isolate Unified Agent issues.


  • CC Storage 5.2: Troubleshooting Reports, User Management, and Monitoring Issues (4 of 4)
    In this module, you learn about the common issues encountered when working with CommandCentral Storage reports. You also learn about troubleshooting user management issues and monitoring issues. Finally, you learn how to troubleshoot issues related to CommandCentral Storage new features and enhancements.


  • CC Storage 5.2 - Storage Resource Management Fundamentals
    In this module, you learn about storage resource management and challenges to storage resource management. You also learn that organizations spend large portions of their IT budgets to equip and manage storage facilities. In addition, you learn that implementing a phased approach is necessary to move your storage enterprise toward the goals established by the framework you choose.


  • CC Storage 5.2 - Introduction to CommandCentral
    In this module, you learn how CommandCentral conforms to the phased management approach to storage resource management. You also learn about each major component of CCS 5.2 and its features and functionality.


  • CC Storage 5.2 - Installing and Upgrading the Management Server
    In this module, you learn about the prerequisites and dependencies for installing the CommandCentral Storage server components. You also learn how to install, upgrade, and configure the CommandCentral Storage Management Server, Storage Change Manager, and the Agent Push Install Utility. Finally, you learn about the new licensing scheme for CommandCentral Storage 5.2.


  • CC Storage 5.2 - Working with the CommandCentral Interface
    In this module, you learn how to navigate through the GUI to access CCS functionality. You also learn about the console displays and where to find the information you need.


  • CC Storage 5.2 - Installing CommandCentral Agents
    In this module, you learn how to install, configure, and upgrade Standard Agents. You also learn how to install and configure Unified Agents and Control Hosts. In addition, you learn how to use both the GUI installer on Windows and the command-line interface on UNIX and Linux.


  • CC Storage 5.2 - Discovering Hosts Using CommandCentral Storage 5.2
    In this module, you learn about Command Central Storage’s host discovery mechanisms, which include agentless and agent-based mechanisms. You also learn about the types of agentless and agent-based discovery methods.


  • CC Storage 5.2 - Creating and Managing Policies
    In this module, you learn about the elements of a policy and how policies function in CommandCentral. You also learn how to administer policies in CommandCentral Storage. Finally, you learn about the functionality that policies provide in Storage Change Manager.


  • CC Storage 5.2 - Monitoring Storage Environments Using CCS 5.2
    In this module, you learn how CommandCentral monitors the storage enterprise and the items that it monitors. You also learn how CCS gathers data.


  • CC Storage 5.2 - Generating Reports Using CCS 5.2
    In this module, you learn to manage predefined reports. You also learn to create and manage custom and ad hoc reports. Finally, you learn about the CommandCentral Storage 5.2 enhancements to support enhanced reporting.


  • CC Storage 5.2 - Managing Users and Security Mechanisms
    In this module, you learn about Authentication and Authorization services and database security. You also learn how to add and modify users and roles within CommandCentral, and create Credential Groups.


  • CC Storage 5.2 - Managing Server Components
    In this module, you learn about server components. You also learn to manage and diagnose devices and explorers. Finally, you learn to back up and restore databases and configuration.


  • CC Storage 5.2 - Working with the Enterprise Reporter
    In this module, you learn about Enterprise Reporter functionality and security. You also learn about Enterprise Reporter architecture, components, installation, and how to configure a data rollup. Finally, you learn about reports and dashboards.


  • CC Storage 5.2 - Miscellaneous Enhancements
    In this module, you learn about the CommandCentral Storage 5.2 support for Solaris Zones and Solaris ZFS file systems. You also learn about the information CommandCentral Storage gathers after it discovers ESX servers and virtual machines. Finally, you learn about the enhancements made to CommandCentral Storage 5.2 for IBM XIV Storage Systems, Netapp Deduplication, and Thin Provisioning.


  • CC Storage Enterprise Reporter 5.2 - Introduction
    In this module, you learn about storage resource management and challenges to storage resource management. You also learn about the CommandCentral family and how it conforms to the phased management approach. Finally, you learn about the main components in CommandCentral Enterprise Reporter 5.2.


  • CC Storage Enterprise Reporter 5.2 - Installing and Upgrading
    In this module, you learn about the prerequisites and dependencies for installing Enterprise Reporter. You also learn the procedure to configure the Oracle database instance used by Enterprise Reporter. Finally, you learn how to install and upgrade Enterprise Reporter 5.2.


  • CC Storage Enterprise Reporter 5.2 - Configuring and Managing
    In this module, you learn how to configure data rollup, business views, and storage tiers. You also learn how to manage user accounts and user groups in Enterprise Reporter.


  • CC Storage Enterprise Reporter 5.2 - Generating Reports
    In this module, you learn about the different types of reports that can be created using CommandCentral Enterprise Reporter. You also learn how to create a Sample Report and create and modify an Ad-Hoc Report. Finally, you learn how to create an Advanced Report using Report Studio and create and modify Business Views.


  • CC Storage Enterprise Reporter 5.2 - New Features and Enhancements
    In this module, you learn about the new features and enhancements made to Enterprise Reporter. You also learn about the various technologies and virtualization systems that Enterprise Reporter supports. Finally, you learn about reclamation reports and their use.


  • CC Storage Change Manager 5.2 - Introduction
    In this module, you learn about storage resource management and challenges to storage resource management. You also learn about the CommandCentral family and how it conforms to the phased management approach. Finally, you learn about the main components in CommandCentral Storage Change Manager 5.2.


  • CC Storage Change Manager 5.2 - Installing
    In this module, you learn about the prerequisites and dependencies for installing the Storage Change Manager. You also learn how to install the Storage Change Manager.


  • CC Storage Change Manager 5.2 - Working with the Interface
    In this module, you learn about the Storage Change Manager’s graphical user interface. You also learn how to navigate through the various panes in Storage Change Manager to view the necessary information.


  • CC Storage Change Manager 5.2 - Monitoring Changes
    In this module, you learn about the change monitoring process in Storage Change Manager and how to monitor storage resources using custom policies. You also learn how to manage custom policies violations and use best practice policies.


  • CC Storage Change Manager 5.2 - Working with Reports
    In this module, you learn about the default reports that are shipped along with Storage Change Manager. You also learn how to customize reports, export report data, and archive reports. Finally, you learn how to create Ad-Hoc Reports.


  • CC Storage 5.2 – Differences: What's New in Veritas CommandCentral Storage 5.2
    In this module, you learn about the new features and enhancements in CommandCentral Storage 5.2. You also learn about the CommandCentral Storage 5.2 deployment environment and its key components.


  • CC Storage 5.2 – Differences: Installing Veritas CommandCentral Storage 5.2
    In this module, you learn about the guidelines and the procedure to install CommandCentral Storage 5.2 and its components. You also learn about the upgrade paths and the procedure to upgrade to CommandCentral Storage 5.2.


  • CC Storage 5.2 – Differences: Agentless Host Discovery
    In this module, you learn about the agentless discovery process and its benefits and methods. You also learn how to perform an agentless discovery using the Management Server and using discovery scripts on the host. The module also discusses the impact of agentless hosts on CommandCentral Storage reports and the limitations of the agentless discovery process.


  • CC Storage 5.2 – Differences: Working with Control Hosts
    In this module, you learn about the methods that CommandCentral Storage offers to discover hosts and Control Host fundamentals. You also learn how to install and configure a Control Host.


  • CC Storage 5.2 – Differences: Discovering Solaris Zones
    In this module, you learn about Solaris Zones and CommandCentral Storage 5.2 support for the Solaris Zones. You also learn about the setup requirements for the Solaris Zones and known issues related to CommandCentral Storage reports for Solaris Zones.


  • CC Storage 5.2 – Differences: Discovering VMware Environments
    In this module, you learn about CommandCentral Storage support for VMware environments and the information that CommandCentral Storage gathers by performing an agentless or agent-based discovery of virtual machines. You also learn how to configure CommandCentral Storage to discover ESX servers.


  • CC Storage 5.2 – Differences: Discovering Solaris ZFS File Systems
    In this module, you learn about the ZFS file system and CommandCentral Storage 5.2 support for the ZFS files system. You also learn about the setup requirements for the ZFS file system.


  • CC Storage 5.2 – Differences: Miscellaneous New Features and Enhancements
    In this module, you learn how to discover Storage Foundation Hosts using the Unified Agent. The module also discusses the enhancements made to Thin Provisioning and reporting in CommandCentral Storage 5.2. You also learn about CommandCentral Storage support for IBM XIV Storage Systems and Netapp Deduplication.


  • CC Storage 5.1 - Concepts
    This module provides an overview of storage resource management, including challenges facing administrators, and a phased approach to effective storage management.


  • CC Storage 5.1 - Product Overview
    This module introduces the CommandCentral Storage family and how it is used to implement the phased management approach. It describes CommandCentral components, features and functionality.


  • CC Storage 5.1 - Walk Through the Interface
    This module demonstrates the user interface functionality, and how to navigate the gui to locate specific information.


  • CC Storage 5.1 - Server Installation and Upgrade
    This module lists prerequisites and dependencies for the management server. It demonstrates how to install, remove, and upgrade the management server.


  • CC Storage 5.1 - Managed Host Installation
    This module lists managed host prerequisites and dependencies, and demonstrates how to install, configure, upgrade, and remove managed hosts.


  • CC Storage 5.1 - Policies
    This module introduces and describes policies, and demonstrates how they are used in CommandCentral Storage and Storage Change Manager.


  • CC Storage 5.1 - Monitoring
    This module discusses what is monitored, how monitoring is performed, and how to configure and use the Data Module and Data Module Importer.


  • CC Storage 5.1 - Reporting
    This module demonstrates how to use predefined reports and how to create ad hoc reports.


  • CC Storage 5.1 - Managing Users and Security
    This module describes CommandCentral security and how to manage it. It also demonstrates user creation and management.


  • CC Storage 5.1 - Managing Server Components
    This module lists and discusses server components, including managing, and diagnosing problems with devices and explorers. It also demonstrates backup and restore functionality using CommandCentral utilities.


  • CC Storage 5.1 - Enterprise Reporter
    This module describes Enterprise Reporter, its architecture, and functionality. It also demonstrates Enterprise Reporter installation, configuration and operation.



Control Compliance Suite
  • CCS 11.0: Admin: Course Introduction (1 of 17)
    This module introduces the CCS 11.0 Admin course.


  • CCS 11.0: Admin: Introduction to CCS 11.0 (2 of 17)
    This module presents an overview of compliance and what is new in CCS 11.0.


  • CCS 11.0: Admin: Installing the CCS Suite (3 of 17)
    In this module, you learn how to install CCS 11.0.


  • CCS 11.0: Admin: Upgrading the CCS Suite (4 of 17)
    In this lesson, you learn how to upgrade to CCS 11.0.


  • CCS 11.0: Admin: Installing and Upgrading the CCS Managers and Agents (5 of 17)
    In this module, you learn how to install and upgrade CCS Managers and Agents.


  • CCS 11.0: Admin: Initial Configuration (6 of 17)
    In this module, you learn how to get started with CCS 11.0 and prepare for data collection.


  • CCS 11.0: Admin: Getting started with CCS 11.0 (7 of 17)
    In this module, you learn how to import assets, collect and evaluate data, and manage exceptions.


  • CCS 11.0: Admin: Standards Manager (8 of 17)
    In this module, you learn how to work with standards, assess compliance with standards, and manage exceptions.


  • CCS 11.0: Admin: Policy Manager (9 of 17)
    In this module, you learn how to create policies, describe the policy life cycle, and manage policy compliance.


  • CCS 11.0: Admin: Controls Studio (10 of 17)
    In this module, you learn how to use Controls Studio.


  • CCS 11.0: Admin: Response Assessment Module (11 of 17)
    In this module, you learn how to use the Response Assessment module and evaluate results.


  • CCS 11.0: Admin: SCAP (12 of 17)
    In this module, you learn SCAP capabilities and how to work with SCAP benchmarks.


  • CCS 11.0: Admin: Ad Hoc Queries (13 of 17)
    In this module, you learn how to perform query building and how to query your enterprise.


  • CCS 11.0: Admin: Reporting and Dashboards (14 of 17)
    In this module, you learn how to work with dynamic dashboards and manage reports.


  • CCS 11.0: Admin: Vulnerability Manager (15 of 17)
    In this module, you learn how to import data into CCS and view vulnerability assessment data.


  • CCS 11.0: Admin: Risk Manager (16 of 17)
    In this module, you learn how to use the Risk Management Module and perform remediation.


  • CCS 11.0: Admin: External Data Systems (17 of 17)
    In this module, you learn how to connect to external data sources, Symantec products. This module also introduces third-party connectors.


  • CCS 11.0: Vulnerability Manager- Introducing Vulnerability Manager (1 of 2)
    In this module, you learn what Vulnerability Manager is, how it can help you ensure the security of your enterprise by discovering assets and detecting, reporting, and managing vulnerabilities. You also learn how to install, configure, manage, and update Vulnerability Manager.


  • CCS 11.0: Vulnerability Manager- Working with Vulnerability Manager (2 of 2)
    In this module, you learn to configure sites and asset groups, perform discovery and vulnerability scans, manage reports, remediation ticketing, and exceptions within your networks.


  • CCS 10.5 Administration: Introduction
    The Symantec Control Compliance Suite (CCS) 10.5 Administration e-learning modules are designed for professionals who are tasked with supporting, architecting, implementing, and monitoring of the Control Compliance Suite 10.5 product. These self-paced e-learning modules cover installing and managing Control Compliance Suite 10.5 and its data collectors that interface with the Control Compliance Suite 10.5. These modules also include demonstrations that enable you to test your new skills and begin to transfer those skills into your working environment.


  • CCS 10.5 Administration: Introducing Compliance (1 of 16)
    This module describes compliance concepts and how challenges to compliance are managed using CCS 10.5. You also describe some of the core functions and view how CCS 10.5 is architected logically.


  • CCS 10.5 Administration: Symantec Data Collectors (2 of 16)
    This module introduces you to the Symantec data collectors that integrate with Symantec Control Compliance Suite 10.5. Data collectors include Symantec Risk Management System (RMS), Symantec Enterprise Security Manager (ESM), Symantec Response Assessment Manager (RAM), Symantec Data Loss Prevention (DLP) Connector, and Symantec Altiris Service Desk 7 Connector.


  • CCS 10.5 Administration: Installing and Configuring the Risk Management System (3 of 16)
    This module describes best practices for planning an RMS deployment that includes the RMS console and Information server with various bv-Control product snap-ins. The module also describes how to install the RMS console, Information server, and bv-Control products.


  • CCS 10.5 Administration: Configuring RMS Components (4 of 16)
    This module describes how to configure bv-Control products and use bv-config to help manage your Windows environment. bv-Control products include bv-Control for Windows, bv-Control for Microsoft Exchange, bv-Control for Microsoft SQL Server, and bv-Control for UNIX.


  • CCS 10.5 Administration: Using RMS (5 of 16)
    This module describes how to navigate the RMS console and use the features provided by the RMS console, such as running queries, performing baselines, and managing tasks.


  • CCS 10.5 Administration: RMS Queries (6 of 16)
    This module describes how to build and use queries. You also learn how to run and fine tune queries using advanced query features.


  • CCS 10.5 Administration: Using bv-Control (7 of 16)
    This module describes how to audit your environment using one or more bv-Control products.


  • CCS 10.5 Administration: Installing and Configuring Enterprise Security Manager (8 of 16)
    This module describes how to install and configure Enterprise Security Manager (ESM) and ESM agent for use with CCS 10.5. The module also describes how to create and execute batch files to semi-automate and streamline ESM processes.


  • CCS 10.5 Administration: Installing Control Compliance Suite 10.5 (9 of 16)
    This module describes general predeployment considerations and preinstallation requirements. You also learn how to install or upgrade to CCS 10.5 and describe how to perform a silent installation.


  • CCS 10.5 Administration: Configuring Control Compliance Suite (10 of 16)
    This module describes how to perform the initial Control Compliance Suite 10.5 configuration. Initial tasks include registering the DPS, creating asset folders, creating reconciliation rules, creating asset import jobs, creating collection, evaluation, and reporting jobs, and viewing reports.


  • CCS 10.5 Administration: Administering Control Compliance Suite (11 of 16)
    This module describes how to navigate and manage the CCS 10.5 console and the CCS 10.5 Web console. You also learn how to create tiered and dynamic dashboards. In addition, you learn how to create and customize reports.


  • CCS 10.5 Administration: Intefacing with Symantec Products (12 of 16)
    This module describes how to interface with the CSV and ODBC data collectors. The module also describes how to interface with Symantec Protection Center, Symantec Data Loss Prevention, and Symantec Altiris Service Desk.


  • CCS 10.5 Administration: Advanced Integration (13 of 16)
    This module describes the Integration Services Subsystem (ISS) and Integration Service APIs. The module also shows you how to use PowerShell cmdlets and perform advanced data management.


  • CCS 10.5 Administration: Managing Standards (14 of 16)
    This module describes how to create standards and checks, provides an overview of the Security Content Automation Protocol (SCAP), and describes SCAP features. The module also shows you how to configure and use FDCC.


  • CCS 10.5 Administration: Policies, Entitlements, and Procedural Compliance (15 of 16)
    This module describes how to manage policies, entitlements, and procedural compliance.


  • CCS 10.5 Administration: Vulnerability Manager (16 of 16)
    This module introduces Vulnerability Manager, shows you how to prepare for installation, and install and configure the product. The module also shows you how to use Vulnerability Manager to assess your network security.


  • CCS 10.0 Vulnerability Manager
    This module introduces Vulnerability Manager, shows you how to prepare for installation, and install and configure the product. The module also shows you how to use Vulnerability Manager to assess your network security.


  • CCS 10.0 - Introduction
    The Symantec Control Compliance Suite (CCS) 10.0 Administration e-learning modules are designed for professionals who are tasked with supporting, architecting, implementing, and monitoring of the Control Compliance Suite 10.0 product. These self-paced e-learning modules cover installing and managing Control Compliance Suite 10.0 and its data collectors that interface with the Control Compliance Suite 10.0. These modules also include demonstrations that enable you to test your new skills and begin to transfer those skills into your working environment.


  • CCS 10.0 - Introducing Compliance
    In this module, you learn about compliance concepts and how challenges to compliance are managed using CCS 10.0. You also describe some of the core functions and view how CCS 10.0 is architected logically.


  • CCS 10.0 - Symantec Data Collectors
    This module introduces you to the Symantec data collectors that integrate with Symantec Control Compliance Suite 10.0. Data collectors include Symantec Risk Management System (RMS), Symantec Enterprise Security Manager (ESM), Symantec Response Assessment Manager (RAM), Symantec Data Loss Prevention (DLP) Connector, and Symantec Altiris Service Desk 7 Connector.


  • CCS 10.0 - Installing and Configuring the Risk Management System
    This module describes best practices for planning an RMS deployment that includes the RMS console and Information server with various bv-Control product snap-ins. The module also describes how to install the RMS console, Information server, and bv-Control products.


  • CCS 10.0 - Configuring bv-Control Products
    In this module, you learn how to configure bv-Control products and use bv-config to help manage your Windows environment. bv-Control products include bv-Control for Windows, bv-Control for Microsoft Exchange, bv-Control for Microsoft SQL Server, and bv-Control for UNIX.


  • CCS 10.0 - Using RMS
    This module describes how to navigate the RMS console and use the features provided by the RMS console, such as running queries, performing baselines, and managing tasks.


  • CCS 10.0 - RMS Queries
    In this module, you learn how to build and use queries. You also learn how to run and fine tune queries using advanced query features.


  • CCS 10.0 - Using bv-Control
    This module describes how to audit your environment using one or more bv-Control products.


  • CCS 10.0 - Installing and Configuring ESM
    This module describes how to install and configure Enterprise Security Manager (ESM) and ESM agent for use with CCS 10.0. The module also describes how to create and execute batch files to semi-automate and streamline ESM processes.


  • CCS 10.0 - Installing CCS 10.0
    This module describes general predeployment considerations and preinstallation requirements. You also learn how to install or upgrade to CCS 10.0 and describe how to perform a silent installation.


  • CCS 10.0 - Configuring CCS 10.0
    This module describes how to perform the initial Control Compliance Suite 10.0 configuration. Initial tasks include registering the DPS, creating asset folders, creating reconciliation rules, creating asset import jobs, creating collection, evaluation, and reporting jobs, and viewing reports.


  • CCS 10.0 - Administering CCS 10.0
    In this module, you learn how to navigate and manage the CCS 10.0 console and the CCS 10.0 Web console. You also learn how to create tiered and dynamic dashboards. In addition, you learn how to create and customize reports.


  • CCS 10.0 - Advanced Administration
    This module shows you how to collect data from Symantec and third-party products and import the data into CCS 10.0. Data collectors include Symantec Data Loss Prevention (DLP) Connector, Symantec Altiris Service Desk 7 Connector, comma-separated values (CSV), and open database connectivity (ODBC).


  • CCS 10.0 - Managing Compliance with CCS 10.0
    This module shows you how to collect data from Symantec and third-party products and import the data into CCS 10.0. Data collectors include Symantec Data Loss Prevention (DLP) Connector, Symantec Altiris Service Desk 7 Connector, comma-separated values (CSV), and open database connectivity (ODBC).


  • Integrating Symantec Products with Control Compliance Suite 10.0
    This module describes how to integrate Control Compliance Suite 10.0 with Symantec Data Loss Prevention and the Altiris Service Desk Connector. The module also shows you how to acquire third-party data using the comma-separated values (CSV) and open database connectivity (ODBC) data collectors.



Critical System Protection
  • SCSP 5.2 Admin: Intro to CSP (1 of 10)
    In this module you will learn about security threats that organizations face against their critical infrastructure and the types of technologies used to protection them. You will also learn about the different components of CSP and how they are used to protect servers.


  • SCSP 5.2 Admin: Install & Deploy (2 of 10)
    In this module you will learn how to install CSP and the different deployment methods.


  • SCSP 5.2 Admin: Install & Deploy - Demo (3 of 10)
    This module provides a demonstration on how to install CSP and the different deployment methods.


  • SCSP 5.2 Admin: Prevention & Detection (4 of 10)
    In this module you will learn about the different prevention and detection policies. You will learn about the components of a policy how to create your own policies.


  • SCSP 5.2 Admin: Prevention - Demo A (5 of 10)
    This module is a demonstration on how prevention policies work. You will see the policy in action and learn how to tune the policies to work with your applications. You will also learn how to build a policy for Apache Webserver for Windows. The knowledge from this exercise can be used in developing policies for other applications.


  • SCSP 5.2 Admin: Detection - Demo B (6 of 10)
    This module is a demonstration on how detection policies work. You will see how to create your own detection policies to monitor files, logs, registry keys for changes. You will also learn about the out of the box Baseline policies.


  • SCSP 5.2 Admin: Manage & Troubleshoot (7 of 10)
    This module you will learn about configurations that are used to determine certain aspects of how agents communicate and send events that are generated by policy violations. You will also learn how to troubleshoot agent issues. You will also learn how to create users and roles, and how CSP uses Active Directory for pass through authentication.


  • SCSP 5.2 Admin: Manage, Troubleshoot & Asset Manage - Demo (8 of 10)
    In this module is a demonstration on how to create configurations, filters, configuration groups and asset groups. You will also learn about creating asset groups and how to assign and apply policies and systems to these groups.


  • SCSP 5.2 Admin: Asset Manage (9 of 10)
    In this module you will learn about creating asset groups, assigning systems and policies to these groups and how to manage assets.


  • SCSP 5.2 Admin: Policies for VMware VSphere (10 of 10)
    In this module you will learn about the Vsphere Prevention and Detection policies that ship with CSP. These polices can be used to lockdown the Vsphere environment and provide monitoring of the ESXi host.



Data Center Security
  • Symantec Data Center Security: Server Advanced Cheat Sheet v2.0
    The SDCSSA Cheat sheet is a 2 page document that should be avaialble to partners and customer to quickly reference some of the most common definitions and features of the Symantec Data Center Security: Server Advanced product.



Data Insight
  • Data Insight (DI) 4.0: Administration: Data Insight Overview (1 of 8)
    This module offers an introduction to the Data Insight product.


  • DI 4.0: Admin: Installing DI (2 of 8)
    In this module you learn about installing and upgrading Data Insight.


  • DI 4.0: Admin: DI - Initial Configuration (3 of 8)
    This lesson looks at global settings, licensing, and overall general configuration of Data Insight for a production environment.


  • DI 4.0: Admin: Configuring resources for monitoring (4 of 8)
    In this module, you learn how to configure Data Insight to utilize resources such as Active Directory, Filers, SharePoint, and Web applications.


  • DI 4.0: Admin: Navigating the console (5 of 8)
    In this module, you learn how to navigate the Data Insight console to view files, folders, and groups. You also learn about managing Custodians and generating reports.


  • DI 4.0: Admin: Using DI for risk, compliance, and data management (6 of 8)
    In this module, you are introduced to scenarios which demonstrate how Data Insight can be used for risk and compliance as well as data management.


  • DI 4.0: Admin: Integrating DI with other products (7 of 8)
    In this module, you learn how Data Insight integrates with Data Loss Prevention and Enterprise Vault.


  • DI 4.0: Admin: Troubleshooting (8 of 8)
    In this module, you learn how to perform basic troubleshooting of Data Insight and use Command Line tools for administration.


  • Data Insight 3.0 Admin: Overview (1 of 5)
    In this lesson, you will gain an understanding of Data Insight 3.0, its architecture and use cases.


  • Data Insight 3.0 Admin: Installing Data Insight (2 of 5)
    In this lesson, you will learn about the requirements to Install data Insight 3.0, some best practices for deploying Data Insight in your environment, and installation and post-installation configurations.


  • Data Insight 3.0 Admin: Configuring Data Insight (3 of 5)
    In this lesson, you learn how to configure Data Insight including global settings, integrating with other directory services, filers, containers, users and policies.


  • Data Insight 3.0 Admin: Using Data Insight (4 of 5)
    In this lesson, you learn how to use the user interface and how to view files, folders, users, groups and more. You will also learn about Data Custodians, how to view and generate reports, and some troubleshooting.


  • Data Insight 3.0 Admin: Data Insight and DLP Integration (5 of 5)
    In this lesson, you learn about Data Insight and DLP integration, configuration steps, data flow and use cases.


  • Data Insight 2.0: Admin: Data Insight Overview (1 of 5)
    This module introduces Data Insight and discusses its purpose, architecture, and use.


  • Data Insight 2.0: Admin: Installing Data Insight (2 of 5)
    This module describes planning for and performing Data Insight installations, as well as post-installation configuration steps. A demonstration showing the installation process is included.


  • Data Insight 2.0: Admin: Configuring Data Insight (3 of 5)
    This module introduces the learner to the Data Insight management console, which is the main tool used in Data Insight. It describes how to configure different elements of Data Insight, including global settings, Active Directory settings, users, containers, and policies.


  • Data Insight 2.0: Admin: Using Data Insight (4 of 5)
    This module covers basic navigation in the management console, as well as viewing settings and results for files, folders, users, and groups. It introduces how to generate reports and troubleshoot Data Insight from information contained in the management console.


  • Data Insight 2.0: Admin: Data Insight and DLP Integration (5 of 5)
    This module describes the integration between the Data Insight product and Symantec Data Loss Prevention (DLP).



Data Loss Prevention
  • DLP 12.5: Admin: Introduction to Symantec Data Loss Prevention (1 of 32)
    This module introduces the Symantec Data Loss Prevention suite.


  • DLP 12.5: Admin: Navigation and Reporting (2 of 32)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.


  • DLP 12.5: Admin: Dashboard creation and distribution - Demo (3 of 32)
    This demonstration steps through the creation of a dashboard report and how to send it using email and steps through configuring a user's reporting preferences.


  • DLP 12.5: Admin: Incident Remediation and Workflow (4 of 32)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.


  • DLP 12.5: Admin: Incident Remediation - Demo (5 of 32)
    This demonstration steps through remediating incidents based on specific users and roles and steps through configuring new roles and users.


  • DLP 12.5: Admin: Policy Management (6 of 32)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.


  • DLP 12.5: Admin: Exporting and importing policy templates, and creating a policy - Demo (7 of 32)
    This demonstration steps through how to export and import policy templates and steps through the creation of a policy based on a template.


  • DLP 12.5: Admin: Response Rule Management (8 of 32)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.


  • DLP 12.5: Admin: Creating Automated Response Rules - Demo (9 of 32)
    This demonstration steps through the creation of Automated Response rules and how to add automated response rules to a policy.


  • DLP 12.5: Admin: Described Content Matching (10 of 32)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 12.5: Admin: Creating a DCM policy (Data identifiers) - Demo (11 of 32)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.


  • DLP 12.5: Admin: Exact Data Matching and Directory Group Matching (12 of 32)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 12.5: Admin: Creating an EDM index for a Directory Group Match - Demo (13 of 32)
    This demonstration steps through creating an EDM index for a Directory Group Match.


  • DLP 12.5: Admin: Indexed Document Matching (14 of 32)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 12.5: Admin: Creating an IDM index - Demo (15 of 32)
    This demonstration steps through creating an IDM index.


  • DLP 12.5: Admin: Vector Machine Learning (16 of 32)
    This module covers the VML detection method, its use cases, and how to use it in policies.


  • DLP 12.5: Admin: Creating a VML profile and policy - Demo (17 of 32)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.


  • DLP 12.5: Admin: Network Monitor (18 of 32)
    This module reviews Symantec Data Loss Prevention Mobile Email Monitor features and Network Monitor features.


  • DLP 12.5: Admin: Creating and applying L7 filters - Demo (19 of 32)
    This demonstration steps through configuring L7 filters and applying them to a policy.


  • DLP 12.5: Admin: Network Prevent (20 of 32)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).


  • DLP 12.5: Admin: Blocking a SMTP message - Demo (21 of 32)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.


  • DLP 12.5: Admin: Mobile Email Monitor and Mobile Prevent (22 of 32)
    This module introduces Mobile Prevent and its features and capabilities.


  • DLP 12.5: Admin: Using Mobile Prevent - Demo (23 of 32)
    This demonstration steps through configuring a Mobile Prevent policy and response rule, and how it is used.


  • DLP 12.5: Admin: Network Discover and Network Protect (24 of 32)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.


  • DLP 12.5: Admin: Scheduling incremental scans and viewing the resulting reports, and quarantining at-risk data - Demo (25 of 32)
    This demonstration steps through scheduling an incremental scan, viewing the reports that are generated and steps through configuring and using the Quarantine feature.


  • DLP 12.5: Admin: Endpoint Prevent (26 of 32)
    This module introduces the Endpoint Prevent product including event coverage, reporting, management options of the Symantec Data Loss Prevention Endpoint agent, and best practices.


  • DLP 12.5: Admin: Creating Endpoint Response Rules, and using Endpoint Prevent to block an attempt to copy data to a USB device - Demo (27 of 32)
    This demonstration steps through creating Endpoint specific response rules, and steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.


  • DLP 12.5: Admin: Endpoint Discover (28 of 32)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.


  • DLP 12.5: Admin: Adding and running an Endpoint target scan and viewing incidents and scan details - Demo (29 of 32)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.


  • DLP 12.5: Admin: Enterprise Enablement (30 of 32)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.


  • DLP 12.5: Admin: System Administration (31 of 32)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.


  • DLP 12.5: Admin: Using the Log Collection and Configuration tool - Demo (32 of 32)
    This demonstration steps through how to use the Log Collection and Configuration tool.


  • DLP 12.5: Install and Deploy: Installing Symantec Data Loss Prevention (1 of 2)
    This lesson describes how to install Symantec Data Loss Prevention. There are three demos within the module which step through installing on Oracle 11g, Enforce server, and the installation of DLP agents on endpoint machines.


  • DLP 12.5: Install and Deploy: Upgrading to Symantec Data Loss Prevention 12.5 (2 of 2)
    This lesson details the upgrade process for the Symantec Data Loss Prevention system. There is a demo included which steps through using the Upgrade Wizard.


  • DLP 12.5: Diffs: Platform and reporting features (1 of 4)
    This module covers platform and reporting enhancements available in the new release.


  • DLP 12.5: Diffs: Detection features (2 of 4)
    This module covers detection enhancements available in the new release.


  • DLP 12.5: Diffs: Network and Mobile features (3 of 4)
    This module covers enhancements available on the Network Monitor and Email Mobile Monitor in the new release.


  • DLP 12.5: Diffs: Storage features (4 of 4)
    This module covers storage enhancements available in the new release. Specifically the Data Owner Portal feature.


  • Symantec Data Loss Prevention 12.5: Differences Update-Endpoint Features
    This module covers Endpoint enhancements available in the new 12.5 release. It is an adjunct to the four modules in the Data Loss Prevention 12.5: Differences course.


  • DLP 12: Admin: Introduction to Symantec Data Loss Prevention (1 of 32)
    This module introduces the Symantec Data Loss Prevention suite.


  • DLP 12: Admin: Navigation and Reporting (2 of 32)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.


  • DLP 12: Admin: Dashboard creation and distribution - Demo (3 of 32)
    This demonstration steps through the creation of a dashboard report and how to send it using email and steps through configuring a user's reporting preferences.


  • DLP 12: Admin: Incident Remediation and Workflow (4 of 32)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.


  • DLP 12: Admin: Incident Remediation - Demo (5 of 32)
    This demonstration steps through remediating incidents based on specific users and roles and steps through configuring new roles and users.


  • DLP 12: Admin: Policy Management (6 of 32)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.


  • DLP 12: Admin: Exporting and importing policy templates, and creating a policy - Demo (7 of 32)
    This demonstration steps through how to export and import policy templates and steps through the creation of a policy based on a template.


  • DLP 12: Admin: Response Rule Management (8 of 32)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.


  • DLP 12: Admin: Creating Automated Response Rules - Demo (9 of 32)
    This demonstration steps through the creation of Automated Response rules and how to add automated response rules to a policy.


  • DLP 12: Admin: Described Content Matching (10 of 32)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 12: Admin: Creating a DCM policy (Data identifiers) - Demo (11 of 32)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.


  • DLP 12: Admin: Exact Data Matching and Directory Group Matching (12 of 32)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 12: Admin: Creating an EDM index for a Directory Group Match - Demo (13 of 32)
    This demonstration steps through creating an EDM index for a Directory Group Match.


  • DLP 12: Admin: Indexed Document Matching (14 of 32)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 12: Admin: Creating an IDM index - Demo (15 of 32)
    This demonstration steps through creating an IDM index.


  • DLP 12: Admin: Vector Machine Learning (16 of 32)
    This module covers the VML detection method, its use cases, and how to use it in policies.


  • DLP 12: Admin: Creating a VML profile and policy - Demo (17 of 32)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.


  • DLP 12: Admin: Mobile Email Monitor and Network Monitor (18 of 32)
    This module reviews Symantec Data Loss Prevention Mobile Email Monitor features and Network Monitor features.


  • DLP 12: Admin: Creating and applying L7 filters - Demo (19 of 32)
    This demonstration steps through configuring L7 filters and applying them to a policy.


  • DLP 12: Admin: Network Prevent (20 of 32)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).


  • DLP 12: Admin: Blocking a SMTP message - Demo (21 of 32)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.


  • DLP 12: Admin: Mobile Prevent (22 of 32)
    This module introduces Mobile Prevent and its features and capabilities.


  • DLP 12: Admin: Using Mobile Prevent - Demo (23 of 32)
    This demonstration steps through configuring a Mobile Prevent policy and response rule, and how it is used.


  • DLP 12: Admin: Network Discover and Network Protect (24 of 32)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.


  • DLP 12: Admin: Scheduling incremental scans, viewing resulting reports, and quarantining at-risk data - Demo (25 of 32)
    This demonstration steps through scheduling an incremental scan, viewing the reports that are generated and steps through configuring and using the Quarantine feature.


  • DLP 12: Admin: Endpoint Prevent (26 of 32)
    This module introduces the Endpoint Prevent product including event coverage, reporting, management options of the Symantec Data Loss Prevention Endpoint agent, and best practices.


  • DLP 12: Admin: Creating Endpoint Response Rules, and using Endpoint Prevent to block an attempts to copy to USB devices - Demo (27 of 32)
    This demonstration steps through creating Endpoint specific response rules, and steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.


  • DLP 12: Admin: Endpoint Discover (28 of 32)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.


  • DLP 12: Admin: Adding and running an Endpoint target, and viewing incidents and scan details - Demo (29 of 32)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.


  • DLP 12: Admin: Enterprise Enablement (30 of 32)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.


  • DLP 12: Admin: System Administration (31 of 32)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.


  • DLP 12: Admin: Using the Log Collection and Configuration tool - Demo (32 of 32)
    This demonstration steps through how to use the Log Collection and Configuration tool.


  • DLP 11.5: Admin: Introduction to Symantec Data Loss Prevention (1 of 47)
    This module introduces the Symantec Data Loss Prevention suite.


  • DLP 11.5: Admin: Navigation and Reporting (2 of 47)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.


  • DLP 11.5: Admin: Dashboard creation and distribution - Demo (3 of 47)
    This demonstration steps through the creation of a dashboard report and how to send it using email.


  • DLP 11.5: Admin: Reporting preferences - Demo (4 of 47)
    This demonstration steps through configuring a user's reporting preferences.


  • DLP 11.5: Admin: Web Archive - Demo (5 of 47)
    This demonstration steps through configuring a user's reporting preferences.


  • DLP 11.5: Admin: Incident Remediation and Workflow (6 of 47)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.


  • DLP 11.5: Admin: Incident Remediation - Demo (7 of 47)
    This demonstration steps through remediating incidents based on specific users and roles.


  • DLP 11.5: Admin: Creating roles and users - Demo (8 of 47)
    This demonstration steps through configuring new roles and users.


  • DLP 11.5: Admin: Policy Management (9 of 47)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.


  • DLP 11.5: Admin: Exporting and importing policy templates - Demo (10 of 47)
    This demonstration steps through how to export and import plicy templates.


  • DLP 11.5: Admin: Creating a policy based on a template - Demo (11 of 47)
    This demonstration steps through the creation of a policy based on a template.


  • DLP 11.5: Admin: Using Severity in a policy - Demo (12 of 47)
    This demonstration steps through how to use severity settings in a policy.


  • DLP 11.5: Admin: Response Rule Management (13 of 47)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.


  • DLP 11.5: Admin: Creating Automated Response Rules - Demo (14 of 47)
    This demonstration steps through the creation of Automated Response rules.


  • DLP 11.5: Admin: Adding automated responses to a policy - Demo (15 of 47)
    This demonstration steps through how to add automated response rules to a policy.


  • DLP 11.5: Admin: Described Content Matching (16 of 47)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 11.5: Admin: Creating a DCM policy (Data identifiers) - Demo (17 of 47)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.


  • DLP 11.5: Admin: Creating a policy from the PCI template - Demo (18 of 47)
    This demonstration steps through creating a DCM policy using the PCI policy template.


  • DLP 11.5: Admin: Exact Data Matching and Directory Group Matching (19 of 47)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 11.5: Admin: Creating an EDM index for a Directory Group Match - Demo (20 of 47)
    This demonstration steps through creating an EDM index for a Directory Group Match.


  • DLP 11.5: Admin: Indexed Document Matching (21 of 47)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 11.5: Admin: Creating an IDM index - Demo (22 of 47)
    This demonstration steps through creating an IDM index.


  • DLP 11.5: Admin: Vector Machine Learning (23 of 47)
    This module covers the VML detection method, its use cases, and how to use it in policies.


  • DLP 11.5: Admin: Creating a VML profile and policy - Demo (24 of 47)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.


  • DLP 11.5: Admin: Network Monitor Review (25 of 47)
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.


  • DLP 11.5: Admin: Introduction to Network Prevent (26 of 47)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).


  • DLP 11.5: Admin: Blocking a SMTP message - Demo (27 of 47)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.


  • DLP 11.5: Admin: Introduction to Symantec Data Loss Prevention for Tablets (28 of 47)
    This module introduces the Symantec Data Loss Prevention for Tablets, or Tablet Prevent product.


  • DLP 11.5: Admin: Using Tablet Prevent - Demo (29 of 47)
    This demonstration steps through configuring a Tablet Prevent policy and how it is used.


  • DLP 11.5: Admin: Introduction to Network Discover and Network Protect (30 of 47)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.


  • DLP 11.5: Admin: Performing an Exchange scan - Demo (31 of 47)
    This demonstration steps through configuring and performing an Exchange scan.


  • DLP 11.5: Admin: Scheduling incremental scans and viewing the resulting reports - Demo (32 of 47)
    This demonstration steps through scheduling an incremental scan and viewing the reports that are generated.


  • DLP 11.5: Admin: Quarantining at risk data - Demo (33 of 47)
    This demonstration steps through configuring and using the Quarantine feature.


  • DLP 11.5: Admin: Scanning a file-system target - Demo (34 of 47)
    This demonstration steps through configuring and performing a file-system scan.


  • DLP 11.5: Admin: Introduction to Endpoint Prevent (35 of 47)
    This module introduces the Endpoint Prevent product including event coverage, reporting, and best practices.


  • DLP 11.5: Admin: Agent configuration management - Demo (36 of 47)
    This demonstration steps through how to manage and apply agent configurations.


  • DLP 11.5: Admin: Defining Endpoint Devices - Demo (37 of 47)
    This demonstration steps through how to define authorized Endpoint devices.


  • DLP 11.5: Admin: Using Endpoint Prevent to block an attempt to copy data to a USB device - Demo (38 of 47)
    This demonstration steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.


  • DLP 11.5: Admin: Creating Endpoint Response Rules - Demo (39 of 47)
    This demonstration steps through creating Endpoint specific response rules.


  • DLP 11.5: Admin: Managing Endpoint DLP Agents (40 of 47)
    This module covers the management options of the Symantec Data Loss Prevention Endpoint agent.


  • DLP 11.5: Admin: Using SMP to manage the DLP Agent - Demo (41 of 47)
    This demonstration steps through how to use Symantec Management Platform to manage the DLP Agent.


  • DLP 11.5: Admin: Introduction to Endpoint Discover (42 of 47)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.


  • DLP 11.5: Admin: Adding and running an Endpoint target and viewing incidents and scan details - Demo (43 of 47)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.


  • DLP 11.5: Admin: Enterprise Enablement (44 of 47)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.


  • DLP 11.5: Admin: System Administration (45 of 47)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.


  • DLP 11.5: Admin: Credential Management - Demo (46 of 47)
    This demonstration steps through how to configure and use the Credential Management feature.


  • DLP 11.5: Admin: Using the Log Collection and Configuration tool - Demo (47 of 47)
    This demonstration steps through how to use the Log Collection and Configuration tool.


  • DLP 11: Administration— Complementary Symantec Products
    This appendix lesson describes the complementary Symantec products that can integrate with Symantec Data Loss Prevention 11.


  • DLP 11: Administration— Introduction to DLP (1 of 15)
    This module introduces the Symantec Data Loss Prevention suite.


  • DLP 11: Administration— Navigation and Reporting (2 of 15)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.


  • DLP 11: Administration— Incident Remediation and Workflow (3 of 15)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.


  • DLP 11: Administration— Policy Management (4 of 15)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.


  • DLP 11: Administration— Response Rule Management (5 of 15)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.


  • DLP 11: Administration— Described Content Matching (6 of 15)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 11: Administration— Exact Data Matching and Directory Group Matching (7 of 15)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 11: Administration— Indexed Document Matching (8 of 15)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 11: Administration— Network Monitor Review (9 of 15)
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.


  • DLP 11: Administration— Introduction to Network Prevent (10 of 15)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).


  • DLP 11: Administration— Introduction to Network Discover and Network Protect (11 of 15)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.


  • DLP 11: Administration— Introduction to Endpoint Prevent (12 of 15)
    This module introduces the Endpoint Prevent product including event coverage, agent management, reporting, and best practices.


  • DLP 11: Administration— Introduction to Endpoint Discover (13 of 15)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.


  • DLP 11: Administration— Enterprise Enablement (14 of 15)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.


  • DLP 11: Administration— System Administration (15 of 15)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.


  • DLP 9.0 - Administration Overview
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Introduction to Data Loss Prevention
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Introduction to Endpoint Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices. Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 10.5 Standard Ed. Admin - Intro to DLP
    This module introduces the Symantec Data Loss Prevention Standard.


  • DLP 10.5 Standard Ed. Admin - Navigation and Reporting
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention Standard.


  • DLP 10.5 Standard Ed. Admin - Incident Response and Workflow
    This module describes the incident response methodology and workflow features common to the Symantec Data Loss Prevention Standard.


  • DLP 10.5 Standard Ed. Admin - TrueMatch Detection Method
    This module covers the TrueMatch detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 10.5 Standard Ed. Admin - Policy Management
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention Standard.


  • DLP 10.5 Standard Ed. Admin - Response Rule Management
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention Standard.


  • DLP 10.5 Standard Ed. Admin - Deployment Best Practices
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention Standard customers.


  • DLP 10.5 Standard Ed. Admin - System Administration
    This module details the server administration aspects of the Symantec Data Loss Prevention Standard product.


  • DLP 10.5 Admin - Intro to DLP
    This module introduces the Symantec Data Loss Prevention suite.


  • DLP 10.5 Admin - Navigation and Reporting
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.


  • DLP 10.5 Admin - Incident Remediation and Workflow
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.


  • DLP 10.5 Admin - Policy Management
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.


  • DLP 10.5 Admin - Response Rule Management
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.


  • DLP 10.5 Admin - TrueMatch Detection Methods
    This module covers the TrueMatch detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.


  • DLP 10.5 Admin - Advanced EDM
    This module provides a deeper explanation of EDM, covering data source preparation, secure transport of data sources, strategies for refreshing data sources and indexes, and advanced use of EDM.


  • DLP 10.5 Admin - Network Monitor Review
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.


  • DLP 10.5 Admin - Intro to Network Prevent
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).


  • DLP 10.5 Admin - Intro to Network Discover and Network Protect
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, and managing the scans.


  • DLP 10.5 Admin - Intro to Endpoint Prevent
    This module introduces the Endpoint Prevent product including event coverage, agent management, reporting, and best practices.


  • DLP 10.5 Admin - Intro to Endpoint Discover
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.


  • DLP 10.5 Admin - Enterprise Enablement
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.


  • DLP 10.5 Admin - System Administration
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.


  • DLP 9.0 - Introduction to Symantec Data Loss Prevention
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Reporting, Incident Remediation and Workflow
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Policy Management
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Response Rule Management
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - TrueMatch Detection Methods
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Advanced EDM
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Policy Best Practices
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Network Monitor Review
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Introduction to Network Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Introduction to Network Discover and Protect
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Introduction to Endpoint Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Introduction to Endpoint Discover
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - Enterprise Enablement
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.


  • DLP 9.0 - System Administration
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.



Deepsight
  • Symantec DeepSight Early Warning Services Portal (Lessons 1-7)
    This video is for those who need to install, deploy, configure, manage, administer, and troubleshoot the Symantec DeepSight Early Warning Services portal.



Deployment Solution
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 6.9 Basics
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • DS 7.1 Administration: Deployment Solution Overview (1 of 9)
    In this module, you become familiar with the software and services offered by Symantec. You also learn what the overall purpose and functions of Deployment Solution are.


  • DS 7.1 Administration: Installing Deployment Solution (2 of 9)
    In this module, you learn about installation prerequisites and then learn the three-fold installation process: installing Symantec Installation Manager (SIM), installing Deployment Solution with (SIM), and installing the Deployment Solution plug-n on managed clients. You also learn about Symantec Boot Services and how to configure these after the installation.


  • DS 7.1 Administration: Configuring Deployment Solution (3 of 9)
    In this module, you learn about the many parts of Deployment Solution, such as configuring Sysprep image, configuring PXE Server, and adding operating system licenses, that are needed to create and deploy images.


  • DS 7.1 Administration: Symantec Management Console Fundamentals (4 of 9)
    In this module, you learn how to access the console, become familiar with the different views of the console, navigating the console to locate computers, policies, tasks and software, and view detailed information in each view. You also learn how to create manage jobs and tasks using the console.


  • DS 7.1 Administration: Creating Images & Deploying Software (5 of 9)
    In this module, you learn about the different types of computer images and how to create and deploy these images. In addition, you learn how to import predefined computers into Deployment Solution and use tasks to install software on the managed computers.


  • DS 7.1 Administration: PC Transplant with Deployment Solution (6 of 9)
    In this module, you are introduced to PC Transplant. In PC Transplant, you learn how to create template files that collect specific information regarding applications and user settings. In addition, you learn how to deploy tasks that create personality packages. Finally, you learn about the A2i Builder and how to edit personality packages.


  • DS 7.1 Administration: Computer Migrations and Deploying Operating Systems (7 of 9)
    In this module, you learn about computer migrations and deploying computer images with unicast and multicast methods. You also learn about Initial Deployment imaging, how to change a computer’s system configuration, and how to perform a scripted OS installation.


  • DS 7.1 Administration: Installing Deployment Site Servers (8 of 9)
    In this module, you learn about Deployment Site Server Components and how to install the components. You also learn how site servers affect imaging and PC Transplant.


  • DS 7.1 Administration: Remote control with pcAnywhere Solution (9 of 9)
    In this module, you learn about pcAnywhere and how to install pcAnywhere Solution and the plug-in. You then learn how to configure settings for making a remote connection, start a remote session, and manage a session.


  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution Product Overview
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Client Management Suite 7.0: Deployment and Imaging - Installation
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution Agents
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Client Management Suite 7.0: Deployment and Imaging - PXE and Automation
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Client Management Suite 7.0: Deployment and Imaging - Managing Images
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Client Management Suite 7.0: Deployment and Imaging - Managing Software Virtualization Solution
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Client Management Suite 7.0: Deployment and Imaging - PC Transplant
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 6.9 SP1
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 7.0 for Client
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.


  • Deployment Solution 6.9 - Agents
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Deployment Solution 6.9 - DS Basics
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Deployment Solution 6.9 - Installation
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Deployment Solution 6.9 - Managing Images
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Deployment Solution 6.9 – Managing SVS
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Deployment Solution 6.9 - Overview
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Deployment Solution 6.9 – PC Transplant
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Deployment Solution 6.9 - PXE & Automation
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Install and Configure DAgent for Vista
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.


  • Imaging with Ghost and ImageX
    Deployment Solution version 6.8 SP2 or higher, supports many different imaging engines, letting you select the imaging tool that best meets the needs of your company and environment. However, the only imaging engine that ships with Deployment Solution is RapiDeploy. In this course you will learn how to configure Deployment Solution to support the additional “Symantec Ghost” and “Microsoft ImageX” imaging engines.


  • Vista Migration with Deployment Solution
    The difficult task of migrating a computer from a previous version of Windows to Vista, is simplified through the power of Deployment Solution. In this course, you will learn how to use Deployment Solution to migrate a computer from XP to Vista. To get the most out of this course, you must have a working knowledge of Deployment Solution, including how to create Deployment jobs and a basic understanding of PC Transplant. If needed, please view the other Deployment Solution courses first.



Disaster Recovery Advisor
  • Introducing Symantec Disaster Recovery Advisor (1 of 4)
    In this module, you learn about the need for risk assessment and how Symantec Disaster Recovery Advisor (DRA) aids in performing risk assessments. Further, you learn how to install DRA and navigate through the DRA console.


  • Configuring DRA for scanning (2 of 4)
    In this module, you learn about the basic scan configuration tasks and describe the entities that you can configure in DRA. You then learn how to configure these entities. You also learn how to manage these entities in DRA using sites and scanning groups. Finally, you learn how DRA scans the IT environment, how to identify issues with the scan process, and most common issues that are encountered.


  • Managing user access (3 of 4)
    In this module, you learn about user management in DRA. You learn how to add a DRA user and import Active Directory users in DRA. You also learn about roles, scope and profiles that are associated to the user accounts.


  • Using the Comparison module (4 of 4)
    In this module, you learn about the Comparison module in DRA. You learn how to create worksheets and comparison groups. Finally, you learn how to perform host configuration comparisons.



Disaster Recovery Orchestrator
  • Disaster Recovery Orchestrator (SDRO) 6.1-Introduction to SDRO 6.1 (1 of 10)
    In this module, you get an overview of Symantec Disaster Recovery Orchestrator (SDRO) 6.1. It shows the architecture and lays out the components of SDRO.


  • SDRO 6.1-SDRO 6.1 Requirements (2 of 10)
    In this module, you learn about the hardware and software requirements for installing Symantec Disaster Recovery Orchestrator 6.1.


  • SDRO 6.1-Preparing the Cloud Environment (3 of 10)
    In this module, you learn about the steps to set up the Microsoft Azure infrastructure for installing Symantec Disaster Recovery Orchestrator 6.1.


  • SDRO 6.1-Installing and Configuring SDRO 6.1 (4 of 10)
    In this module, you learn about the Console and Client installation of Symantec Disaster Recovery 6.1.


  • SDRO 6.1-Configuring Applications for Disaster Recovery (5 of 10)
    In this module, you learn about the Disaster Recovery Orchestrator Console settings. You also learn about the considerations for configuring an application for disaster recovery. Finally, you learn to configure a SQL and a custom application for disaster recovery.


  • SDRO 6.1-Administering Disaster Recovery of Applications (6 of 10)
    In this module, you learn about the various Disaster Recovery Orchestrator operations. You also learn about the disaster recovery and application monitoring settings of an application. Additionally, you learn to use the SDRO reports. Finally, you learn to remove the recovery configuration of an application.


  • SDRO 6.1-SDRO 6.1 Agents (7 of 10)
    In this module, you learn about the infrastructure and application agents of Symantec Disaster Recovery Orchestrator 6.1.


  • SDRO 6.1-Synchronization of Application Data (8 of 10)
    In this module, you learn about the file replication components of Symantec Disaster Recovery Orchestrator. You also learn about the replication agents in Symantec Disaster Recovery Orchestrator.


  • SDRO 6.1-Backing-up, Repairing And Uninstalling SDRO 6.1 (9 of 10)
    In this module, you learn how to backup the Symantec Disaster Recovery Orchestrator Console. You also learn to repair Symantec Disaster Recovery Orchestrator Console and Client installations. Finally, you learn to uninstall Symantec Disaster Recovery Orchestrator.


  • SDRO 6.1-Troubleshooting SDRO 6.1 (10 of 10)
    In this module, you learn about the Symantec Disaster Recovery Orchestrator logs. You also learn to troubleshoot common issues of Symantec Disaster Recovery Orchestrator. Finally, you learn about the limitations and known issues of Symantec Disaster Recovery Orchestrator 6.1.



eDiscovery Platform 7
  • Symantec eDiscovery Platform 7.1.5: Differences - Rights Management Services (RMS)
    This module introduces the differences in the new version 7.1.5 emphasizing Audio Search and including configuration, deployment and scalability.


  • Clearwell 7.x: Differences--Custodian Manager [7.1.3 and 7.1.4] (1 of 10)
    You look at the purpose and workflow associated with Custodian Manger. You view reference material for new jobs, features and basic troubleshooting.


  • Clearwell 7.x: Differences--Enterprise Vault (EV) Search Preview [7.1.3 and 7.1.4] (2 of 10)
    This lesson uses the Enterprise Vault (EV) Search Preview to analyze and preview Enterprise Vault sources prior to collection or placing EV Holds on data.


  • Clearwell 7.x: Differences--Installer Improvements [7.1.3 and 7.1.4] (3 of 10)
    This module describes the changes to the Clearwell installation/upgrade process for this release of the software.


  • Clearwell 7.x: Differences--Upgrade considerations [7.1.3 and 7.1.4] (4 of 10)
    This module is designed to present miscellaneous information relevant to upgrading prior versions of Clearwell to v.7.1.3.


  • Clearwell 7.x: Differences--Processing [7.1.3 and 7.1.4] (5 of 10)
    You are introduced to the improvements made to Processing. This includes; improved container handling, strong file typing based processing and Load File Import (LFI) processing. You are also introduced to the new processing reports.


  • Clearwell 7.x: Differences--Enterprise Vault Integration, Case Matter Management Fields, and Telemetry [7.1.3 and 7.1.4] (6 of 10)
    You learn three enhancements made in Clearwell 7.1.3. The first is the handling of Blind Carbon Copy (BCC) and Distribution List (DL) handling between Enterprise Vault and Clearwell. The next enhancement, is working with the case matter management fields in both the user interface and programmatically. Lastly, we introduce the advantages of using telemetry and patch notifications within Clearwell


  • Clearwell 7.x: Differences--Search, Review, and Search Reports [7.1.3 and 7.1.4] (7 of 10)
    You learn the enhancements to the Search Report and the Search Hit Report. The changes to Separate Tagging of Attachments (STOA) are explained. You learn about searching the e-mail header data. Lastly, you look at the new Transparent Predictive Coding graphs.


  • Clearwell 7.x: Differences--Exports and Productions [7.1.3 and 7.1.4] (8 of 10)
    This module provides a concise discussion of the new Image Remediation as well as the new Export features incorporated into Symantec Clearwell eDiscovery Platform v.7.1.3.


  • Clearwell 7.x: Differences--Audio Search [7.1.3 and 7.1.4] (9 of 10)
    This module provides an introduction to the Audio Search feature. It explains how Audio Search works as well as teaches how to use it in Clearwell. It includes some discussion of the feature’s configuration, deployment and scalability, as well as how to perform troubleshooting of the feature.


  • Clearwell 7.x: Differences--Miscellaneous Updates [7.1.3 and 7.1.4] (10 of 10)
    This module instructs you on the updated functionality of the Transparent Predictive Coding feature. It explains how this version of Clearwell is now capable of supporting data collection from MS Exchange Server 2013, and it also demonstrates how Clearwell now implements requirements specified in Dodd-Frank legislation.


  • Clearwell 7.x: Transparent Predictive Coding – Course Introduction (1 of 11)
    This introductory module covers course objectives, intended audience, agenda, and administrative notes.


  • Clearwell 7.x: Transparent Predictive Coding – Predictive Coding Overview (2 of 11)
    In this module, you learn what Predictive Coding is, the benefits of Clearwell’s Transparent Predictive Coding, a brief review of considerations from Predictive Coding cases, and planning points for managing discovery requirements when using Predictive Coding.


  • Clearwell 7.x: Transparent Predictive Coding – Understanding Statistics and Predictive Coding Technology (3 of 11)
    This module helps you better understand statistical concepts pertinent to Predictive Coding, and covers the use of statistics and information retrieval as integrated in Clearwell.


  • Clearwell 7.x: Transparent Predictive Coding – Best Practices Workflow (4 of 11)
    This module offers an overview of the Clearwell Transparent Predictive Coding Best Practices workflow, reviewing all the steps at a high level. The module covers Preparation steps, Creating a Control Set, the Training process, and how to complete a Predictive Coding project.


  • Clearwell 7.x: Transparent Predictive Coding – Preparation Steps (5 of 11)
    In this module, we cover the initial steps in the Best Practices workflow. First you learn how users can define the specific population of documents that will be used for Predictive Coding. Next, the module covers details for the steps of ECA and Data Culling, and Managing non-standard documents. The last section covers important information about tagging documents and items.


  • Clearwell 7.x: Transparent Predictive Coding – Setup and Training (6 of 11)
    This lesson covers core parts of the Transparent Predictive Coding Best Practices workflow. Specifically, the objectives for this lesson are to help you understand how to set up folders for Predictive Coding, how to create and manage the Control Set, and how to train the predictive coding system.


  • Clearwell 7.x: Transparent Predictive Coding – Demo-Setup and Training (7 of 11)
    This demonstration walks through the setup and training steps of the Best Practices workflow.


  • Clearwell 7.x: Transparent Predictive Coding – Testing, Predicting, and Finishing (8 of 11)
    In this module, you learn how to test the Predictive Coding model, understand reports and prediction ranks, apply predictions once a desired level of accuracy is achieved, and manage next steps after Predictive Coding.


  • Clearwell 7.x: Transparent Predictive Coding – Demo-Testing, Predicting, and Finishing (9 of 11)
    This demonstration walks through testing, predicting, and finishing a Predictive Coding project.


  • Clearwell 7.x: Transparent Predictive Coding – Transparent Predictive Coding Administration (10 of 11)
    This module helps you understand the administration of Transparent Predictive Coding, including how to use the Prediction Status page, how to import and export Predictive Coding data, how to monitor Predictive Coding in the Review Dashboard, and a few other important tasks.


  • Clearwell 7.x: Transparent Predictive Coding – Alternate Use Cases and Workflows (11 of 11)
    In this module, you learn how to use Transparent Predictive Coding for alternate goals and workflows. This includes use cases such as prioritized review, privilege identification, highly relevant identification, and quality control checks.


  • Symantec Clearwell eDiscovery Platform: Load File Import
    In this module you learn to use the Load File Import feature in order to set up a Load File Source for processing. In addition, you learn to troubleshoot Load File Import errors. Finally, you learn to set up a Clearwell Production Export to be imported into another Clearwell server.


  • Clearwell eDiscovery Platform 7.1.2 Distributed Architecture
    This lesson will help you understand the basic concepts of Distributed Architecture, and can assist in configuring your own clustered environments to take advantages of the Distributed Collection, Processing , Review, and Export capabilities in Symantec Clearwell eDiscovery Platform v7.1.2.


  • Clearwell 7.x: Legal Holds and Collections: Introduction to Clearwell (1 of 8)
    You review Legal Discovery and EDRM, discuss Clearwell Appliance characteristics, perform Clearwell application installation overview, preview Clearwell Login and UI fundamentals and describe High-level workflows with Clearwell.


  • Clearwell 7.x: Legal Holds and Collections: Legal Holds and Hold Notices (2 of 8)
    This lesson includes performing Legal Hold overview, importing and managing custodians, as well as, creating and sending Hold Notices.


  • Clearwell 7.x: Legal Holds and Collections: Customizing Notices and Managing Confirmations (3 of 8)
    You learn how to use the options for Hold Notice customizations so they fit your requirements, and discover how custodians can confirm their Hold Notices.


  • Clearwell 7.x: Legal Holds and Collections: Legal Hold Management and Tracking (4 of 8)
    You learn how to track, edit and release Hold Notices, and you also learn about Legal Hold administration.


  • Clearwell 7.x: Legal Holds and Collections: Identification and Collection Fundamentals (5 of 8)
    You are introduced to the fundamentals of the Clearwell Identification and Collection module.


  • Clearwell 7.x: Legal Holds and Collections: Collections and Collection Tasks (6 of 8)
    You learn about creating Collections, running Collection Tasks and managing EV Holds in Symantec Clearwell eDiscovery Platform.


  • Clearwell 7.x: Legal Holds and Collections: OnSite Collections and Collection sets (7 of 8)
    You learn how OnSite Collections and Collection Sets work, and how you can use them in your overall eDiscovery data collection efforts.


  • Clearwell 7.x: Legal Holds and Collections: Collection Reporting and Maintenance (8 of 8)
    You learn about the reporting capabilities and supporting activities in the Clearwell Collection module.


  • Clearwell 7.x: Processing, Review and Export: Introduction to Clearwell (1 of 12)
    You review Legal Discovery and EDRM, discuss Clearwell Appliance characteristics, perform Clearwell application installation overview, preview Clearwell Login and UI fundamentals and describe High-level workflows with Clearwell.


  • Clearwell 7.x: Processing, Review and Export: Clearwell System Settings (2 of 12)
    The basic Clearwell appliance architecture is explained. You configure basic system setting options and manage system-level tasks. You manage backups that adhere to clients’ policies and requirements and use the Clearwell Utility to manage tasks, and understand Clearwell services. Finally, there is a discussion of working with Clearwell Support to efficiently resolve issues.


  • Clearwell 7.x: Processing, Review and Export: Case Creation and Management (3 of 12)
    You organize collected source data on your network for processing by Clearwell. Explain the All Cases area in Clearwell and manage case settings. You create a new case in Clearwell and select processing settings that fit your requirements.


  • Clearwell 7.x: Processing, Review and Export: Source Setup, Discovery and Processing (4 of 12)
    You initiate and manage Discovery jobs (Pre-Processing jobs). You use the pre-processing options to evaluate and cull data prior to processing. You also process data and track data processing jobs.


  • Clearwell 7.x: Processing, Review and Export: Document List, Filters and Analytics (5 of 12)
    You learn about the organization and features on the Document List page. You manage the search filters to filter and organize data, and use Clearwell’s analysis tools, including Discussion threads, Participants, Reports, and Find Similar.


  • Clearwell 7.x: Processing, Review and Export: Advanced Search and Predictive Coding (6 of 12)
    You use Clearwell’s Advanced Search capabilities to manage effective searching and formulate accurate keyword searches. You utilize Transparent Predictive Coding and its workflow within the Clearwell eDiscovery processes. Use Concept Search to explore and identify concepts and terms. Create and manage Saved Searches.


  • Clearwell 7.x: Processing, Review and Export: Tags and Folders (7 of 12)
    You create and manage tags and tag structures. Create and manage folders, batch folders, and assign folders for review. Apply tags or folders to large groups of documents.


  • Clearwell 7.x: Processing, Review and Export: User Setup and Management (8 of 12)
    You learn the details of user management, and discover the differences between System User and Case User setup. Set up User Profile and Roles for users. Manage Access Profiles for users.


  • Clearwell 7.x: Processing, Review and Export: Review Mode and Review Management (9 of 12)
    You discover the features and benefits available in the Review Mode in Clearwell. Use Redaction functionality to redact documents. Use Document Cache, Term Highlighting, Review Dashboard and other review management features.


  • Clearwell 7.x: Processing, Review and Export: Exporting Data – Native Only and Metadata Exports (10 of 12)
    Print documents to PDF or hard copy using Clearwell’s print functionality. Discover general workflow for creating and running exports. Perform Native Only exports from Clearwell. Perform Metadata exports from Clearwell.


  • Clearwell 7.x: Processing, Review and Export: Creating and Exporting Productions (11 of 12)
    Document production and the basic production workflow in Clearwell are explained. You create and manage a production in Clearwell. Export a production with appropriate format.


  • Clearwell 7.x: Processing, Review and Export: Clearwell Review (12 of 12)
    This lesson offers review and consolidation of comprehension of typical case workflow and Clearwell management procedures.



eDiscovery Platform 8
  • Symantec eDiscovery Platform 8.0: What's New (SEDP8 WN) Course Overview (1 of 14)
    This is an overview of the course.


  • SEDP8 WN Review Automation Rules (2 of 14)
    This module describes the new review automation rules, including: Background; Reasoning; Architecture; Configuration; Basic troubleshooting.


  • SEDP8 WN Mixed Mode Production Slip Sheets (3 of 14)
    This module describes the enhancements to production slip sheets, including: Purpose; Architecture; Basic troubleshooting.


  • SEDP8 WN Custodian Attribute Filtering for Enterprise Vault Collections (4 of 14)
    This module describes the new custodian attribute filtering, including: Background; Reasoning; Workflow; Basic troubleshooting


  • SEDP8 WN Load File Resilience: Auto Detection of File Encoding (5 of 14)
    This module describes the enhancements to Load File Imports, including: Purpose; Architecture; Basic troubleshooting.


  • SEDP8 WN Enhanced Permission (6 of 14)
    This module describes the enhancements to permissions, including: Purpose; Installation; Configuration; Working with enhanced permissions.


  • SEDP8 WN Componentized VM Deployments (7 of 14)
    This module describes the new componentized VM deployments, including: Background; Architecture; Installation; Configuration; Deployment; Basic Troubleshooting.


  • SEDP8 WN Enterprise Vault.cloud Collector (8 of 14)
    This module describes the new Enterprise Vault.cloud collections, including: Purpose; Architecture; Basic troubleshooting.


  • SEDP8 WN Item Level View (9 of 14)
    This module describes the enhancements to item level views, including: Background, requirements and prerequisites; Architecture; Installation; Configuration; Demonstration.


  • SEDP8 WN Legal Hold Formatting Toolbar (10 of 14)
    This module describes the new legal hold formatting toolbar, including: Background, requirements and prerequisites; Basic troubleshooting.


  • SEDP8 WN Improved Enterprise Vault Date Range Searches (11 of 14)
    This module describes the enhancements to Enterprise Vault date range searches, including: Background, requirements and prerequisites; Architecture; Installation; Configuration; Basic troubleshooting.


  • SEDP8 WN Lync 2013 Collections (12 of 14)
    This module describes the new Lync 2013 collections, including: Background, requirements and prerequisites; Architecture; Demonstration; Installation; Configuration; Deployment; Basic troubleshooting.


  • SEDP8 WN Tag and Folder Picker (13 of 14)
    This module describes the enhancements to the tag and folder picker, including: Background, requirements and prerequisites; Architecture; Deployment; Basic troubleshooting.


  • SEDP8 WN SharePoint Connector (14 of 14)
    This module describes the new SharePoint Connector, including: Background, requirements and prerequisites; Architecture; Installation; Configuration; Deployment; Basic troubleshooting.



Email Security.cloud
  • Symantec Email Data Protection- Customer Demonstration
    A walkthrough of the specific features and functionality of Email Data Protection. Upon completion of this course you will be better prepared to articulate the features of Email Data Protection and be able to create policies, rules, and actions to enforce company email policies.


  • Symantec Email Data Protection- Customer Migration Training
    For Partners and Customers who need to provide technical support. In this module you will learn about the Customer migration from the Email Content Control service to Email Data Protection.


  • Symantec Email Data Protection- Support Training
    For Partners and Customers who need to provide technical support. In this module you will learn about Email Data Protection, how to configure it in the Management Portal, new options in reporting, and how to troubleshoot it.


  • Symantec Email Security.cloud Supporting DMARC Validation
    This video will walk you through the DMARC addition to the inbound email scanning stack of technologies; including: —What it is; —Why it's been added; —How to enable the feature; —Where to find troubleshooting assistance.


  • Supporting Two-factor Authentication to the Administration Portal for Symantec.cloud
    This video will walk you through the Two Factor Authentication (2FA) and IP restriction enhancements to the .cloud administration portal. The session will specifically focus on: —What the functionality is for ; —Why it's been added; — How to enable the features ; —What the user experience will be like ; —Where to find troubleshooting assistance.



Endpoint Protection Small Business Edition
  • Creating and Using Groups in Symantec.cloud (Symantec Endpoint Protection Small Business Edition 2013 (SEPSBE)
    How groups are created and used within the Symantec.cloud management console.


  • Tips For a First Endpoint Protection Firewall Policy (SEPSBE)
    This video describes the changes necessary to the default Smart Firewall rule to enable File and Printer sharing and ping responses from local network computers.


  • Configuring Endpoint Protection Smart Firewall Rules (SEPSBE)
    This video describes how Smart Firewall works and how to configure outbound and inbound rules, protocols & ports, and blocking rules.


  • Creating Policies to Manage Endpoint Computers (SEPSBE)
    This program introduces Symantec.cloud global and service policies.


  • Using the SEPSBE 2013 Set Up Wizard
    Using the Symantec Endpoint Protection Small Business Edition 2013 set up Wizard. This program shows how to activate a new account, enter account information, how to use the cloud deployment options and how to download the On-Premises version.


  • Deploying SEPSBE 2013 with Active Directory on Windows Server 2003
    This video describes the basic steps of deploying Symantec Endpoint Protection Small Business Edition 2013 with Active Directory on Windows Server 2003.


  • Deploying SEPSBE 2013 with Active Directory on Windows Server 2008
    This video shows the basic steps for an Active Directory deployment of Symantec Endpoint Protection Small Business Edition 2013 on Windows Server 2008.


  • Configuring and Using Program Control (SEPSBE)
    This video provides a simple demonstration of configuring and using Program Control on your endpoints.



Endpoint Protection 11
  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Course Introduction (1 of 10)
    This module introduces Symantec Endpoint Protection 11.0: MR4, Install, Configure, and Deploy.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Endpoint Product Solution (2 of 10)
    This module describes Symantec Endpoint Protection and the differences between Symantec Endpoint Protection and legacy products. The module also describes state-of-the-art security protection technologies that are integrated into Symantec Endpoint Protection. In addition, you identify key product components and how policies, groups, subgroups, locations, location awareness, and inheritance relate to one another. Finally, you learn the topology and key design factors for a successful Symantec Endpoint installation.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Installing Endpoint Protection (3 of 10)
    This module identifies the software and hardware requirements to install Symantec Endpoint Protection and how to prepare computers for installation. The module also shows you how to install Symantec Endpoint Protection.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Managing Endpoint Protection (4 of 10)
    This module identifies important SEPM elements such as directories, files, logs, and processes. You also learn how to start and log on to the Symantec Endpoint Protection Manager (SEPM) navigate, and examine SEPM pages. In addition, you describe the purpose of each policy and associate policies with policy components. Finally, you describe how the SEPM and console communicate and also briefly describe how the SEPM communicates with its clients.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Deploying Clients (5 of 10)
    In this module, you prepare client packages for deployment and choose the appropriate client deployment method. You also install managed and unmanaged clients. In addition, you learn how to install an unmanaged detector, run client scans, manage client settings, and how to make changes to client groups, policies, and locations.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Configuring LiveUpdate Policies (6 of 10)
    This module describes how to configure SEPM settings for LiveUpdate and configure LiveUpdate policies for clients. You also identify other LiveUpdate distribution methods.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Configuring Antivirus and Antispyware Protection (7 of 10)
    This module describes the Antivirus and Antivirus policy sections and how to configure different types of antivirus scans. You also learn how to configure proactive threat scanning, quarantine infected files, and miscellaneous settings.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Active Directory Integration (8 of 10)
    This module describes Active Directory and how Active Directory is used with Symantec Endpoint Protection.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Migrating to Symantec Endpoint Protection (9 of 10)
    This module shows you how to prepare a SAV/SCS migration to Symantec Endpoint Protection using the Migration and Deployment Wizard. You also learn other methods to migrate earlier releases of Symantec Endpoint Protection to Symantec Endpoint Protection release 11.0.04.


  • Endpoint Protection 11: MR4 – Install, Configure and Deploy: Designing a Symantec Endpoint Protection Environment (10 of 10)
    This module describes the key factors to consider for architecting and designing a Symantec Endpoint Protection deployment, which includes how to determine client to SEPM ratios, which content distribution method to use, database and storage requirements, and user strategies.


  • Endpoint Protection 11: MR4 – Manage and Administer: Course Introduction (1 of 10)
    This module introduces Symantec Endpoint Protection 11.0: MR4, Manage and Administer


  • Endpoint Protection 11: MR4 – Manage and Administer: Introducing Network Threat Protection and Device Control (2 of 10)
    This module outlines the basics of network threat protection and firewall functions. The module also describes the purpose of Intrusion Prevention and Application and Device Control.


  • Endpoint Protection 11: MR4 – Manage and Administer: Configuring Firewall Policies (3 of 10)
    This module identifies the software and hardware requirements to install Symantec Endpoint Protection and how to prepare computers for installation. The module also shows you how to install Symantec Endpoint Protection.


  • Endpoint Protection 11: MR4 – Manage and Administer: Managing Intrusion Prevention System Policies(4 of 10)
    This module shows you how to configure Intrusion Prevention policies and policy settings. The module also describes how to manage custom signatures and libraries.


  • Endpoint Protection 11: MR4 – Manage and Administer: Configuring Application and Device Control Policies (5 of 10)
    In this module, you create Application and Device Control polices and define application and device control settings. You also add firewall rule conditions with actions and change the rule order or rule set mode.


  • Endpoint Protection 11: MR4 – Manage and Administer: Customizing Network Threat Protection and Application and Device Control (6 of 10)
    This module shows you how to manage locations and manage policy components. You also learn how to configure learned applications and system lockdown.


  • Endpoint Protection 11: MR4 – Manage and Administer: Configuring Additional Protection (7 of 10)
    This module describes how to configure tamper protection and centralized exceptions.


  • Endpoint Protection 11: MR4 – Manage and Administer: Monitoring and Reporting (8 of 10)
    This module describes Symantec Endpoint Protection monitoring and reporting features. You learn how to view summary data, view and manage logs, configure and view notifications, and create and view reports.


  • Endpoint Protection 11: MR4 – Manage and Administer: Performing Server and Database Management (9 of 10)
    This module shows you how to manage SEPM servers and server security. You learn how to communicate with other servers, manage administrators, manage databases, and how to recover from a disaster.


  • Endpoint Protection 11: MR4 – Manage and Administer: Installing Additional Management Components (10 of 10)
    This module shows you how to install additional LiveUpdate servers and install and configure the Central Quarantine. You also learn how to expand the management environment by installing additional management consoles and configure servers for failover, load balancing, and replication.


  • Endpoint Protection 11.0 - Component Communication
    This module reviews the Symantec Endpoint Protection communication architecture. You also learn how to monitor communication between the SEPM and Symantec Endpoint Protection clients.


  • Endpoint Protection 11.0 - Configuring Replication
    This module discusses why replication is important, how replication works, and common replication scenarios. You also learn how to configure replication and analyze replication logs.


  • Endpoint Protection 11.0 - Managing Database
    This module discusses the different types of SEPM and database failures and solutions. You learn how to back up and restore the database. You also learn how to gather critical recovery data that is necessary in case of a SEPM or database failure. Using this data, you learn how to recover from a SEPM or embedded database failure. In addition, you learn how to convert an embedded database to an MS SQL database.


  • Endpoint Protection 11.0 - Configuring Failover and Load Balancing
    This module covers Symantec Endpoint Protection failover and load balancing. You learn how to configure failover and load balancing by configuring management server lists and server priorities. You also learn how to analyze reports and use tools to troubleshoot common connection failures.


  • Endpoint Protection 11.0 - Performing Advanced Client Deployment
    In this module, you describe the components that comprise the Symantec Endpoint Protection client. You also troubleshoot Find Unmanaged Computers. In addition, you learn how clients are deployed using the Microsoft Installer and how Symantec Endpoint Protection integrates with the Symantec Management Platform.


  • Endpoint Protection 11.0 - Performing Advanced Client Management
    This module discusses how the SEPM requests and receives content updates. You learn how to configure LiveUpdate for the SEPM and for clients. You also describe how a Group Update Provider (GUP) works and identify issues associated with a GUP. In addition, you learn how to repair client definitions using the RX4DefsSEP Symantec support tool.


  • Endpoint Protection 11.0 - Securing Client Communication
    In this module you learn how to secure client communication using secured key encryption, content signing, and HTTPS (SSL) transport.


  • Endpoint Protection 11.0 - Analyzing Symantec Endpoint Protection Debug Logs
    This module discusses the Symantec Endpoint Protection Support Tool and how you can use this tool to gather data from your computer to be analyzed by Symantec Technical Support. You also learn how to troubleshoot SEPM and client problems by turning on and analyzing several SEPM and client debug logs.


  • Endpoint Protection 11.0 - Integration Component
    In this course, you will learn how to use Symantec Endpoint Protection Integration Component including the installation process, prerequisites, features and solutions. You will also learn how to install the Symantec Endpoint Protection Manager and initiate tasks and run reports. Interactive simulations help emphasize what you have learned.


  • Endpoint Protection 11.0 - Suggested Best Practices for Installing the Symantec Endpoint Protection Manager, Console, and Embedded Database
    This module describes the best practices to follow when installing the Symantec Endpoint Manager and client on a computer running a Windows server operating system.


  • Endpoint Protection 11.0 - Preparing Client Installations
    This module describes how to create and customize Symantec Endpoint Protection 11.x client configurations, feature sets, and install packages.


  • Endpoint Protection 11.0 - Changing Default Communications Ports used by Symantec Endpoint Protection
    This module describes the default communication ports that are used by the management server and console and how to change those ports when conflicts arise.


  • Endpoint Protection 11.0 - Deploying Clients
    This module defines the criteria that you need to consider before installing Symantec Endpoint Protection such as topology and organizational and sizing factors.


  • Endpoint Protection 11.0 - Organizing Servers, Sites, and Group Update Providers
    This module defines the criteria that you need to consider before installing Symantec Endpoint Protection such as topology and organizational and sizing factors.


  • Endpoint Protection 11.0 - Managing the Symantec Endpoint Protection Database
    This module describes the steps to maintain, backup and restore the Symantec Endpoint Protection database, whether using the embedded database or Microsoft SQL.


  • Endpoint Protection 11.0 - Managing TruScan
    This module describes how to treat possible false positives by verifying that traffic is not malicious and how you create an exception for the application that is generating the traffic. The module also describes how you can determine the cause of the traffic when the traffic is malicious.


  • Endpoint Protection 11.0 - Preparing for Disaster Recovery
    This module outlines the files and settings required and the steps to follow to perform a recovery of the Symantec Endpoint Protection Manager (SEPM).


  • Endpoint Protection 11.0 - Firewall Best Practices
    This module outlines the basic firewall components and describes the best practices for applying client firewalls in a Symantec Endpoint Protection environment.


  • Endpoint Protection 11.0 - How to use Application and Device Control
    This module describes how the Application and Device Control policy enables you to control access to a computer’s files, Registry keys, and processes. This module also describes how you can block users from attaching selected peripheral devices to desktop computers.


  • Endpoint Protection 11.0 - Troubleshooting Communication Between Symantec Endpoint Protection Manager (SEPM) and Clients
    This module explains best practices on troubleshooting communication issues between SEPM and clients.


  • Endpoint Protection 11.0 - Creating Basic Firewall and Antivirus Policy in Symantec Endpoint Protection in v11.x
    This module explains how to create, configure, and apply basic Firewall and Antivirus and Antispyware policies.



Endpoint Protection 12
  • SEP 12.1.4: The SEP Product Solution (1 of 5)
    In this module, you learn how to describe the Symantec Endpoint Protection security technologies, product architecture, and components. You are also introduced to site, domain, policy, group, and location concepts.


  • SEP 12.1.4: Designing a SEP Environment, Part 1 (2 of 5)
    In this module, you learn how to architect a SEP 12.1 environment. This module describes how to determine client-to-SEPM ratios, determine content distribution methods, and size the database.


  • SEP 12.1.4 Designing a SEP Environment, Part 2 (3 of 5)
    This modules continues Designing a Symantec Endpoint Protection Environment Part 1 with Replication Principles: Content and Backend


  • SEP 12.1.4: Introducing Antivirus, Insight, and SONAR (4 of 5)
    In this module, you learn how protection technologies are used to protect your clients. This module describes file reputation, Download Insight, Auto-Protect, and SONAR scans.


  • SEP 12.1.4: Introducing Network Threat Protection (5 of 5)
    In this module, you describe the OSI model (networking) and learn where in the model attacks are targeted. You also learn how attacks occur and how Symantec Endpoint Protection mitigates those attacks.


  • SEP 12.1.4: Deploying Mac Clients (1 of 5)
    You learn how to choose the best methods to deploy SEP for Mac clients and configure and run the SEP for Mac package for deployment using Symantec and Third-party tools.


  • SEP 12.1.4: Configuring Content Updates for Mac Clients (2 of 5)
    In this module, you learn how to keep the SEP for Mac client up to date with the latest available content. You also learn how to configure how and when the SEP for Mac client retrieves content. In addition, you learn how to configure the SEPM’s Apache Web server as a proxy server so that clients can retrieve content from the SEPM.


  • SEP 12.1.4: Managing Virus and Spyware Protection Policies for Mac (3 of 5)
    In this module, you learn how to configure scheduled scans, Auto-Protect, and Miscellaneous settings for Mac clients.


  • SEP 12.1.4 Managing Exception Policies (4 of 5)
    In this module, you learn how to create exceptions for Windows and Mac clients.


  • SEP 12.1.4: Managing Intrusion Prevention Policies (5 of 5)
    In this module, you configure network and browser intrusion prevention to prevent network and browser attacks using Symantec signatures. You also learn how to create custom signatures.


  • SEP 12.1.4: Virtualizing SEP clients
    In this module, you learn how SEP 12.1 manages virtual servers and clients. You also learn about virtual image exception, network and vShield shared insight cache, virtual client tagging, and the offline image scanner.


  • SEP 12.1 - Overview of the SEP 12.1 RU2 Release (1 of 3)
    This module discusses and overviews the changes to existing SEP features and examines new features addes with RU2.


  • SEP 12.1 - Enhancements to Existing SEP 12.1 Features (2 of 3)
    This module covers the deploying of GUPs on remote subnets, utilizing the Client Deployment Wizard, and implementation of client support for Mac OS X v10.8.


  • SEP 12.1 - New Features Introduced with the Release of SEP 12.1 RU2 (3 of 3)
    This module covers the implementation of Windows 8 support and technologies, and instroduces the vShield-enabled Shared Insight Cache.


  • SEP 12.1: Maintain & Tbshoot - Course Introduction (1 of 24)
    This module introduces the Symantec Endpoint Protection 12.1: Maintain and Troubleshoot course.


  • SEP 12.1: Maintain & Tbshoot - Monitoring Client-to-SEPM Communication (2 of 24)
    In this module, you learn how to monitor and troubleshoot communication between the SEP client and SEPM by analyzing the heartbeat sequence.


  • SEP 12.1: Maintain & Tbshoot - Client-to-SEPM Communication - Demo A (3 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Client-to-SEPM Communication - Demo B (4 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Maintaining the Symantec Endpoint Protection Environment (5 of 24)
    In this module, you learn how to maintain the SEP 12.1 environment through a series of health checks.


  • SEP 12.1: Maintain & Tbshoot - Maintaining the Symantec Endpoint Protection Environment - Demo (6 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Managing and Troubleshooting the SEPM (7 of 24)
    In this module, you learn how to troubleshoot the SEPM, database, and Apache Tomcat and Web servers.


  • SEP 12.1: Maintain & Tbshoot - Managing and Troubleshooting the SEPM - Demo A (8 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Managing and Troubleshooting the SEPM - Demo B (9 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Monitoring and Troubleshooting Content Distribution (10 of 24)
    In this module, you learn how to troubleshoot content distribution on the SEPM and client. You also learn how to use the group update provider (GUP) monitor and use Symantec-recommended best practices for installing GUPs.


  • SEP 12.1: Maintain & Tbshoot - Monitoring and Troubleshooting Content Distribution - Demo (11 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Maintaining and Troubleshooting Clients (12 of 24)
    In this module, you learn how to identify and resolve problems with SEP clients. You also learn how to upgrade SEP 11.x clients to SEP 12.1.x.


  • SEP 12.1: Maintain & Tbshoot - Maintaining and Troubleshooting Clients - Demo A (13 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Maintaining and Troubleshooting Clients - Demo B (14 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Monitoring and Troubleshooting Protection Technologies (15 of 24)
    In this module, you learn how protection technologies, such as SONAR and Insight Lookup, work together to protect your environment. You also learn how to identify and prevent false positives and submit false positives to Symantec.


  • SEP 12.1: Maintain & Tbshoot - Monitoring and Troubleshooting Protection Technologies - Demo A (16 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Monitoring and Troubleshooting Protection Technologies - Demo B (17 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Monitoring and Troubleshooting Network Threat Protection (18 of 24)
    In this module, you learn how to use Symantec-recommended best practices to create Application and Device Control rules and rulesets. You also learn how to block tethered devices using Location Awareness and Firewall rules.


  • SEP 12.1: Maintain & Tbshoot - Monitoring and Troubleshooting Network Threat Protection Demo (19 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Best Practices for Troubleshooting and Remediating a Virus Outbreak (20 of 24)
    In this module, you learn how to use Symantec-recommended best practices to troubleshoot and remediate a virus outbreak and prevent recurrence.


  • SEP 12.1: Maintain & Tbshoot - Best Practices for Troubleshooting and Remediating a Virus Outbreak - Demo (21 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Performing Advanced Monitoring Using IT Analytics (22 of 24)
    In this module, you learn how to use Symantec IT Analytics to create custom reports.


  • SEP 12.1: Maintain & Tbshoot - Performing Advanced Monitoring Using IT Analytics Demo - (23 of 24)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SEP 12.1: Maintain & Tbshoot - Providing Solutions to SEP 12.1 Case Studies (24 of 24)
    This module presents case studies for two poorly- designed Symantec Endpoint Protection installations. Based on the information presented, you determine how to best design these two installations to improve performance and increase protection. This module also presents Symantec-recommended solutions to these case studies.


  • Endpoint Protection 12.1: How to activate the license: (1 0f 9)
    This module describes how to activate the product by entering a serial number.


  • Endpoint Protection 12.1: How to create a client package with email notification : (2 of 9)
    This module demonstrates how to deploy the SEP client package using email notification.


  • Endpoint Protection 12.1: How to create a client package with single executable (3 of 9)
    This module describes how to deploy SEP client packages using the single executable method.


  • Endpoint Protection 12.1: How to install the client package using a single executable (4 of 9)
    This module explains how to install the client software from a previously created single executable package. It also shows how to check client product versions.


  • Endpoint Protection 12.1: How to create a notification (5 of 9)
    This module describes how to create notifications to alert the administrator of specific events.


  • Endpoint Protection 12.1: How to configure a LiveUpdate policy (6 of 9)
    This module demonstrates how to configure a LiveUpdate policy to enable automatic updates of definitions and signatures for the client.


  • Endpoint Protection 12.1: How to configure scheduled scans (7 of 9)
    This module demonstrates how to create a scheduled scan in the Virus and Spyware policy.


  • Endpoint Protection 12.1: How to configure Download Insight (8 of 9)
    This module explains how to configure Download Insight and SONAR settings in the Virus and Spyware policy.


  • Endpoint Protection 12.1: How to troubleshoot version and communication issues (9 of 9)
    This module explains how to check product versions on the client and the management console. It shows where to find information on content revisions to ensure they are up to date and also how to troubleshoot communication issues between the client and the SEP manager.


  • Endpoint Protection 12.1 Admin— Course Introduction- Install, Configure, and Deploy
    In this module, you learn about the different modules presented in this course and the prerequisite information.


  • Endpoint Protection 12.1 Admin— Symantec Endpoint Protection Product Solution
    In this lesson, you learn how Symantec Endpoint Protection protects your environment. You are also introduced to the new SEP 12.1 protection technologies and services, components, policy and group concepts, and product tiers.


  • Endpoint Protection 12.1 Admin— Installing Symantec Endpoint Protection
    In this lesson, you learn how to identify system requirements, prepare servers for installation, and install and configure the Symantec Endpoint Protection Manager (SEPM), and how to upgrade Symantec Endpoint Protection 11.x managers and clients to SEP 12.1.


  • Endpoint Protection 12.1 Admin— Configuring the Symantec Endpoint Protection Environment
    In this lesson, you learn how to start and navigate the SEPM, describe policy types and policy components, authenticate to the console, and license the SEP 12.1 environment.


  • Endpoint Protection 12.1 Admin— DEMO: Activate License Using Serial Number
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— DEMO: Create Administrators
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— Deploying Clients
    In this lesson, you learn the hardware and software requirements for SEP 12.1 clients and how to prepare those clients for deployments. You also learn the different SEP 12.1 deployment methods, and how to create installation packages, settings, and features for managed and unmanaged clients.


  • Endpoint Protection 12.1 Admin— DEMO: Deploy Clients Singleexe
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— DEMO: Install Client from Single Executable
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— Client and Policy Management
    In this lesson, you learn how the client communicates with the SEPM and how to perform client administration. You also learn how to configure groups, locations, client configuration modes, and domains. In addition, you learn how to integrate SEP 12.1 with Active Directory.


  • Endpoint Protection 12.1 Admin— DEMO: Manage Communications
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— DEMO: Troubleshoot Version and Communications
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— Configuring Content Updates
    In this lesson, you learn how to configure the SEPM and clients for content updates using LiveUpdate. You also learn how to configure single and multiple group update providers (GUPs), and how to manually update virus definitions.


  • Endpoint Protection 12.1 Admin— DEMO: Configure LU
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— Designing a Symantec Endpoint Environment
    In this lesson, you learn how to architect a SEP 12.1 environment. This lesson describes how to determine client-to-SEPM ratios, determine content distribution methods, and size the database.


  • Endpoint Protection 12.1 Admin— Course Introduction- Manage and Administer
    In this module, you learn about the different modules presented in this course and the prerequisite information.


  • Endpoint Protection 12.1 Admin— Introducing Antivirus, Insight, and SONAR
    In this lesson, you learn how protection technologies are used to protect your clients. This lesson describes file reputation, Download Insight, Auto-Protect, and SONAR scans.


  • Endpoint Protection 12.1 Admin— Managing Virus and Spyware Protection Policies
    In this lesson, you learn how to configure administrator-defined scans, protection technology settings and scans, e-mail scans, and advanced scanning options for Windows and Mac clients.


  • Endpoint Protection 12.1 Admin— DEMO: Configure Download Insight and SONAR
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— DEMO: Configure Scans
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— Managing Exception Policies
    In this lesson, you learn how to create exceptions for Windows and Mac clients.


  • Endpoint Protection 12.1 Admin— Introducing Network Threat Protection and Application and Device Control
    In this lesson, you learn network threat protection basics. This lesson also introduces you to firewalls, intrusion prevention, and application and device control.


  • Endpoint Protection 12.1 Admin— Managing Firewall Policies
    In this lesson, you learn how to configure the firewall, define rule components, configure built-in rules, protection, and stealth settings, and Windows integration.


  • Endpoint Protection 12.1 Admin— Managing Intrusion Prevention Policies
    In this lesson, you configure network and browser intrusion prevention to prevent network and browser attacks using Symantec signatures. You also learn how to create custom signatures.


  • Endpoint Protection 12.1 Admin— Managing Application and Device Control Policies
    In this lesson, you learn how to restrict access to applications and devices using the Application and Device policy.


  • Endpoint Protection 12.1 Admin— DEMO: Block Application from Running
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— Customizing Network Threat Protection and Application and Device Control
    In this lesson, you learn how to customize firewall policies, manage policy components, configure learned applications, and configure system lockdown.


  • Endpoint Protection 12.1 Admin— DEMO: Configure Location Awareness
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— Virtualization
    In this lesson, you learn how SEP 12. 1 manages virtual servers and clients. You also learn about virtual image exception, Shared Insight Cache, virtual client tagging, and the offline image scanner.


  • Endpoint Protection 12.1 Admin— Configuring Replication and Failover and Load Balancing
    In this lesson, you learn how replication works. You also learn how to configure replication and failover and load balancing.


  • Endpoint Protection 12.1 Admin— Performing Server and Database Management
    In this lesson, you learn how to manage SEPM servers, maintain server security, communicate with other servers, and manage administrators and the database. This lesson also covers disaster recovery techniques.


  • Endpoint Protection 12.1 Admin— Advanced Monitoring and Reporting
    In this lesson, you learn how to monitor SEP 12.1. You also learn how to analyze and manage logs, configure and view notifications, and run reports. In addition, this lesson introduces you to IT Analytics.


  • Endpoint Protection 12.1 Admin— DEMO: Create Notification
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • Endpoint Protection 12.1 Admin— Interfacing the SEPM with Protection Center
    In this lesson, you learn how the SEPM interfaces with Protection Center. You also learn how to make configuration changes and log on to the SEPM using Protection Center.



Enterprise Vault.cloud
  • Implementing EV.cloud: Configuring Exchange journaling for EV.cloud (1 of 7)
    In this module, you learn about how to configure, verify and troubleshoot Exchange journaling to Enterprise Vault.cloud.


  • Implementing EV.cloud: Configuring Domino journaling for EV.cloud (2 of 7)
    In this module, you learn about how to configure, verify and troubleshoot Domino journaling to Enterprise Vault.cloud.


  • Implementing EV.cloud: Setting up Office 365 to archive to EV.cloud (3 of 7)
    In this module, you learn about how to setup user synchronization and journaling from Office 365 to Enterprise Vault.cloud.


  • Implementing EV.cloud: Setting up CloudLink with Microsoft Exchange (4 of 7)
    In this module, you learn about how to install, configure, manage and troubleshoot the CloudLink application which helps with the deployment of Enterprise Vault.cloud.


  • Implementing EV.cloud: Setting up CloudLink with Lotus Domino (5 of 7)
    In this module, you learn about how to install, configure, manage and troubleshoot the CloudLink application which helps with the deployment of Enterprise Vault.cloud.


  • Implementing EV.cloud: Setting up Folder Sync (6 of 7)
    In this module, you learn about how to install, configure, manage and troubleshoot the Folder Sync application which synchronizes folders from a user’s Exchange mailbox to their Enterprise Vault.cloud archive.


  • Implementing EV.cloud: Setting up single sign-on to EV.cloud using ADFS (7 of 7)
    In this module, you learn about the basic architecture of using ADFS to enable single sign-on to Enterprise Vault.cloud. You also learn about the configuration steps within ADFS, EV.cloud and CloudLink for single sign-on with Enterprise Vault.cloud.


  • Getting to Know EV.cloud: Getting Started with Personal.cloud (1 of 5)
    In this module, you learn about how to navigate the Personal.cloud Interface, execute searches, view archived messages and reply/reply all/forward/compose messages in Personal.cloud.


  • Implementing EV.cloud: Going Further with Personal.cloud (2 of 5)
    In this module, you learn about folder structures in Personal.cloud, viewing messages for custodians, performing Advanced Searches and applying filters to searches.


  • Getting to Know EV.cloud: EV.cloud Mobile Web Access (3 of 5)
    In this module, you learn about how to browse emails with the mobile interface, execute searches in EV.cloud Mobile Web Access, compose/reply/reply all/forward, and tag messages.


  • Implementing Enterprise Vault.cloud: Discovery.cloud for Investigations (4 of 5)
    In this module, you learn about how to view mailboxes in Investigations, execute basic and advanced searches, tagging, printing and restoring messages, and exporting messages from Discovery.cloud Investigations.


  • Getting to Know EV.cloud: Discovery.cloud for eDiscovery (5 of 5)
    In this module, you learn about how create new matters for eDiscovery, search matters and save them, apply review statuses and export messages for eDiscovery.



Enterprise Vault 8 for Exchange
  • Moving an Archive to an Active Archive in a Different Site in EV 8 SP4
    Move Archive enables you to move inactive archives from the source Enterprise Vault site to active archives in another site. This is useful when you want to move an individual user's mailbox to a different Domino or Exchange mail server in another Enterprise Vault site.


  • Moving an Archive to an Inactive Archive in a Different Site in EV 8 SP4
    This module discusses moving a mail archive in the source site to an existing inactive archive or to a new archive in the destination site. However Enterprise Vault does not complete any shortcut processing because neither the source archive nor the destination archive is associated with an archiving enabled user.


  • Moving an Active Archive to a New Archive in Enterprise Vault 8 SP4
    This demonstration steps through the process of moving an active mailbox archive to a new archive within a site. The new archive in the destination vault store will automatically become the default archive for all subsequent archiving. Note that the move archive function requires Enterprise Vault 8, Service Pack 4 and higher.


  • Moving a Disabled Archive to an Active Archive in Enterprise Vault 8 SP4
    This demonstration steps through the process of moving a disabled mailbox archive to an active archive within a site. Note that the move archive function requires Enterprise Vault 8, Service Pack 4 and higher.


  • EV 8.0 - Installing the Enterprise Vault 8.0 Outlook Web Access (OWA) Extensions for Microsoft Exchange 2003
    This module demonstrates how to install the Enterprise Vault 8.0 Outlook Web Access extensions, which enable Enterprise Vault actions, icons, and buttons for OWA users.


  • EV 8.0 - Getting Started Wizard
    The module discusses how to configure EV quicker and simpler using the Getting Started Wizard to customize configuration settings. The GSW provides a guided workflow for archiving targets configuration using either the default or custom mode.


  • EV 8.0 - Managing Partition Rollover
    In the module Partition Rollover, learn how Partition Rollover is used in an Enterprise Vault environment is discussed. Topics include how to set up Partition Rollover and how to configure partitions so that they are ready when needed.


  • EV 8.0 - Desktop Policies
    This module discusses the new Enterprise Vault 8.0 Desktop Policy. The Desktop Policy contains properties that define the end users look and feel of the EV clients.


  • EV 8.0 - Common Task Launch Pad (CTLP) for Exchange Administration
    This module describes the layout of the new feature, Common Task Launch Pad (CTLP) and demonstrates what can be accomplished through the available icons.


  • EV 8.0 - Vault Cache
    This module explains how Vault Cache enables users to work offline while remaining synchronized with Enterprise Vault. The initial configuration of Vault Cache is discussed.


  • EV 8.0 - Virtual Vault
    In this module, you learn to describe the purpose and architecture of Virtual Vault. In addition, you learn the Virtual Vault features for delegation and Calendar items as well as how to deploy and support the feature.


  • EV 8.0 for Exchange - Introduction to Enterprise Vault (1 of 11)
    This module provides an overview of Enterprise Vault as a modular platform for archiving unstructured data from messaging and file servers. In addition, it describes the basic physical and logical components that comprise an Enterprise Vault deployment as well as some of the new features in Enterprise Vault 8.x.


  • EV8.0 for Exchange - Installing and Configuring Enterprise Vault (2 of 11)
    In this module, you learn the basic steps for planning and deployment, the requirements for installing Enterprise Vault, how to install the Enterprise Vault server software, how to run the configuration program, and how to configure administrative access.


  • EV 8.0 for Exchange - Configuring Vault Storage (3 of 11)
    This module describes archive storage and outlines the steps to create a Vault Store Group, Vault Store, and configure Vault Store Partitions. The module also covers how to configure Vault Site properties.


  • EV 8.0 for Exchange - Configuring Mail Archiving: Policies and Retention (4 of 11)
    This module covers the Enterprise Vault archiving strategy for mailboxes, how to configure Mailbox and Desktop policies, and how to define retention and deletion settings.


  • EV 8.0 for Exchange - Configuring Mail Archiving: Provisioning and Processing (5 of 11)
    In this module, you learn how to use Enterprise Vault granular provisioning and how to enable mailboxes for archiving.


  • EV 8.0 for Exchange – Managing Client Access: Outlook Clients (6 of 11)
    This module describes the functionality to access archived items from the Outlook client. In addition, it outlines how to install and configure the Outlook Add-Ins and the architecture and steps to access archived items from clients. The module also describes how to configure and manage the searching of Exchange archives.


  • EV 8.0 for Exchange – Managing Client Access: Outlook Web Access Extensions (7 of 11)
    In this module, you learn how to install, configure, and customize Enterprise Vault Outlook Web Access (OWA) Extensions, to enable users to access their archived items from OWA clients.


  • EV 8.0 for Exchange - Implementing Vault Cache (8 of 11)
    This module describes how to configure and use Vault Cache for offline access to archived files.


  • EV 8.0 for Exchange - Configuring Journal Archiving (9 of 11)
    This module identifies the working mechanism for Journal archiving and how to configure Exchange Journal archiving.


  • EV 8.0 for Exchange - Configuring Public Folder Archiving (10 of 11)
    In this module, you learn how to configure Exchange Public Folder archiving.


  • EV 8.0 for Exchange – Migrating PST Files (11 of 11)
    In this module, you learn the methods and strategies to migrate Exchange Personal Folders (PST) files.


  • EV 8.0 for Exchange – Managing Indexes (1 of 6)
    This module describes how Enterprise Vault processes and stores index files and how you can manage indexes using Enterprise Vault tools. You also learn how to move indexes and how to enable the Item Granularity schema.


  • EV 8.0 for Exchange – Configuring Auditing (2 of 6)
    This module covers how to establish and configure audit logging for Enterprise Vault.


  • EV 8.0 for Exchange – Monitoring Enterprise Vault (3 of 6)
    In this module, you lean to install, configure, and use Enterprise Vault Operations Manager monitoring and reporting. In addition, you learn how to manage different types of event logs, how to monitor Enterprise Vault performance as well as identify diagnostic tools and procedures use to effectively interact with Symantec Support.


  • EV 8.0 for Exchange - Backing up and Recovering Enterprise Vault (4 of 6)
    This module identifies Enterprise Vault components that must be backed up and describes how to back up and restore the components by placing them in Backup mode. In addition, you learn how to build failover protection into the Enterprise Vault environment using the building blocks configuration.


  • EV 8.0 for Exchange - Managing File System Archiving (5 of 6)
    In this module, you learn about the File System Archiving feature of Enterprise Vault and how to plan and implement File System Archiving. You also learn how to create archive points and retrieve archived files. In addition, you learn about deleting orphaned shortcuts, and finally, you identify the process of pruning versions of archived files.


  • EV 8.0 for Exchange - Managing File Lifecycle (6 of 6)
    This module describes how Enterprise Vault file lifecycle management uses configured policies to archive, migrate, delete, or block content. In addition, the module covers how to identify the types of data present and how to best manage the data.


  • EV 8.0 for Exchange – Architecture and Upgrade (1 of 12)
    This module provides the process flow of Enterprise Vault and the factors that influence optimal performance. In addition, you learn to upgrade from Enterprise Vault 7.0 to Enterprise Vault 8.0 and troubleshoot installation/upgrade issues.


  • EV 8.0 for Exchange – Using Enterprise Vault (2 of 12)
    In this module, you learn the steps involved in troubleshooting Enterprise Vault. The lesson also provides an overview of the Enterprise Vault directory. You also learn how Enterprise Vault uses MAPI to troubleshoot common problems.


  • EV 8.0 for Exchange – Microsoft Message Queues (3 of 12)
    In this module you learn about the various Microsoft Message Queues used by Enterprise Vault and monitoring these queues.


  • EV 8.0 for Exchange – Mailbox Synchronization and Archiving (4 of 12)
    In this module you learn about mailbox archiving and synchronization. The lesson discusses how to move a mailbox and updating moved items in a mailbox. In addition, you learn about the age and quota archiving strategy and the methods of troubleshooting mailbox archiving.


  • EV 8.0 for Exchange – Exchange Journal Archiving (5 of 12)
    In this module, you learn the architecture of journal archiving and learn to troubleshoot Exchange journal archiving.


  • EV 8.0 for Exchange – OWA and Client Troubleshooting (6 of 12)
    In this module you learn about the architecture of user extensions and troubleshooting them. In addition, you learn to troubleshoot OWA extensions and review the operation of OWA MSI control file updater.


  • EV 8.0 for Exchange – Troubleshooting Storage (7 of 12)
    In this module you will learn how the storage service works, and how to query the vault store database. You also learned to troubleshoot common problems with NTFS partitions. You also learn about vault store partition rollover, configuring automatic partition rollover, forcing partition rollover, and troubleshooting vault store partition rollover. In addition, the lesson discusses the new storage tools in Enterprise Vault 8.0.


  • EV 8.0 for Exchange – Troubleshooting Vault Cache (8 of 12)
    In this module you learn about the vault cache and its architecture. The lesson also discusses the vault cache workflow and troubleshooting vault cache.


  • EV 8.0 for Exchange – Troubleshooting Indexing and Searching (9 of 12)
    This module you learn about the architecture of indexing and troubleshooting common problems associated with indexing and searching.


  • EV 8.0 for Exchange – Enterprise Vault Policy Manager (EVPM) (10 of 12)
    In this module, you learn about the Enterprise Vault Manager functionality and setting up initialization files. In addition, the lesson discusses how to use EVPM to customize settings for public folder archiving.


  • EV 8.0 for Exchange – Troubleshooting Enterprise Vault (EV) Backup Mode (11 of 12)
    In this module, you learn about backup mode and its architecture. The lesson also discusses how to troubleshoot EV backup mode.


  • EV 8.0 for Exchange – File System Archiving (FSA) (12 of 12)
    In this module you learn about file system archiving and troubleshooting it. In addition, you learn about FSA Checkpointed scan and archive now shortcut later functionality.



Enterprise Vault 2007
  • EV 2007 - Monitoring with Enterprise Vault Operations Manager
    The module, Monitoring with Enterprise Vault Operations Manager (EVOM) describes how to use Enterprise Vault Operations Manager to monitor your Enterprise Vault servers. You learn about the features of EVOM, how to install and configure monitoring, and you look at what parameters can be configured.


  • EV 2007- Using Enterprise Vault Reporting
    The module, Using Enterprise Vault Reporting describes how to use Enterprise Vault Reporting to obtain detailed reports on the status of Enterprise Vault servers. You learn about the features of reporting, how to access reports, and you look at the data displayed in sample reports.


  • EV 2007- Using Offline Vault
    In the module Using Offline Vault, you learn how Offline Vault is incorporated in an Enterprise Vault environment. You learn how to set up Offline Vault and how to configure the various vault options.


  • EV 2007- Restoring Enterprise Vault
    The module, Restoring Enterprise Vault looks at the procedures that you need to follow to recover your Enterprise Vault system after a system failure. You look at the steps involved in a data-only restore and a full application recovery.


  • EV 2007 - How to Configure Exchange 2007 Extensions
    In this module, you will learn about installing and troubleshooting the extensions that allow end-users to access archived mail.


  • EV 2007 - New File System Archiving (FSA) Features and How to Configure them
    The topics of this module include FSA features, installing the FSA Agent, FSA File Blocking, FSA Reporting and FSA Retention Folders.


  • EV 2007 - How System Administrators Configure Lotus Domino Mailbox Archiving
    This module will cover five topics: Prerequisites, Installation basics, Setting up and configuring the Domino gateway, Using EVinstall.nsf to install the Enterprise Vault mail templates, and Implementing the Enterprise Vault mail templates.


  • EV 2007 - How System Administrators Configure Lotus Domino Mailbox Archiving Policies and Provisioning
    In this module, you will learn how to configure a provisioning group and deploy an archive policy.


  • EV 2007 - How to Configure Lotus Domino and Notes Mailbox Features for End-Users
    The topics of this module include modifications and new features of the Lotus clients during the Enterprise Vault installation and configuration process, features of the Domino web Access client and Enterprise Vault end user search capabilities for Lotus Notes archives.



Enterprise Vault 8 for Domino
  • EV 8.0 for Domino: Introduction to Enterprise Vault (1 of 10)
    This module provides an overview of Enterprise Vault as a modular platform for archiving unstructured data from messaging and file servers. In addition, it describes the basic physical and logical components that comprise an Enterprise Vault deployment as well as some of the new features in Enterprise Vault 8.x.


  • EV 8.0 for Domino: Preparing for Domino Archiving (2 of 10)
    This module describes the components for Domino mail archiving as well as basic deployment guidelines. The module also describes how to prepare the Domino environment and the Enterprise Vault Domino Gateway.


  • EV 8.0 for Domino: Installing and Configuring Enterprise Vault (3 of 10)
    In this module, you learn the basic steps for planning and deployment, the requirements for installing Enterprise Vault, how to install the Enterprise Vault server software, how to run the configuration program, and how to configure administrative access.


  • EV 8.0 for Domino: Configuring Vault Storage (4 of 10)
    This module describes archive storage and outlines the steps to create a Vault Store Group, Vault Store, and configure Vault Store Partitions. The module also covers how to configure Vault Site properties.


  • EV 8.0 for Domino: Configuring Mail Archiving: Policies and Retention (5 of 10)
    This module covers the Enterprise Vault archiving strategy for mailboxes, how to configure Mailbox and Desktop policies, and how to define retention and deletion settings.


  • EV 8.0 for Domino: Configuring Mail Archiving: Provisioning and Processing (6 of 10)
    In this module, you learn how to use Enterprise Vault granular provisioning and how to enable mailboxes for archiving.


  • EV 8.0 for Domino: Client Extensions (7 of 10)
    This module describes the functionality to access archived items from Lotus Notes and DWA. In addition, it outlines how to install and configure Lotus Notes client extensions and the architecture and steps to access archived items from clients. The module also describes how to configure and manage the searching of Domino archives.


  • EV 8.0 for Domino: Implementing Vault Cache (8 of 10)
    This module describes how Vault Cache is incorporated in an Enterprise Vault environment and how to enable and configure the Vault Cache options.


  • EV 8.0 for Domino: Configuring Journal Archiving (9 of 10)
    This module identifies the working mechanism for Journal Archiving, the Domino prerequisites, and how to configure Journal Archiving.


  • EV 8.0 for Domino: NSF Mail File Migration (10 of 10)
    In this module, you learn the steps to plan for NSF mail migration and perform an NSF mail migration using the NSF Mail Migrator Wizard.


  • EV 8.0 for Domino: Managing Indexes (1 of 6)
    This module describes how Enterprise Vault processes and stores index files and how you can manage indexes using Enterprise Vault tools. You also learn how to move indexes and how to enable the Item Granularity schema.


  • EV 8.0 for Domino: Configuring Auditing (2 of 6)
    This module covers how to establish and configure audit logging for Enterprise Vault.


  • EV 8.0 for Domino: Monitoring Enterprise Vault (3 of 6)
    In this module, you lean to install, configure, and use Enterprise Vault Operations Manager monitoring and reporting. In addition, you learn how to manage different types of event logs, how to monitor Enterprise Vault performance as well as identify diagnostic tools and procedures use to effectively interact with Symantec Support.


  • EV 8.0 for Domino: Backing up and Recovering Enterprise Vault (4 of 6)
    This module identifies Enterprise Vault components that must be backed up and describes how to back up and restore the components by placing them in Backup mode. In addition, you learn how to build failover protection into the Enterprise Vault environment using the building blocks configuration.


  • EV 8.0 for Domino: Managing File System Archiving (5 of 6)
    In this module, you learn about the File System Archiving feature of Enterprise Vault and how to plan and implement File System Archiving. You also learn how to create archive points and retrieve archived files. In addition, you learn about deleting orphaned shortcuts, and finally, you identify the process of pruning versions of archived files.


  • EV 8.0 for Domino: Managing File Lifecycle (6 of 6)
    This module describes how Enterprise Vault file lifecycle management uses configured policies to archive, migrate, delete, or block content. In addition, the module covers how to identify the types of data present and how to best manage the data.



Enterprise Vault 9 for Exchange
  • EV 9.0 for Exchange: Installation Prerequisites and the Deployment Scanner (1 of 4)
    This module describes the system and environment prerequisites required to install Enterprise Vault 9.0. It also demonstrates the deployment scanner.


  • EV 9.0 for Exchange: Installing Enterprise Vault (2 of 4)
    This module demonstrates how to install Enterprise Vault 9.0.


  • EV 9.0 for Exchange: The Configuration Wizard (3 of 4)
    This module explains how to configure Enterprise Vault 9.0 using the Configuration Wizard.


  • EV 9.0 for Exchange: The Getting Started Wizard (4 of 4)
    This module discusses how to configure Enterprise Vault 9.0 using the Getting Started Wizard (GSW). The GSW provides a guided workflow for configuration using either default or custom mode.


  • EV 9.0 for Exchange: Configuring Indexes
    This module describes indexing and demonstrates how to add index locations.


  • EV 9.0 for Exchange: Configuring Vault Storage
    This module demonstrates how to create a Vault Store Group and a Vault Store, and how to configure Vault Store Partitions using the Enterprise Vault Administration Console. It also describes how to configure Vault sharing levels.


  • EV 9.0 for Exchange: Configuring Mailbox Archiving: Policies (1 of 2)
    This module explains the phases involved in setting up mail archiving and demonstrates how to configure Mailbox and Desktop policies.


  • EV 9.0 for Exchange: Configuring Mailbox Archiving: Provisioning and Processing (2 of 2)
    This module discusses Enterprise Vault granular provisioning and demonstrates how to enable mailboxes for archiving.


  • EV 9.0 for Exchange: Managing Client Access: Outlook Clients (1 of 2)
    This module discusses the different Outlook Add-In types and how they are used to access archived items.


  • EV 9.0 for Exchange: Managing Client Access: OWA 2010 (2 of 2)
    This module demonstrates how to install and configure Enterprise Vault OWA Extensions to enable users to access their archived items from their OWA 2010 clients. It also describes how to customize the OWA extension.


  • EV 9.0 for Exchange: Journal Archiving
    This module explains how to check if Exchange message journaling is enabled and how to configure Journal Archiving using the Enterprise Vault Administration Console.


  • EV 9.x for Exchange: Introduction to Enterprise Vault (1 of 16)
    In this module, you learn about Enterprise Vault archiving for unstructured data from messaging and file servers. In addition, you learn the basic physical and logical components that comprise an Enterprise Vault deployment.


  • EV 9.x for Exchange: Installing and Configuring Enterprise Vault (2 of 16)
    In this module, you learn what needs to be prepared before installing Enterprise Vault, how to install the Enterprise Vault server software, and how to run the configuration program.


  • EV 9.x for Exchange: Configuring Vault Storage (3 of 16)
    In this module, you learn how to create a Vault Store Group and a Vault Store, and how to configure Vault Store partitions using the Enterprise Vault Administration Console. You also learn how to configure sharing levels to determine single instance storage boundaries.


  • EV 9.x for Exchange: Configuring Mailbox Archiving: Policies (4 of 16)
    In this module, you learn how to use the Administration Console to define an archiving strategy for mailboxes and how to configure mailbox and desktop policies.


  • EV 9.x for Exchange: Configuring Mailbox Archiving: Provisioning and Processing (5 of 16)
    In this module, you learn how to use Enterprise Vault granular provisioning and how to enable mailboxes for archiving. In addition, you learn how to configure retention and deletion settings.


  • EV 9.x for Exchange: Managing Client Access: Outlook Clients (6 of 16)
    In this module, you learn about the different Outlook Add-In modes and how they are used to access archived items. In addition, you identify the different buttons, icons, and menu options available in the Outlook Add-In interface and learn how to customize them. Finally, you learn how to use Archive Explorer and other search tools.


  • EV 9.x for Exchange: Managing Client Access: Outlook Web Access/App (OWA) (7 of 16)
    In this module, you learn how to install, configure, and customize Enterprise Vault OWA Extensions to enable users to access archived items from their OWA clients.


  • EV 9.x for Exchange: Managing Client Access: Vault Cache and Virtual Vault (8 of 16)
    In this module, you learn how Vault Cache and Virtual Vault are incorporated in an Enterprise Vault environment. You identify the different modes in which Vault Cache can operate. You also learn how to set up Enterprise Vault Cache and Virtual Vault and how to configure the various options. Finally, you learn how to use Vault Cache and Virtual Vault options and search.


  • EV 9.x for Exchange: Configuring Journal Archiving (9 of 16)
    In this module, you identify the working mechanism for journal archiving. In addition, you learn how to configure journal archiving using the Administration Console.


  • EV 9.0 for Exchange: Preparing for Exchange 2010 Archiving
    This module discusses the Exchange 2010 Target Selection phase of the Getting Started Wizard and demonstrates the new pre-requisites for Exchange 2010 archiving. It also describes how to configure CAS proxying.


  • EV 9.0 for Exchange: Assigning Exchange 2007 and Exchange 2010 Permissions for Enterprise Vault
    This module demonstrates how to assign permissions to Exchange 2007 and Exchange 2010 servers in order to allow archiving.


  • EV 9.x for Exchange: Configuring Indexes and Search (10 of 16)
    In this module, you learn how Enterprise Vault processes and stores Index files and how you can manage Indexes using Enterprise Vault tools.


  • EV 9.x for Exchange: Archiving Public Folders (11 of 16)
    In this module, you learn about the architecture of public folder archiving and how to configure it using the Administration Console.


  • EV 9.x for Exchange: Migrating PST Files (12 of 16)
    In this module, you learn about the importance of migrating PST files. In addition, you learn how to use the Locate, Collect, and Migrate method for migrating PST files. You also learn how to perform migration using the client-driven method.


  • EV 9.x for Exchange: Monitoring and Reporting Enterprise Vault (13 of 16)
    In this module, you learn which functions and items you can monitor, how to manage the different types of event logs, and how to monitor Enterprise Vault performance. In addition, you identify diagnostic tools and procedures that you can use to effectively interact with Symantec Support.


  • EV 9.x for Exchange: Backing Up and Recovering Enterprise Vault (14 of 16)
    In this module, you learn to identify which Enterprise Vault components must be backed up. In addition, you learn how to back up and restore Enterprise Vault by placing components in backup mode.


  • EV 9.x for Exchange: Expanding the Environment (15 of 16)
    In this module, you learn about scaling an Enterprise Vault environment and how to configure properties for an Enterprise Vault Site. You also learn how to use roles-based administration to control console access and privileges. In addition, you learn about Enterprise Vault server failover.


  • EV 9.x for Exchange: Introduction to File System Archiving (FSA) and SharePoint Archiving (Optional) (16 of 16)
    In this module, you learn about the File System Archiving features of Enterprise Vault and file lifecycle management. In addition, you learn about the key points of Enterprise Vault archiving for SharePoint.



Enterprise Vault 9 for Domino
  • EV 9.0 for Domino: Introduction to Enterprise Vault (1 of 14)
    In this module, you learn about the business challenges addressed by Enterprise Vault and major system components and basic architecture of an Enterprise Vault system. You will also learn about the basic architecture of Domino archiving.


  • EV 9.0 for Domino: Installing and Configuring Enterprise Vault (2 of 14)
    In this module, you learn about the basic considerations when deploying Enterprise Vault.. You also identify the installation pre-requisites for Enterprise Vault and how to install the software. In addition, you learn how to run the Enterprise Vault Configuration Wizard and install an Enterprise Vault Domino Gateway.


  • EV 9.0 for Domino: Post Installation Configuration (3 of 14)
    In this module, you learn about the tools used to administer Enterprise Vault and how to setup administrative security, configure site properties and create index locations.


  • EV 9.0 for Domino: Configuring Vault Storage (4 of 14)
    In this module, you learn about the archive storage architecture and how to use the Administration Console to create a Vault Store Group, Vault Store and Vault Store Partition for the storage of archived items. You will also learn about how to configure sharing levels for Vault Store Groups.


  • EV 9.0 for Domino: Configuring Mailbox Archiving: Policies and Retention (5 of 14)
    In this module, you learn about the tasks, services, and processes involved in Domino mailbox archiving and the overall phases for setting up Domino mailbox archiving. You will also learn about the initial steps of setting up Domino mailbox archiving including creating targets, policies and Retention Categories.


  • EV 9.0 for Domino: Configuring Mailbox Archiving: Provisioning and Processing (6 of 14)
    In this module, you learn about how to complete the setup of Domino mailbox archiving including how to configure granular provisioning for Domino mailbox archiving, enabling Domino mail files for archiving and running the Domino Mailbox Archiving task for the first time.


  • EV 9.0 for Domino: Managing Client Access (7 of 14)
    In this module, you learn about the functionality of the client extensions for Lotus Notes and iNotes and how to install and configure them. You also learn about the basic architecture of accessing archived items and searching for them.


  • EV 9.0 for Domino: Vault Cache (8 of 14)
    In this module, you learn about how Vault Cache provides offline access to archived items from Lotus Notes, how to perform an initial configuration of Vault Cache and how to customize Vault Cache settings.


  • EV 9.0 for Domino: Configuring Journal Archiving (9 of 14)
    In this module, you learn about how Domino Journal Archiving works, the requirements for setting up Domino Journal Archiving and how to set up and configure Domino Journal Archiving.


  • EV 9.0 for Domino: Migrating NSF Mail Files (10 of 14)
    In this module, you learn you learn about the reasons for migrating NSF mail files into archives and how to prepare for and conduct a NSF mail file migration using the NSF Mail Migrator wizard and a scripted migration using EVPM.


  • EV 9.0 for Domino: Managing Indexes (11 of 14)
    In this module, you learn about the basic architecture of indexing, how to manage indexes using various administrative tools and about how the Item Granularity schema enhances search performance.


  • EV 9.0 for Domino: Configuring Reporting and Monitoring (12 of 14)
    In this module, you learn about how to install and configure Enterprise Vault monitoring and reporting, access Enterprise Vault event logs, configure automatic monitoring of Enterprise Vault servers and run basic diagnostic tools.


  • EV 9.0 for Domino: Backing up and Recovering Enterprise Vault (13 of 14)
    In this module, you learn about the Enterprise Vault components that need to be backed up to ensure that an Enterprise Vault system can be fully restored. You also learn about how to set Backup Mode on a Vault Store and Index location and how to recover Enterprise Vault after a system failure.


  • EV 9.0 for Domino: Expanding the Environment (14 of 14)
    In this module, you learn about scaling an Enterprise Vault environment and about how to maintain high availability for Enterprise Vault services using Building Blocks and clustering solutions.


  • Setting Up Vault Cache in Enterprise Vault for Lotus Domino
    This module provides administrators with the information necessary to set up and configure Vault Cache in Enterprise Vault for Lotus Domino.



Enterprise Vault 10 for Exchange
  • Enterprise Vault 10 Client: Archive Explorer - DEMO (1 of 12)
    Demo of Archiving Explorer to access Archived data.


  • Enterprise Vault 10 Client: Deleting Items - DEMO (2 of 12)
    Demo of deleting archived items.


  • Enterprise Vault 10 Client: Embedded And Browser Search - DEMO (3 of 12)
    Demo of searching archived items.


  • Enterprise Vault 10 Client: Manual Archiving Using Outlook 2007 - DEMO (4 of 12)
    Demo of manually archiving an item using Outlook 2007.


  • Enterprise Vault 10 Client: Manual Archiving Using Outlook 2010 - DEMO (5 of 12)
    Demo of manually archiving an item using Outlook 2010.


  • Enterprise Vault 10 Client: Outlook 2007 EV Client Overview- DEMO (6 of 12)
    Demo of Outlook 2007 EV client overview.


  • Enterprise Vault 10 Client: Outlook 2010 EV Client Overview - DEMO (7 of 12)
    Demo of Outlook 2010 EV client overview.


  • Enterprise Vault 10 Client: Outlook Client Overview (8 of 12)
    Outlook client overview.


  • Enterprise Vault 10 Client: Restore Item in Outlook 2007 - DEMO (9 of 12)
    Demo of restoring an archived item in Outlook 2007.


  • Enterprise Vault 10 Client: Restore Item in Outlook 2010 - DEMO (10 of 12)
    Demo of restoring an archived item in Outlook 2010.


  • Enterprise Vault 10 Client: Retrieving an Item - DEMO (11 of 112)
    Demo of retrieving an item from an archive.


  • Enterprise Vault 10 Client: Vault Cache and Virtual Vault - DEMO (12 of 12)
    Demo of using vault cache and virtual vault.


  • Changes to Accelerator Searches in Symantec Enterprise Vault 10
    This module covers changes to the Enterprise Vault 10 accelerators, including Accelerator search changes for 64-bit indexing and archive selection during search creation.


  • EV 10 for Exchange Admin Course Introduction (1 of 43)
    This module provides an overview of the course.


  • EV 10 for Exchange Admin Introduction to Enterprise Vault (2 of 43)
    In this module, you learn about Enterprise Vault archiving for unstructured data from messaging and file servers. In addition, you learn the basic physical and logical components that comprise an Enterprise Vault deployment.


  • EV 10 for Exchange Admin Initial Configuration of Enterprise Vault (3 of 43)
    In this module, you learn what needs to be prepared before installing Enterprise Vault, how to install the Enterprise Vault server software, and how to run the configuration program.


  • EV 10 for Exchange Admin Demo—Configuring Enterprise Vault (4 of 43)
    In this demonstration, you see how to run the Enterprise Vault Configuration Wizard, as all prerequisites for Enterprise Vault are already installed and configured and the Enterprise Vault binaries are already installed. By running the Enterprise Vault Configuration Wizard, you see the choices necessary to complete this phase of Enterprise Vault configuration. Using the Enterprise Vault Configuration Wizard, you establish the basic configuration of the Enterprise Vault server, including: Creating a Vault Directory; Specifying an Enterprise Vault Service Account; Defining the location of the SQL server; Defining database and transaction log locations; Selecting Enterprise Vault services to install.


  • EV 10 for Exchange Admin Administering Enterprise Vault (5 of 43)
    In this module, you learn how to access and use the Enterprise Vault Administration Console options and how to deploy roles-based administration (RBA) for Administration Console access. In addition, you learn how to configure initial Enterprise Vault system requirements.


  • EV 10 for Exchange Admin Demo—Administering Enterprise Vault (6 of 43)
    In this demonstration, you familiarize yourself with the Administration Console, implement several important general configuration settings and set up roles-based administration.


  • EV 10 for Exchange Admin Configuring Vault Storage (7 of 43)
    In this module, you learn how to create a Vault Store Group and a Vault Store, and how to configure Vault Store partitions using the Enterprise Vault Administration Console. You also learn how to configure sharing levels to determine single instance storage boundaries.


  • EV 10 for Exchange Admin Demo—Configuring Vault Storage (8 of 43)
    Before any archiving can take place, storage locations must be defined. In this demonstration, storage locations are defined. Storage in Enterprise Vault consists of the following objects: Vault Store Groups; Vault Stores; Vault Store Partitions.


  • EV 10 for Exchange Admin Configuring Mailbox Archiving: Overview and Policies (9 of 43)
    In this module, you learn how to use the Administration Console to define an archiving strategy for mailboxes and how to configure mailbox and desktop policies.


  • EV 10 for Exchange Admin Demo—Configuring Mailbox Archiving: Overview and Policies (10 of 43)
    In this demonstration, you see the steps required to implement Exchange mailbox archiving. You manually perform the steps using the Administration Console. The steps included in this demo are: Implementing Exchange archiving prerequisites; Establishing archive targets; Creating Mailbox and Desktop policies.


  • EV 10 for Exchange Admin Configuring Mailbox Archiving: Provisioning and Processing (11 of 43)
    In this module, you learn how to use Enterprise Vault provisioning and how to enable mailboxes for archiving. In addition, you learn how to configure retention and deletion settings.


  • EV 10 for Exchange Admin Demo—Configuring Mailbox Archiving: Provisioning and Processing (12 of 43)
    In this demonstration, you perform the necessary steps to configure Exchange mailbox archiving. You manually perform the steps using the Administration Console. The steps included in this demonstration are: Creating Retention Categories; Preparing the Welcome message; Provisioning mailboxes; Enabling mailboxes; Archiving mail items; Searching mailbox archives.


  • EV 10 for Exchange Admin Managing Client Access: Outlook Clients (13 of 43)
    In this module, you learn the different Outlook Add In modes and how they are used to access archived items. In addition, you identify the different buttons, icons, and menu options available in the Outlook Add-In interface and learn how to customize them.


  • EV 10 for Exchange Admin Demo—Managing Client Access: Outlook Clients (14 of 43)
    In this demonstration, you investigate how Microsoft Outlook client access works and customize Outlook Add-Ins.


  • EV 10 for Exchange Admin Demo—Exploring Savesets and Single Instance Storage (15 of 43)
    In this demonstration, you investigate how Symantec Enterprise Vault stores files and provides optimized single instance storage (OSIS)


  • EV 10 for Exchange Admin Managing Client Access: Outlook Web Access/App (OWA) (16 of 43)
    In this module, you learn how to install, configure, and customize Enterprise Vault OWA Extensions to enable users to access archived items from their OWA clients.


  • EV 10 for Exchange Admin Demo—Managing Client Access: Outlook Web Access/App (OWA) (17 of 43)
    In this demonstration, you install and configure the Enterprise Vault Outlook Web App (OWA) Extensions so archived items can be accessed from OWA clients. The sections included in this demonstration are: Accessing Outlook Web App; Installing and configuring the OWA Extensions; Exploring Enterprise Vault OWA Extensions features; Customizing the Enterprise Vault OWA Extensions.


  • EV 10 for Exchange Admin Managing Client Access: Vault Cache and Virtual Vault (18 of 43)
    In this module, you learn how Vault Cache and Virtual Vault are incorporated in an Enterprise Vault environment. You identify the different modes in which Vault Cache can operate. You also learn how to set up Enterprise Vault Cache and Virtual Vault and how to configure the various options. Finally, you learn how to use Vault Cache and Virtual Vault options and search.


  • EV 10 for Exchange Admin Demo—Managing Client Access: Vault Cache and Virtual Vault (19 of 43)
    In this demonstration, you configure and test Vault Cache and Virtual Vault within Microsoft Outlook. The sections in this demonstration are: Establishing Vault Cache and Virtual Vault prerequisites; Enabling Vault Cache and Virtual Vault and synchronizing Vault Cache; Configuring and working with multiple mailboxes and vaults; Testing Vault Cache and Virtual Vault.


  • EV 10 for Exchange Admin Configuring Journal Archiving (20 of 43)
    In this module, you identify the working mechanism for journal archiving. In addition, you learn how to configure journal archiving using the Administration Console.


  • EV 10 for Exchange Admin Demo—Configuring Journal Archiving (21 of 43)
    In this demonstration, you verify that Exchange journaling is functioning, then set up and test Enterprise Vault journal archiving.


  • EV 10 for Exchange Admin Demo—Vault Store Partition Rollover (22 of 43)
    In this demonstration, you create two additional Vault Store Partitions for a Vault Store and configure the Partitions for Partition rollover.


  • EV 10 for Exchange Admin Configuring and Managing Indexes (23 of 43)
    In this module, you learn how Enterprise Vault processes and stores Index files and how you can manage Indexes using Enterprise Vault tools.


  • EV 10 for Exchange Admin Demo—Configuring and Managing Indexes (24 of 43)
    In this demonstration, you review the steps to configure and manage indexes including the Index Volumes Browser. The sections in this demonstration are: Configuring Indexes; Reviewing indexing options and features; Using the Index Volumes Browser.


  • EV 10 for Exchange Admin Demo—Managing Indexes: Verify (25 of 43)
    In this demonstration, you use the Manage Indexes tool, verify feature. This demonstration provides students the opportunity to investigate and use the Manage Indexes and the Monitor Indexing Tasks tools.


  • EV 10 for Exchange Admin Demo—Managing Indexes: Synchronize (26 of 43)
    In this demonstration, you use the Manage Indexes tool, synchronize feature. This demonstration provides students the opportunity to investigate and use the Manage Indexes and the Monitor Indexing Tasks tools.


  • EV 10 for Exchange Admin Demo—Managing Indexes: Change Location (27 of 43)
    In this demonstration, you use the Manage Indexes tool, Change Location feature. This demonstration provides students the opportunity to investigate and use the Manage Indexes and the Monitor Indexing Tasks tools.


  • EV 10 for Exchange Admin Demo—Managing Indexes: Rebuild (28 of 43)
    In this demonstration, you use the Manage Indexes tool, Rebuild feature. This demonstration provides students the opportunity to investigate and use the Manage Indexes and the Monitor Indexing Tasks tools.


  • EV 10 for Exchange Admin Searching Archives (29 of 43)
    In this module, you learn how to use Archive Explorer and the Archive Search Client tools to access archived items. In addition, you learn how to support mobile users. Finally, you are introduced to the search capabilities of Discovery Accelerator.


  • EV 10 for Exchange Admin Demo—Searching Archives (30 of 43)
    In this demonstration, you investigate Enterprise Vault user search capabilities, including: Integrated search; Browser Search; Archive Explorer.


  • EV 10 for Exchange Admin Migrating PST Files (31 of 43)
    In this module, you learn about the importance of migrating PST files. In addition, you learn how to use the Locate, Collect, and Migrate method for migrating PST files. You also learn how to perform migration using the client-driven method.


  • EV 10 for Exchange Admin Demo—Migrating PST Files: Preparation (32 of 43)
    In this demonstration, you perform the preparation for the migration of PST files.


  • EV 10 for Exchange Admin Demo—Migrating PST Files: Client-Driven Migration (33 of 43)
    In this demonstration, we will perform a Client-Driven PST file migration.


  • EV 10 for Exchange Admin Demo—Migrating PST Files: Locate and Migrate PST Files Migration (34 of 43)
    In this demonstration, you perform a Locate and Migrate PST file migration.


  • EV 10 for Exchange Admin Demo—Migrating PST Files: PST Migration Wizard (35 of 43)
    In this demonstration, you export an archive into a PST file and use a PST Migration Wizard method to migrate PST files.


  • EV 10 for Exchange Admin Backing Up and Recovering Enterprise Vault (36 of 43)
    In this module, you learn to identify which Enterprise Vault components must be backed up. In addition, you learn how to back up and restore Enterprise Vault by placing components in backup mode.


  • EV 10 for Exchange Admin Demo—Backing Up and Recovering Enterprise Vault (37 of 43)
    In this demonstration you identify the various components that need to be backed up and then investigate how Backup Mode is used to complete a backup and maintain data integrity. Finally, you backup a Vault Store Partition and simulate a data loss and then restore the saveset files.


  • EV 10 for Exchange Admin Expanding the Environment (38 of 43)
    In this module, you learn about Enterprise Vault server failover. You also learn about scaling an Enterprise Vault environment.


  • EV 10 for Exchange Admin Monitoring and Reporting Enterprise Vault (39 of 43)
    In this module, you learn which functions and items you can monitor, how to manage the different types of event logs, and how to monitor Enterprise Vault performance.


  • EV 10 for Exchange Admin Demo—Enterprise Vault Operations Manager (40 of 43)
    In this demonstration, you install and configure Enterprise Vault Operations Manager (EVOM), which provides dashboard-style monitoring.


  • EV 10 for Exchange Admin Demo—Installing and using Enterprise Vault Reporting (41 of 43)
    In this demonstration, you install and configure Enterprise Vault Reporting, which provides system reports for trend analysis.


  • EV 10 for Exchange Admin Introduction to Enterprise Vault Troubleshooting (42 of 43)
    In this module, you learn some of the server and client tools that can be used for troubleshooting problems with Enterprise Vault and how to work with Symantec and place a support call.


  • EV 10 for Exchange Admin Demo—Introduction to Enterprise Vault Troubleshooting (43 of 43)
    In this demonstration, you review the main tools that administrators can use to troubleshoot Enterprise Vault systems. Specifically, you review the following tools: Symantec Enterprise Vault Event Viewer Log; Client Trace Log; Deployment Scanner; DTrace.


  • Enterprise Vault 10.0.2: Exchange Archiving Reports
    This module explores the new Exchange Archiving Report introduced in Enterprise Vault 10.0.2. The Exchange Archiving Reports are produced during all archiving runs.


  • Enterprise Vault 10.0: Installation—Introduction to Installing Enterprise Vault (1 of 11)
    This module describes the basic architecture of Enterprise Vault, the deployment options in different environments and the basic steps for installing Enterprise Vault 10.0.


  • Enterprise Vault 10.0: Installation—Verifying Installation Prerequisites (2 of 11)
    This module describes the installation prerequisites for Enterprise Vault and demonstrates how to use the Deployment Scanner to confirm that the perquisites have been installed and configured correctly.


  • Enterprise Vault 10.0: Installation—Additional Installation Prerequisites: Exchange Archiving (3 of 11)
    This module describes how Exchange archiving works and details the additional installation prerequisites for Exchange archiving.


  • Enterprise Vault 10.0: Installation—Additional Installation Prerequisites: Domino Archiving (4 of 11)
    This module describes how Domino archiving works and details the additional installation prerequisites for Domino archiving.


  • Enterprise Vault 10.0: Installation—Additional Installation Prerequisites: File System Archiving (5 of 11)
    This module describes how File System archiving works and details the additional installation prerequisites for File System archiving.


  • Enterprise Vault 10.0: Installation—Additional Installation Prerequisites: SharePoint Archiving (6 of 11)
    This module describes how Exchange archiving works and details the additional installation prerequisites for Exchange archiving.


  • Enterprise Vault 10.0: Installation—Installing Enterprise Vault (7 of 11)
    This module describes and demonstrates how to install Enterprise Vault 10.0. It also covers post-installation tasks and how to uninstall Enterprise Vault.


  • Enterprise Vault 10.0: Installation—Installing Enterprise Vault into a Building Blocks environment (8 of 11)
    This module describes how Building Blocks can be used to provide high availability for Enterprise Vault servers. It also explains how to install Enterprise Vault 10.0 into a building blocks environment and how to manage failover.


  • Enterprise Vault 10.0: Installation—Installing Enterprise Vault into a VCS Cluster (9 of 11)
    This module describes how Enterprise Vault servers can be clustered using VCS and how to install and configure a VCS cluster of Enterprise Vault servers.


  • Enterprise Vault 10.0: Installation—Installing Enterprise Vault into a Microsoft Failover Cluster (10 of 11)
    This module describes how Enterprise Vault servers can be clustered using a Microsoft Failover Cluster and how to install and configure a Microsoft Failover cluster of Enterprise Vault servers.


  • Enterprise Vault 10.0: Installation—Upgrading to Enterprise Vault 10.0 (11 of 11)
    This module describes the options for moving to Enterprise Vault 10.0. It also describes and demonstrates how to migrate Enterprise Vault 9.x servers to a 64-bit operating system platform and to upgrade servers to Enterprise Vault 10.0.


  • EV 10.x for Exchange: Admininstration- Appendix D: Updates
    In this module, you learn about new features and functionality available in Enterprise Vault 10.0.2 and 10.0.3, including: —Exchange 2013 Support; —Exchange Archiving Reports and demonstration; —Supporting Office Mail Apps and demonstrations, including: Introduction, User Actions, Deployment, and Troubleshooting; —Vault Cache Diagnostics and demonstration; —SCOM monitoring and demonstration; and —Event filtering.


  • Enterprise Vault 10.x for Exchange: Configuring Data Classification: Installing the Data Classification Server (1 of 3)
    This module explains how to install and register the data classification server. In addition you learn how to configure the data classification filter.


  • Enterprise Vault 10.x for Exchange: Configuring Data Classification: Configuring Data Classification Policies (2 of 3)
    This module demonstrates how to configure the classification policies.


  • Enterprise Vault 10.x for Exchange: Configuring Data Classification: Response Rules (3 of 3)
    This module discusses how to create response rules for data classification polices.


  • Enterprise Vault 10.x for Exchange: Introduction to Data Classification Services (DCS) with DLP
    This module describes data loss prevention (DLP) and how data classification works in the Enterprise Vault context.


  • EV 10.x for Exchange: Maintain & Troubleshoot--Moving to Enterprise Vault 10.x (1 of 9)
    This module reviews the Enterprise Vault environment. You also learn how to migrate or upgrade to Enterprise Vault 10.x. Demonstrations are included for preparing for migration and migrating using the Enterprise Vault Server Settings Migration Wizard (SSMW).


  • EV 10.x for Exchange: Maintain & Troubleshoot--Operating Enterprise Vault (2 of 9)
    In this module you learn to verify proper Enterprise Vault operation as well as monitor MSMQs and index health, Demonstrations show how to resolve Administration Console > Status issues and manage and upgrade to 64-bit indexes.


  • EV 10.x for Exchange: Maintain & Troubleshoot--Monitoring and Tuning Enterprise Vault (3 of 9)
    In this module you lear how to: •Use Enterprise Vault Operations Manager (EVOM); •Manage disk space; •View Enterprise Vault systems reports; •Run common SQL queries; •Apply best practice and performance tuning settings; •Demonstrations show how to run a status check using EVOM and run common SQL queries.


  • EV 10.x for Exchange: Maintain & Troubleshoot--Maintaining Enterprise Vault Environments (4 of 9)
    In this module you learn how to: •Use Enterprise Vault Policy Manager (EVPM); •Manage archives; •Use safety copies and collections; •Perform SQL maintenance; •Maintain indexes. In addition, there is a review of back up and recovery. Demonstrations show how to configure Enterprise Vault for a user leaving the organization and how to move and change index locations.


  • EV 10.x for Exchange: Maintain & Troubleshoot--Troubleshooting Tools Overview (5 of 9)
    This module reviews various troubleshooting tools available for Enterprise Vault, Microsoft/Windows, the Web, and network.


  • EV 10.x for Exchange: Maintain & Troubleshoot--Troubleshooting Basics (6 of 9)
    In this module you learn basic troubleshooting concepts and how to isolate the issue. In addition, you learn basic steps for troubleshooting Microsoft SQL troubleshooting for Enterprise Vault, Microsoft Exchange troubleshooting for Enterprise Vault, and network issues related to Enterprise Vault.


  • EV 10.x for Exchange: Maintain & Troubleshoot--Troubleshooting Enterprise Vault servers (7 of 9)
    This module outlines the mailbox archiving processes and presents steps to perform Enterprise Vault server troubleshooting. Demonstations illustrate how to troubleshoot Exchange Mailbox Archiving in a specific scenario.


  • EV 10.x for Exchange: Maintain & Troubleshoot--Troubleshooting Enterprise Vault Clients (8 of 9)
    This module reviews the Enterprise Vault clients and steps to troubleshoot the Outlook Add-In, Virtual Vault and Vault Cache, as well as Outlook Web App/Access (OWA). Demonstations illustrate how to troubleshoot PST migration in a specific scenario.


  • EV 10.x for Exchange: Maintain & Troubleshoot--Working with Symantec Support (9 of 9)
    This module describes how to gather information for and contact Symantec Technical Support.


  • Enterprise Vault 10.x for Exchange: Outlook 2010 Support : Introduction to the Outlook 2010 Add-In (1 of 2)
    This module describes the basic User Interface of the Enterprise Vault Add-In for Outlook 2010.


  • Enterprise Vault 10.x for Exchange: Outlook 2010 Support : Enterprise Vault Add-In Features and Functionality (2 of 2)
    This module demonstrates the features and functionality of the Enterprise Vault Add-In and integration.


  • Enterprise Vault 10.x: Introduction to Enterprise Vault 10.x Indexing (1 of 3)
    This module explains the architecture and processes for Enterprise Vault indexing.


  • Enterprise Vault 10.x: Configuring Indexing (2 of 3)
    This module demonstrates the basic steps to configure indexing and describes Index Server Groups.


  • Enterprise Vault 10.x: Managing Indexing (3 of 3)
    This module discusses the tools and options to monitor and manage Enterprise Vault indexes.


  • Enterprise Vault Server Settings Migration Wizard (SSMW)
    This module provides an overview of the Enterprise Vault Server Settings Migration Wizard for migrating Enterprise Vault server settings from one server to another. The module includes a demonstration of the migration wizard.


  • Enterprise Vault: Product Improvement program
    This module shows you how the Product Improvement program collects environmental and configuration information from the Enterprise Vault setup and stores the collected data as a readable XML file on one Enterprise Vault server’s local file system. The XML data is then securely and anonymously uploaded to Symantec’s Enterprise Telemetry server.



Enterprise Vault 10 for Domino
  • EV 10 for Domino Admin: Introduction to Enterprise Vault (1 of 16)
    In this module, you are introduced to the basic Enterprise Vault concepts and describe the Enterprise Vault physical and logical components. In addition you are introduced to the architecture of Domino archiving.


  • EV 10 for Domino Admin: Prepare for Domino Archiving (2 of 16)
    In this module, you learn how to create a Notes ID user for Domino mail archiving, register the Enterprise Vault Domino Gateway and configuring Single Sign-on.


  • EV 10 for Domino Admin: Initial Configuration of Enterprise Vault (3 of 16)
    In this module, you learn how to install Lotus and Enterprise Vault software. In addition, you learn how to run the Enterprise Vault Configuration Wizard.


  • EV 10 for Domino Admin: Administering Enterprise Vault (4 of 16)
    In this module, you learn, you learn how to access and use the Enterprise Vault Administration Console options. You also learn how to deploy roles-based administration (RBA) for Administration Console access. In addition, you learn how to configure initial Enterprise Vault system requirements.


  • EV 10 for Domino Admin: Configuring Vault Storage (5 of 16)
    In this module, you learn about the archive storage architecture. You learn how to use of the Administration Console to create a Vault Store Group and Vault Store using the New Vault Store Group wizard. You also learn how to use the Vault Store Partition wizard to set up the physical storage location for archives. In addition you learn to configure Vault Store Group properties to define sharing levels.


  • EV 10 for Domino Admin: Configuring Mailbox Archiving: Overview and Policies (6 of 16)
    In this module, you identify the tasks, services, and processes of the Enterprise Vault system and learn how to set up Mailbox archiving. In addition, you learn how to define Mailbox policies and configure Desktop policies.


  • EV 10 for Domino Admin: Configuring Mailbox Archiving: Provisioning and Processing (7 of 16)
    In this module, you learn the configuration of archiving targets and how provisioning is used in Enterprise Vault. You also learn how the mailbox task processes mailboxes and how to enable mailboxes for archiving. In addition, you learn how to configure retention and deletion parameters.


  • EV 10 for Domino Admin: Managing Client Access and working with iNotes (8 of 16)
    In this module, you learn how client access is achieved from Lotus Notes and iNotes clients. You also learn how to install and configure the Enterprise Vault client templates for Lotus Notes and iNotes.


  • EV 10 for Domino Admin: Domino Retention Folders and Accessing and Searching Archived Mail (9 of 16)
    In this module, you learn the architecture and steps to access archived items from clients. You also learn the architecture and steps to search for archived items. Finally you learn to configure and implement Domino retention folders.


  • EV 10 for Domino Admin: Managing Clients: Vault Cache (10 of 16)
    In this module, you learn how Vault Cache provides offline access to archived items from Lotus Notes, how to perform an initial configuration of Vault Cache, and how to customize Vault Cache settings.


  • EV 10 for Domino Admin: Configuring Journal Archiving (11 of 16)
    In this module, you learn how Domino Journal Archiving works, the requirements for Domino Journal Archiving and how to set up and configure Domino Journal Archiving.


  • EV 10 for Domino Admin: Configuring and Managing Indexes (12 of 16)
    In this module, you learn about Enterprise Vault 10x indexing. You learn the steps required to configure indexing and also details on using the Manage Indexes tool.


  • EV 10 for Domino Admin: Migrating NFS mail files (13 of 16)
    In this module, you learn about about NSF mail file migration and in particular how to prepare for and conduct a NSF mail file migration using the migration wizard and EVPM.


  • EV 10 for Domino Admin: Backing up and Recovering Enterprise Vault (14 of 16)
    In this module, you learn how to identify Enterprise Vault components that must be backed up and options and strategies to perform backups. You also learn how to set Backup Mode on a Vault Store or Index location and how to configure collections for improved backup times. In addition, you learn how to recover Enterprise Vault.


  • EV 10 for Domino Admin: Monitoring and Reporting Enterprise Vault (15 of 16)
    In this module, you learn to use Enterprise Vault Operations Manager (EVOM) to monitor and report on the Enterprise Vault environment. You also learn how to configure automatic monitoring. In addition, you review checklists for common daily monitoring and maintenance tasks.


  • EV 10 for Domino Admin: Introduction to Enterprise Vault Troubleshooting (16 of 16)
    In this module, you learn to use Enterprise Vault server tools, Enterprise Vault client tools and how to work with Symantec to resolve issues.


  • Changes to Domino Archiving in Symantec Enterprise Vault 10
    This module describes how Domino archived item retrieval works in Enterprise Vault 10.



Enterprise Vault 11
  • EV 11 Module 01: Enterprise Vault - Product Overview (1 of 64)
    In this module, you learn how to describe the business challenges addressed by Enterprise Vault, describe the basic concepts behind the Enterprise Vault system, and describe the Enterprise Vault structure and components.


  • EV 11 Module 02: Introduction to Designing an Enterprise Vault Environment (2 of 64)
    In this module, you learn how to describe the main steps to deploy Enterprise Vault, describe the main considerations when designing an Enterprise Vault deployment, and describe Enterprise Vault designs for common deployment scenarios.


  • EV 11 Module 03: Preparing the Environment for Installing Enterprise Vault (3 of 64)
    In this module, you how to describe installation prerequisites for the Enterprise Vault server, additional installation prerequisites required for Exchange, File System and SharePoint archiving. You also learn how to use the Deployment Scanner to confirm that all prerequisites are installed and configured correctly.


  • EV 11 Lab 03: Exercise 1 - Investigate Enterprise Vault Installation Demo (4 of 64)
    In this demonstration you investigate Enterprise Vault Prerequisites.


  • EV 11 Lab 03: Exercise 2 - Running the Deployment Scanner Demo (5 of 64)
    In this demonstration you run the Deployment Scanner.


  • EV 11 Lab 03: Exercise 3 - Implementing Exchange Archiving Prerequisites Demo (6 of 64)
    In this demonstration you implement Exchange Archiving Prerequisites.


  • EV 11 Module 04: Installing Enterprise Vault (7 of 64)
    In this module, you learn how to install Enterprise Vault, complete post-installation tasks, and uninstall or reinstall Enterprise Vault.


  • EV 11 Lab 04: Exercise 1: Installing Enterprise Vault Demo (8 of 64)
    In this demonstration you install Enterprise Vault.


  • EV 11 Lab 04: Exercise 2: Completing Post-Installation tasks Demo (9 of 64)
    In this demonstration you complete Post-Installation Tasks


  • EV 11 Module 05: Configuring the Enterprise Vault Server (10 of 64)
    In this module, you learn how to run the Enterprise Vault configuration wizard, Configure site settings, deploy roles-based access (RBA) for administration, and configure monitoring and reporting.


  • EV 11 Lab 05: Exercise 1 - Running the Enterprise Vault Configuration Wizard Demo (11 of 64)
    In this demonstration you run the Enterprise Vault Configuration


  • EV 11 Lab 05: Exercise 2 - Configuring/Verifying Enterprise Vault Settings Demo (12 of 64)
    In this demonstration you verify Enterprise Vault Settings


  • EV 11 Lab 05: Exercise 3 - Setting Up Roles Based Administration Demo (13 of 64)
    In this demonstration you set Up Roles Based Administration


  • EV 11 Lab 05: Exercise 4 - Setting Up Enterprise Vault Monitoring Demo (14 of 64)
    In this demonstration you set Up Enterprise Vault Monitoring


  • EV 11 Module 06: Configuring Indexing and Storage (15 of 64)
    In this module, you learn the steps required to configure indexing, create retention categories, and create storage to meet defined requirements.


  • EV 11 Lab 06: Exercise 1 - Configuring Indexes Demo (16 of 64)
    In this demonstration you configure Indexes


  • EV 11 Lab 06: Exercise 2 - Creating Retention Categories Demo (17 of 64)
    In this demonstration you create Retention Categories


  • EV 11 Lab 06: Exercise 3 - Configuring Vault Storage Demo (18 of 64)
    In this demonstration you configure Vault Storage


  • EV 11 Module 07: Configuring Exchange Mailbox Archiving (19 of 64)
    In this module, you learn how to configure Exchange targets, define how and when archiving occursand process Exchange mailboxes


  • EV 11 Lab 07: Exercise 1 - Establishing Archive Targets Demo (20 of 64)
    In this demonstration you establish Archive Targets


  • EV 11 Lab 07: Exercise 2 - Creating Mailbox and Desktop Policies Demo (21 of 64)
    In this demonstration you create Mailbox and Desktop Policies


  • EV 11 Lab 07: Exercise 3 - Provisioning Mailboxes Demo (22 of 64)
    In this demonstration you provision Mailboxes


  • EV 11 Lab 07: Exercise 4 - Archiving Mail Items Demo (23 of 64)
    In this demonstration you archive Mail Items


  • EV 11 Module 08: Configuring Exchange Clients - Part I (24 of 64)
    In this module, you learn how to configure Outlook 2010 client, OWA, Office Mail App, Vault Cache and Virtual Vault.


  • EV 11 Lab 08: Exercise 1 - Configuring Client Access Microsoft Outlook Demo (25 of 64)
    In this demonstration you configure Client Access Microsoft Outlook


  • EV 11 Lab 08: Exercise 2 - Configuring Client Access Outlook Web App Demo (26 of 64)
    In this demonstration you configure Client Access Outlook Web App


  • EV 11 Lab 08: Exercise 3 - Configuring Client Access Office Mail App Demo (27 of 64)
    In this demonstration you configure Client Access Office Mail App


  • EV 11 Lab 08: Exercise 4 - Configuring Vault Cache and Virtual Vault Demo (28 of 64)
    In this demonstration you configure Vault Cache and Virtual Vault


  • EV 11 Module 09: Configuring Exchange Clients - Part II (29 of 64)
    In this module, you learn how to deploy Mail Client and configure IMAP access. You also learn how to configure Enterprise Vault Search.


  • EV 11 Lab 09: Exercise 1 - Configuring Enterprise Vault IMAP Access Demo (30 of 64)
    In this demonstration you configure Enterprise Vault IMAP Access


  • EV 11 Lab 09: Exercise 2 - Configuring IMAP Access to the Enterprise Vault Server Demo (31 of 64)
    In this demonstration you configure IMAP Access to the Enterprise Vault Server


  • EV 11 Lab 09: Exercise 3 - Managing Enterprise Vault Search Demo (32 of 64)
    In this demonstration you manage Enterprise Vault Search


  • EV 11 Module 10: Configuring Exchange Journal Archiving (33 of 64)
    In this module, you learn how to configure Exchange targets, define how and when archiving occurs, process Exchange and Journal mailboxes.


  • EV 11 Lab 10: Exercise 1 - Confirming Mail is being Journaled Demo (34 of 64)
    In this demonstration you confirm Mail is being Journaled


  • EV 11 Lab 10: Exercise 2 - Setting up Journal Archiving Demo (35 of 64)
    In this demonstration you test Journal Archiving


  • EV 11 Lab 10: Exercise 3 - Testing Journal Archiving Demo (36 of 64)
    In this demonstration you test Journal Archiving


  • EV 11 Module 11: Configuring File System Archiving (37 of 64)
    In this module, you learn how to configure FSA targets, define FS archiving, and process items.


  • EV 11 Lab 11: Exercise 1 - Preparing and Adding File Server as a Target Demo (38 of 64)
    In this demonstration you prepare and add File Server as a Target


  • EV 11 Lab 11: Exercise 2 - Setting up File System Archiving Policies Demo (39 of 64)
    In this demonstration you set up File System Archiving Policies


  • EV 11 Lab 11: Exercise 3 - Adding Archiving Targets Demo (40 of 64)
    In this demonstration you add Archiving Targets


  • EV 11 Lab 11: Exercise 4 - Running the File System Archiving Task Demo (41 of 64)
    In this demonstration you run the File System Archiving Task
    Launch Module


  • EV 11 Module 12: Configuring SharePoint Archiving (42 of 64)
    In this module, you learn how to configure SharePoint targets, define SharePoint archiving, and process items.


  • EV 11 Lab 12: Exercise 1 - Configuring Enterprise Vault access to SharePoint server Demo (43 of 64)
    In this demonstration you configure Enterprise Vault access to SharePoint server


  • EV 11 Lab 12: Exercise 2 - Configuring SharePoint Archiving Components Demo (44 of 64)
    In this demonstration you configure SharePoint Archiving Components


  • EV 11 Lab 12: Exercise 3 - Running SharePoint Archiving Demo (45 of 64)
    In this demonstration you run SharePoint Archiving


  • EV 11 Lab 12: Exercise 4 - Accessing SharePoint Archived Files Demo (46 of 64)
    In this demonstration you troubleshoot Server Logs


  • EV 11 Module 13: Troubleshooting the Implementation (47 of 64)
    In this module, you learn how to review the installation logs, outline common implementation issues, use common troubleshooting tools and resources.


  • EV 11 Lab 13: Exercise 1 - Introduction to EV Troubleshooting - Server Logs Demo (48 of 64)
    In this demonstration you troubleshoot Server Logs


  • EV 11 Lab 13: Exercise 2 - Introduction to EV Troubleshooting - Client Logs Demo (49 of 64)
    In this demonstration you troubleshoot Client Logs


  • EV 11 Module 14: Validating the Environment (50 of 64)
    In this module, you learn how to test archiving and access, complete all documentation, and outline a backup schedule for Enterprise Vault.


  • EV 11 Module 15: Installing Enterprise Vault in an IBM Domino Environment (51 of 64)
    In this module, you learn how to describe how Domino archiving works to understand the required prerequisites, describe additional prerequisites for Domino archiving.


  • EV 11 Lab 15: Creating a Domino ID Demo (52 of 64)
    In this demonstration you create a Domino ID.


  • EV 11 Lab 15: Registering the Enterprise Vault Domino Gateway Server Demo (53 of 64)
    In this demonstration you register the Enterprise Vault Domino Gateway Server.


  • EV 11 Lab 15: Installing Domino 9 Messaging Server on EVDG Demo (54 of 64)
    In this demonstration you install Domino 9 Messaging Server on EVDG.


  • EV 11 Lab 15: Installing the Deployment Scanner Demo (55 of 64)
    In this demonstration you install the Deployment Scanner.


  • EV 11 Lab 15: Installing Enterprise Vault on the Enterprise Vault Domino Gateway Server Demo (56 of 64)
    In this demonstration you install Enterprise Vault on the Enterprise Vault Domino Gateway Server.


  • EV 11 Module 16: Configuring Domino Mailbox Archiving (57 of 64)
    In this module, you learn how to configure Domino targets, define when and how archiving occurs, and process Domino mailboxes.


  • EV 11 Lab 16: Copying the Domino Archiving ID to the Enterprise Vault Server Demo (58 of 64)
    In this demonstration you copy the Domino Archiving ID to the Enterprise Vault Server.


  • EV 11 Lab 16: Creating Provisioning Groups Demo (59 of 64)
    In this demonstration you create Provisioning Groups.


  • EV 11 Module 17: Configuring Domino Clients and Working with iNotes (60 of 64)
    In this module, you learn how to validate user access, and configure access for Domino clients.


  • EV 11 Lab 17: Deploying New Mail Templates Demo (61 of 64)
    In this demonstration you deploy New Mail Templates.


  • EV 11 Lab 17: Enabling the Vault Cache in the Desktop Policy Demo (62 of 64)
    In this demonstration you enable the Vault Cache in the Desktop Policy.


  • EV 11 Module 18: Configuring Journal Archiving (63 of 64)
    In this module, you learn how to configure Domino Journal archiving, and process Domino Journal items.


  • EV 11 Lab 18: Configuring Domino Journal Mailbox Archiving Demo (64 of 64)
    In this demonstration you investigate Enterprise Vault Prerequisites.


  • EV 11 for End Users: Introduction to EV 11 Outlook Client - DEMO (1 of 7)
    Demo of the EV 11 Outlook client including the difference between an archived item and an item that hasn’t been archived. This demo also shows the help system and tool bar.


  • EV 11 for End Users: Retrieving an Archived Item - DEMO (2 of 7)
    Demo of retrieving an archived items. This demo also shows how to open an HTML copy of an archived item.


  • EV 11 for End Users: Manually Archiving and Restoring an Item with the Full Client - DEMO (3 of 7)
    This demo shows the steps needed to restore and archive an item using the full client.


  • EV 11 for End Users: Manually Archiving and Restoring an Item with the HTTP Client – DEMO (4 of 7)
    This demo shows the steps needed to restore and archive an item using the HTTP client.


  • EV 11 for End Users: Deleting an Archived Item - DEMO (5 of 7)
    This demo shows the steps needed to delete from an archive.


  • EV 11 for End Users: Using the Enterprise Vault Virtual Vault- DEMO (6 of 7)
    This demo shows how to use the Virtual Vault including opening an item, setting vault properties and manually archiving an item using a drag and drop into the Virtual Vault.


  • EV 11 for End Users: Migrating a PST File Using the Enterprise Vault Outlook Client - DEMO (7 of 7)
    This demo shows migrating a PST located by the locator task. This demo will also show adding a PST file manually and migrating the file.


  • EV 11: What’s New - Enterprise Vault SCOM
    This module provides an overview of the enhancements to the Enterprise Vault SCOM pack. You also learn about the Enterprise Vault SCOM architecture and performance counters.


  • EV 11: What’s New - Enterprise Vault Search
    In this module, you learn: • Requirements of Enterprise Vault Search • Enterprise Vault basic functions and how to perform a search • Supported platforms and components • Steps to implement Enterprise Vault Search • Basic troubleshooting


  • EV 11: What’s New - Storage Safety Copy
    In this module, you learn about the architecture of the new Storage Safety Copy feature in Enterprise Vault 11 and how to configure it, including the new Storage Queue. You also learn how to troubleshoot issues with the new Safety Copy feature in Enterprise Vault 11.


  • EV 11: What’s New - PST Migration Enhancements
    This module describes the enhancements to PST Migrations in Enterprise Vault 11, including: • Filtering • Saved Results • New columns and sorting • Dashboard Views • Reporting The module also covers how the PST Password Override feature works as well as how to enable it and outlines options to troubleshoot the new PST Migration features.


  • EV 11: What’s New - IMAP Access
    This module describes and demonstrates the new IMAP access feature, including: • Prerequisites and deployment scenarios • Sizing guidelines and configuration tips • Troubleshooting • FAQs



Enterprise Vault for SharePoint
  • EV 10.x for SharePoint: Admin- Introducing EV for SharePoint (1 of 6)
    This module describes the benefits, features, and archiving methods for Enterprise Vault for SharePoint. You also learn about the basic architecture for SharePoint and archival and retrieval steps.


  • EV 10.x for SharePoint: Admin- Installing and Configuring EV for SharePoint (2 of 6)
    In this module, you outline the steps and components to install and configure SharePoint Servers in an Enterprise Vault environment. You also learn how to install and configure SharePoint components using the SharePoint Configuration wizard. Demonstrations show how to install and configure SharePoint components.


  • EV 10.x for SharePoint: Admin- Configuring SharePoint Policies (3 of 6)
    This module reviews the steps to plan and create SharePoint archiving policies. You then learn how to effectively configure SharePoint archiving policy rules. In addition, you learn how to define additional SharePoint archiving policy settings for shortcuts, pruning, drafts, and archive item permissions. The demonstration shows how to create and configure a new SharePoint archiving policy.


  • EV 10.x for SharePoint: Admin- Configuring SharePoint Tasks and Targets (4 of 6)
    In this lesson, you learn how to outline the steps to create objects in the Administration Console for SharePoint archiving. You then learn how to create and configure SharePoint tasks. In addition, you learn how to add SharePoint archiving targets. Demonstrations show how to create and configure SharePoint archiving tasks and targets.


  • EV 10.x for SharePoint: Admin- Adding SharePoint Archiving Web Parts (5 of 6)
    In this module you learn to describe the Enterprise Vault Web Part. In addition, you learn to add Archive Search and Archive Explorer Web Parts. Finally, you learn to manage the archived version history link and Restore from Archive option.Demonstrations show how to add and manage Web Parts and also how to manage the archived version history link.


  • EV 10.x for SharePoint: Admin- Accessing Archived SharePoint Documents (6 of 6)
    This module lists the options for users to access items stored in the Enterprise Vault SharePoint archives. In addition, you learn to access archived SharePoint items and modify security settings for SharePoint users. Demonstrations show how to access and restore archived items from the archived version history link and Archive Search Web Part.



Enterprise Vault File System Archiving
  • EV10 FSA: Admin - Introduction to Enterprise Vault (1 of 15)
    This module describes the business challenges addressed by Enterprise Vault and the basic concepts behind the Enterprise Vault system. You also learn about the physical and logical components of Enterprise Vault.


  • EV10 FSA: Admin - Initial Configuration of Enterprise Vault (2 of 15)
    In this module you identify the installation steps for Enterprise Vault. You also learn how to run the Configuration Wizard. Demonstrations show how to run the Enterprise Vault Configuration Wizard.


  • EV10 FSA: Admin - Administering Enterprise Vault (3 of 15)
    In this module you learn how to: —Access and use the Enterprise Vault Administration Console options; —Deploy roles-based administration for Administration Console access; —Configure initial Enterprise Vault system requirements. Demonstrations show how to deploy roles-based administration for File System Archiving.


  • EV10 FSA: Admin - Configuring Vault Storage (4 of 15)
    In this module you learn about archive storage. You also learn how to create Vault Store Group and Vault Store and configure Vault Store Partitions. In addition, you learn about how to configure Vault sharing levels. Demonstrations show how to configure Enterprise Vault Storage.


  • EV10 FSA: Admin - Introduction to File System Archiving (5 of 15)
    In this module you learn about File System Archiving. You also learn about the File System Archiving architecture and the terms associated with File System Archiving. Demonstrations show how to add a file server target, configure archiving policies, and add archiving targets.


  • EV10 FSA: Admin - Configuring File System Archiving (6 of 15)
    In this module you learn how to configure File System Archiving. In addition, you learn about the File System Archiving best practices.Demonstrations show how to prepare and add file server targets and how to set up File System Archiving Policies.


  • EV10 FSA: Admin - Managing Client Access (7 of 15)
    In this module you learn how to use integrated search tools, Web browser search tools, including Archive Explorer, and client access tools.


  • EV10 FSA: Admin - Configuring and Managing Indexes (8 of 15)
    In this module you learn how indexing works in Enterprise Vault 10.x. You also learn the steps required to configure indexing and various tools available to manage indexes. Demonstrations show how to review indexing options and features.


  • EV10 FSA: Admin - Managing File Life Cycle (9 of 15)
    In this you learn how the lifecycle of a file is managed. You also learn about the Retention Folders and how to configure them. In addition, you learn about the File Blocking and Pruning and how to configure them. Demonstrations show how to: —Create and configure retention folder and retention folder policies; —Create File Blocking Rules; —Prune archived versions of files.


  • EV10 FSA: Admin - Archiving Non Windows File Servers (10 of 15)
    In this module you learn about the File System Archiving on a non-Windows file server. You also learn how to configure File System Archiving on a NetApp filer and an EMC Celerra device. Demonstrations show how to access a NetApp Filer and how to set it up as an FSA target as well as EMC Celerra devices.


  • EV10 FSA: Admin - File System Archiving Reporting (11 of 15)
    In this module you learn about the Enterprise Vault Reporting and the FSA Reporting. You also learn about installing and configuring FSA Reporting. In addition, you also learn how to access, view, run and schedule FSA reports. Demonstrations show how to: —Install Enterprise Vault Reporting; —Configure Enterprise Vault Reporting; —Configure File System Archiving Reporting.


  • EV10 FSA: Admin - Backing up and Recovering Enterprise Vault (12 of 15)
    This module describes how to: —Identify Enterprise Vault components that must be backed up and options and strategies to perform backups; —Set Backup Mode on a Vault Store on Index location and how to configure collections for improved backup times; —Recover Enterprise Vault. Demonstrations show how to prepare to backup Enterprise Vault.


  • EV10 FSA: Admin - Maintaining File Server Targets (13 of 15)
    In this module you learn how to migrate placeholders using FSAUtility and recall files corresponding to the placeholders. You also learn how to troubleshoot FSAUtility related issues using report mode, DTrace, and .xml log files. In addition, you learn that the placeholders must be regularly backed up. Demonstrations show how to use FSAUtility.


  • EV10 FSA: Admin - Troubleshooting Enterprise Vault and File System Archiving Issues (14 of 15)
    In this module you learn about the tools to perform basic troubleshooting for File System Archiving. You also learn how to troubleshoot common File System Archiving issues. In addition, you learn about the File System Archiving Checkpointed scan and the Archive Now/Shortcut Later feature. Demonstrations show how to delete orphaned placeholders and the Archive Now Shortcut Later feature.


  • EV10 FSA: Admin - Monitoring Enterprise Vault (15 of 15)
    In this module you learn how to install, configure, and use Enterprise Vault Operations manager (EVOM) Monitoring and Reporting. You also learned how to monitor Enterprise Vault performance and review checklists for common monitoring and maintenance tasks. Demonstrations show how to configure EVOM.


  • EV9-FSA: Introduction to Enterprise Vault (1 of 12)
    In this module, you learn what Enterprise Vault is, its functions and architecture, and how it can archive unstructured data from file servers. You also learn about the basic physical and logical components that comprise an Enterprise Vault deployment as well as some of the new Administration Console features in Enterprise Vault 9.0.


  • EV9-FSA: Installing and Configuring Enterprise Vault (2 of 12)
    In this module, you learn about the basic steps for planning and deployment. You also learn about the requirements to install Enterprise Vault, how to install the Enterprise Vault Server software, and how to run the configuration program.


  • EV9-FSA: Post-installation Configuration (3 of 12)
    In this module, you learn about configuring Enterprise Vault storage. You also learn how to create a Vault Store Group and Vault Store and configure Vault Store Partitions using the Enterprise Vault Administration Console. In addition, you learn how to configure Vault Site properties.


  • EV9-FSA: Introduction to File System Archiving (4 of 12)
    In this module, you learn about File System Archiving. You also learn how File System Archiving architecture operates. In addition, you learn about the terms associated with File System Archiving.


  • EV9-FSA: Configuring File System Archiving (5 of 12)
    In this module, you learn how to configure File System Archiving. You also learn about File System Archiving best practices.


  • EV9-FSA: Accessing Archived Items and Indexing (6 of 12)
    In this module, you learn how to search using the Archive Explorer and Enterprise Vault built-in search tools. You also learn what indexing is and how it works. In addition, you learn about tools for monitoring indexes and how to run the IndexServer and IndexCheck tools.


  • EV9-FSA: File Lifecycle, Retention Folders, File Blocking, and Pruning (7 of 12)
    In this module, you learn how the lifecycle of a file is managed using File System Archiving. You also learn about Retention Folders and how to configure them. In addition, you learn about File Blocking and Pruning and how to configure these features.


  • EV9-FSA: Archiving from non-Windows File Servers (8 of 12)
    In this module, you learn about file system archiving on non-Windows File Servers. You also learn about configuring file system archiving on a NetApp filer and an EMC Celerra device.


  • EV9-FSA: File System Archiving Reporting (9 of 12)
    In this module, you learn about Enterprise Vault Reporting and FSA Reporting. You also learn about installing and configuring FSA Reporting. In addition, you learn how to access, view, run, and schedule FSA reports.


  • EV9-FSA: Backing Up and Recovering Enterprise Vault (10 of 12)
    In this module, you learn about Enterprise Vault components that must be backed up. You also learn how to back up and restore Enterprise Vault components by placing them in backup mode. In addition, you learn how to back up and restore Enterprise Vault configuration.


  • EV9-FSA: Maintaining File Server Targets (11 of 12)
    In this module, you learn how FSAUtility can be used to migrate placeholders and recall files corresponding to placeholders. You also learn about troubleshooting issues related to FSAUtility using report mode, Dtrace, and .xml log files. In addition, you learn about backing up and restoring placeholders.


  • EV9-FSA: Troubleshooting File System Archiving (12 of 12)
    In this module, you learn about the tools used to perform basic troubleshooting of File System Archiving. In addition, you learn how to troubleshoot common File System Archiving issues and correct them. You also learn about deleting orphaned placeholders and the Archive Now/Shortcut Later and Delete on Delete features.


  • Changes to File System Archiving (FSA) in Symantec Enterprise Vault 10
    Changes to File System Archiving (FSA) in Symantec Enterprise Vault 10



Enterprise Vault Compliance Accelerator
  • EV 8 Compliance Accelerator: Compliance Accelerator Fundamentals (1 of 5)
    This module presents a brief overview of Enterprise Vault and then explains the capabilities of the Compliance Accelerator option. Next, this module describes considerations and factors involved when you formulate a compliance strategy for your organization. After you understand what is involved in developing a compliance strategy, you learn the features of the Compliance Accelerator option that you can use to support your strategy.


  • EV 8 Compliance Accelerator: Configuring Compliance Accelerator (2 of 5)
    In this module, you learn how to install and launch Compliance Accelerator and use the different administration modes within it. You also learn how to create employee profiles and groups and departments. Finally, you learn how to create roles and assign employees to those roles.


  • EV 8 Compliance Accelerator: Searching and Reviewing (3 of 5)
    This module describes how to prepare and conduct searches within a Compliance Accelerator environment. Further, after a search has been conducted, you learn how to review items returned from a search and work with research folders.


  • EV 8 Compliance Accelerator: Reporting and Exporting (4 of 5)
    In this module, you learn how you can run reports based on the search results and how you can export the search results into various formats so the results can be viewed outside of Compliance Accelerator.


  • EV 8 Compliance Accelerator: Advanced Functions (5 of 5)
    In this module, you learn how to configure Compliance Accelerator’s Chinese Wall security between departments. You also learn about Compliance Accelerator’s Journaling Connector and how it is used to perform random sampling.


  • Changes to Accelerator Searches in Symantec Enterprise Vault 10
    This module covers changes to the Enterprise Vault 10 accelerators, including Accelerator search changes for 64-bit indexing and archive selection during search creation.



Enterprise Vault Discovery Accelerator
  • EV 10 DA: Introduction to Electronic Discovery (1 of 16)
    This module is an overview of Discovery Accelerator and how it works with Enterprise Vault.


  • EV 10 DA: Accessing the Client – Demo A (2 of 16)
    This module is a demonstration of opening the Discovery Accelerator client and connecting to the server.


  • EV 10 DA: Using a Research Folder and Using a Case – Demo B (3 of 16)
    This module is a demonstration of creating and using a case and research folder.


  • EV 10 DA: Marks and Tags (4 of 16)
    This module is an overview of marks and tags and how they are used in a case.


  • EV 10 DA: Searches (5 of 16)
    This module is an overview of how a search works and what options are available for a search.


  • EV 10 DA: Searches – Demo (6 of 16)
    This module is a demonstration of setting up and running a search.


  • EV 10 DA: Analytics & Auto Categorization (7 of 16)
    This module is an overview of analytics and auto categorization.


  • EV 10 DA: Analytics – Demo (8 of 16)
    This module is a demonstration showing how to enable analytics and creating a rule in a case.


  • EV 10 DA: Assigning Items to Reviewers (9 of 16)
    This module is an overview of assigning items to reviews.


  • EV 10 DA: Assigning Items to Reviewers – Demo (10 of 16)
    This module is a demonstration on assigning items to reviewers and using facet filtering in a case.


  • EV 10 DA: Manual Review (11 of 16)
    This module is an overview of using the review screen.


  • EV 10 DA: Reviewing Items – Demo (12 of 16)
    This module is a demonstration of the review screen.


  • EV 10 DA: Exporting and Producing Data (13 of 16)
    This module is an overview of running an export or production.


  • EV 10 DA: Exporting and Producing Data – Demo (14 of 16)
    This module is a demonstration of running an export or production.


  • EV 10 DA: Chain of Custody Reports (15 of 16)
    This module is an overview of the Discovery Accelerator reports.


  • EV 10 DA: Chain of Custody Reports– Demo (16 of 16)
    This module is a demonstration of running a Discovery Accelerator report.


  • Changes to Custodian Manager in Enterprise Vault 10
    This module covers improvements to Custodian Manager (CM) synchronization and new user-defined attributes in Custodian Manager.


  • Changes to Accelerator Searches in Symantec Enterprise Vault 10
    This module covers changes to the Enterprise Vault 10 accelerators, including Accelerator search changes for 64-bit indexing and archive selection during search creation.



FileStore
  • FS 5.6: Install and Configure: Overview (1 of 9)
    In this module, you are introduced network attached storage solutions, focusing on FileStore by Symantec. You also review the requirements for implementing FileStore.


  • FS 5.6: Install and Configure: Installing FileStore (2 of 9)
    In this module, you learn to install FileStore and modify the network configuration after the first FileStore node is running.


  • FS 5.6: Install and Configure: Introduction to FileStore User Interfaces (3 of 9)
    In this module, you learn to navigate the command-line interface and connect to the FileStore GUI. You also learn to administer FileStore user accounts.


  • FS 5.6: Install and Configure: Adding Nodes to the FileStore Cluster (4 of 9)
    In this module, you learn to prepare systems for addition to a FileStore cluster. After adding nodes, you learn to verify the installation and administer the nodes.


  • FS 5.6: Install and Configure: Configuring Network Settings (5 of 9)
    In this module, you learn to configure network interfaces, DNS, routing tables, and VLANs.


  • FileStore 5.6: Install and Configure: Configuring Storage (6 of 9)
    In this module, you learn to provision storage, create file systems, and administer storage pools and file systems.


  • FS 5.6: Install and Configure: Configuring NFS Services (7 of 9)
    In this module, you learn how to manage NFS services, as well as how to use a NIS server for authentication.


  • FS 5.6: Install and Configure: Configuring CIFS Services (8 of 9)
    This module describes the Common Internet File System (CIFS) file sharing. You learn to configure CIFS shares, balance client load, and manage home directories.


  • FS 5.6: Install and Configure: Using FTP and HTTP Services (9 of 9)
    In this module, you learn to configure FTP and monitor FTP sessions. You also learn how to configure HTTP services.


  • FS 5.6: Manage and Administer: Monitoring FileStore (1 of 6)
    In this module, you learn to configure event notification to enable you to monitor the FileStore cluster. You also learn to display the system log and system statistics to ensure that the cluster is performing as expected.


  • FS 5.6: Manage and Administer: Using Advanced Storage Options (2 of 6)
    In this module, you learn to use file system quotas to simplify management of home directories. You also learn to configure Dynamic Storage Tiering, and iSCSI targets.


  • FS 5.6: Manage and Administer: Using Snapshots and Instant Rollback (3 of 6)
    In this module, you learn how to create and use file system snapshots, and how to automate snapshot creation. You also learn how to configure the new instant rollback feature in FileStore 5.6.


  • FS 5.6: Manage and Administer: Protecting the FileStore Data (4 of 6)
    In this module, you learn to configure fencing to protect data on shared storage. You also learn to set up Symantec Antivirus and back up FileStore servers.


  • FS 5.6: Manage and Administer: Configuring Replication in FileStore (5 of 6)
    In this module, you learn to configure and manage data replication between FileStore clusters.


  • FS 5.6: Manage and Administer: Integrating FileStore with Enterprise Vault (6 of 6)
    In this module, you learn how FileStore can be used as back-end storage for Enterprise Vault archiving. You learn how to use the data archiving and retention (DAR) feature and how to audit DAR-enabled file systems. You also learn how to configure the Partition Secure Notification (PSN) feature.


  • FS 5.6: Maintain and Troubleshoot: Understanding How FileStore Works (1 of 2)
    This module describes the FileStore Command Line Interface Shell (CLISH) and the underlying files, scripts, and logs used in a FileStore cluster. You also learn about the Storage Foundation objects used by FileStore and the VCS service groups, dependencies, and triggers used to enable high availability of file sharing services.


  • FS 5.6: Maintain and Troubleshoot: Troubleshooting FileStore (2 of 2)
    In this module, you learn to upgrade FileStore software. You also learn how to administer FileStore servers and how to migrate data from an external NFS share to a FileStore file system. Finally, you learn to collect debugging information for troubleshooting problems in the FileStore cluster.



Ghost Solution Suite
  • Ghost Solution Suite 2.5 - Creating Boot Packages
    This module discusses the purpose of boot packages and how to create boot packages in Ghost Solution Suite.


  • Ghost Solution Suite 2.5 - Using Boot Packages
    This module discusses the various methods for using boot packages created with Ghost Solution Suite’s boot package building tools.


  • Ghost Solution Suite 2.5 - Creating and Restoring Images
    This module discusses how to create and restore images using the imaging components in Ghost Solution Suite Ghost and Image Center.


  • Ghost Solution Suite 2.5 - Creating and Restoring Master Images
    This module discusses how to create and restore a hardware independent master image that can be used to deploy computers across an organization.


  • Ghost Solution Suite 2.5 - Deploying Images
    This module discusses how to deploy images using the multicasting technologies included in Ghost Solution Suite.


  • Ghost Solution Suite 2.5 - Automating the Creation and Restoration of Images
    This module discusses the basics of using Ghost and Image Center’s automation features to create and restore images.



IT Management Suite
  • Managing Software Licenses with Symantec IT Management Suite-Overview and Strategy (1 of 5)
    This module presents an overview of the components of ITMS that can be synergized to manage software licensing. It also provides a set of steps that can be used to manage software license compliance.


  • Managing Software Licenses with Symantec IT Management Suite-Configuring Inventory Solution to Gather Software Information (2 of 5)
    This module provides an understanding of how Inventory Solution policies support the strategy of managing software licenses and gives detailed instructions on creating and configuring Inventory Solution policies.


  • Managing Software Licenses with Symantec IT Management Suite-Creating and Associating Software Products to Software Components (3 of 5)
    This module presents the steps to create software products from software components and if needed, associate other software components to these software products.


  • Managing Software Licenses with Symantec IT Management Suite-Configuring Application Metering to Gather Software Usage Information (4 of 5)
    This module presents the steps to configure software products to collect software usage on managed computers.


  • Managing Software Licenses with Symantec IT Management Suite-Creating and Managing Software License and Software Purchase Resources (5 of 5)
    This module presents the steps to create and configure software license and software purchase resources from both the Software License Portal and the Software Blade. IT also reviews the reports that display software compliance and software usage.



Managed Security Services
  • Symantec Managed Security Services Portal FAQ
    This FAQ provides answers to frequently-asked questions about the functionality and use of the MSS portal from the customer perspective. It also includes a series of interactive simulations that show MSS customers how to perform some common activities in the portal.



Management Platform 7.1
  • SMP 7.1 Administration: Course Introduction
    In this module, you learn the course objectives, intended audience, and contents of the course.


  • SMP 7.1 Administration: Lesson 01 Understanding the Symantec Management Platform
    In this module you receive an introduction to the Symantec Management Platform (SMP), and learn about the SMP components, components, and how SMP works.


  • SMP 7.1 Administration: Lesson 02 Installing Symantec Management Platform
    In this module, you learn about architecture considerations, installation requirements, and using Symantec Installation Manager to install Symantec Management Platform. You also learn how to access the Symantec Management Console and configure settings after installation.


  • SMP 7.1 Administration: Lesson 02 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 03 Symantec Management Console
    In this module, you learn how to navigate the Symantec Management Console and use the enhanced console views.


  • SMP 7.1 Administration: Lesson 03 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 04 Discovering Resources
    In this module, you learn how to import computers and users using Active Directory, perform network discovery, and discover computers using domain membership.


  • SMP 7.1 Administration: Lesson 04 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 05 Resource Manager
    In this module, you learn about resources and using the Resource Manager.


  • SMP 7.1 Administration: Lesson 05 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 06 Installing and Setting Up the Symantec Management Agent
    In this module, you learn how to install the Symantec Management Agent, and then verify it installed properly. You also set the Symantec Management Agent installation options.


  • SMP 7.1 Administration: Lesson 06 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 07 Configuring Symantec Management Agent
    In this module, you learn how to configure the Symantec Management Agent settings and determine when to use unicast and multicast. You also learn how to install and view Symantec Management Agent plug-ins.


  • SMP 7.1 Administration: Lesson 07 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 08 Agent Communication with Notification Server
    In this module, you learn how the Symantec Management Agent and Notification Server communicate, and how data flows between them.


  • SMP 7.1 Administration: Lesson 08 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 09 Creating and Managing Organizational Views and Groups
    In this module, you learn how to create and manage organizational views and groups.


  • SMP 7.1 Administration: Lesson 09 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 10 Creating and Managing Filters
    In this module, you learn how to work with existing filters and create new filters using the Query Builder.


  • SMP 7.1 Administration: Lesson 10 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 11 Creating and Managing Targets
    In this module, you learn how to create and manage targets. You also learn how to apply resource scoping to filters and targets. In this module you learn to work with targets and apply resource scoping to filters and targets.


  • SMP 7.1 Administration: Lesson 11 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 12 Creating and Managing Policies
    In this module, you learn about user-based policies, maintenance policies, and automation policies. You also learn how the Symantec Management Agent receives policies and how to manage shared schedules.


  • SMP 7.1 Administration: Lesson 12 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 13 Creating and Managing Tasks
    In this module, you learn about task management, including task management communication and processing. You also learn how to create and schedule tasks, create jobs, and use a workflow.


  • SMP 7.1 Administration: Lesson 13 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 14 Security
    In this module, you learn about security and resource scoping. You also learn how to manage user accounts, roles, privileges, and permissions.


  • SMP 7.1 Administration: Lesson 14 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.


  • SMP 7.1 Administration: Lesson 15 Reporting
    In this module, you learn about reporting and IT Analytics Solution. You also learn how to create a custom report and work with the report results.


  • SMP 7.1 Administration: Lesson 16 Site Management
    In this module, you learn how to manage sites, site servers and subnets. You will also learn how to work with task service and package service.


  • SMP 7.1 Administration: Lesson 17 Replication
    In this module, you learn how to set up, configure, and run replication.


  • SMP 7.1 Administration: Lesson 18 Hierarchy
    In this module, you receive an overview of hierarchy, and then learn how to set up a Notification Server hierarchy, configure hierarchy replication, and change the hierarchy topology.


  • SMP 7.1 Administration: Lesson 19 Troubleshooting
    In this module, you learn what Symantec Management Platform troubleshooting tools tools are available and how to use them. You also learn how to use NSConfigurator and Remote Altiris Agent Diagnosticis. Finally, you learn how to troubleshoot the Symantec Management Agent and Event inboxes.


  • SMP 7.1 Administration: Lesson 20 Backing up the Server and Database
    In this module, you learn which Symantec Management Platform components are needed for recovery. You also learn how to backup the IIS default Web Site Virtual Directories and the Configuration Management Database.


  • SMP 7.1 Administration: Lesson 21 Migrating Versions of Symantec Management Platform
    In this module, you learn how to migrate Symantec Management Platform from version 6.x to 7.0, and from version 7.0 to 7.1.



Management Platform 7.0
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Understanding the Symantec Management Platform (1 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy-Planning and Designing the Symantec Management Platform (2 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Installing Symantec Management Platform (3 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Symantec Management Console (4 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Installing and Setting Up the Altiris Agent (5 of 8)
    Management Platform 7.0 with Notification Server: Installing and Setting Up the Altiris Agent.


  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Configuring the Altiris Agent Settings and Tabs (6 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Resource Management (7 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Site Management (8 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Organizational Views and Groups (1 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Filters (2 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Targets (3 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Managing Policies (4 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Managing Tasks (5 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Resource Scoping and Security (6 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Reporting and the Report Wizard (7 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Replication between Notification Servers (8 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Hierarchy Design and Configuration (9 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Migrating from Notification Server 6 (10 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - SQL Basics and Resource Partitioning (11 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Management Platform 7.0 with Notification Server: Manage and Administer - Symantec Management Platform Troubleshooting (12 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.


  • Notification System Foundation 6
    The Notification Systems Foundation course focuses on the daily tasks you perform with your Altiris Solutions. In this class, you will learn the essential setup and configuration options available with Notification Server™ 6.0 as well as best practices for network design, package server configuration, and Web report generation.


  • Philips SmartManage 4.0
    Learn to remotely manage Philips monitors as part of your corporate asset management environment through the Symantec Notification Server.



Messaging Gateway
  • Symantec Messaging Gateway 10.5 Administration: What’s New in 10.5
    This module introduces features and functions for the 10.5 release of the Symantec Messaging Gateway.


  • Messaging Gateway 10.0: Admin - Introduction to Messaging Gateway 10.0 (1 of 9)
    This module provides an introduction to Symantec Messaging Gateway 10.0. It also describes its features and architecture.


  • Messaging Gateway 10.0: Admin - Installation and Configuration (2 of 9)
    This module covers how to install and configure Symantec Messaging Gateway 10.0.


  • Messaging Gateway 10.0: Admin - Adaptive Reputation Management (3 of 9)
    This module describes Adaptive Reputation Management in Symantec Messaging Gateway 10.0.


  • Messaging Gateway 10.0: Admin - Anti-Spam Policies (4 of 9)
    This module covers how to create anti-spam policies in Symantec Messaging Gateway 10.0. It also introduces bounce attack prevention.


  • Messaging Gateway 10.0: Admin - Anti-Malware Policies (5 of 9)
    This module covers how to create antimalware policies in Symantec Messaging Gateway 10.0. It also covers configuration of LiveUpdate and scan settings.


  • Messaging Gateway 10.0: Admin - Content Filtering Policy (6 of 9)
    This module covers how to setup content filtering scanning. It also describes how to use content filtering policy for structured data matching.


  • Messaging Gateway 10.0: Admin - Managing User and Host Configuration (7 of 9)
    This module covers how to manage user and host configuration in Symantec Messaging Gateway 10.0.


  • Messaging Gateway 10.0: Admin - Managing Control Center Settings (8 of 9)
    This module covers how to configure control center settings of Symantec Messaging Gateway 10.0.


  • Messaging Gateway 10.0: Admin - Leveraging Network Prevent for E-mail (9 of 9)
    This module covers how Symantec Messaging Gateway 10.0 and Network Prevent for E-mail interact.


  • Messaging Gateway 9.5 Admin Lesson 1- Introduction to Messaging Gateway 9.5
    In this module, you receive an introduction to the Messaging Gateway 9.5, learn about its key features, architecture, and deployment.


  • Messaging Gateway 9.5 Admin Lesson 2- Installation and Configuration
    In this module, you learn about the installation prerequisites, an overview of virtualization, how to install and configure Messaging Gateway, and an overview of the Control Center.


  • Messaging Gat