Symantec eLibrary

Symantec eLibrary

Get free access to hundreds of web-based training modules.

Register » Login »
Note: You must have subscribed to the Symantec eLibrary to log in as a Member. If not, click the Register button to subscribe.

Welcome to the improved Symantec eLibrary. Subscribers will see the following recent enhancements designed to provide you with an easier training experience:

  • Keyword Search Functionality
  • Easy to Navigate Folder Hierarchy
  • Expanded Browser Compatibility

Members of the Symantec eLibrary receive free access to hundreds of regularly updated on-demand web-based training modules covering the breadth and depth of Symantec's product portfolio. 5-75 minute module sessions cover "Install, Configure and Deploy," "Manage and Administer" and "Troubleshooting Techniques" in detail. The eLibrary is ideal for supplementing classroom training and/or providing training to employees who cannot travel or afford time away from the office.

To view modules check your browser settings and disable all pop-up blockers. Contact us for more help.

Loading the training modules below... Please wait...
Error: Please disable Internet Explorer Compatibility View for this website. Please see the FAQ for further assistance.
Training Modules
Expand All Collapse All
Updating Symantec eLibrary results... Please wait...
New Content Added to the Symantec eLibrary January/February/March 2015

New eDiscovery Platform 8 (Clearwell) Modules!

Seven new “eDiscovery Platform 8 " modules added to the eDiscovery Platform 8 Implementation category

Seventy Four new "eDiscovery Platform 8 Demo" modules added to the eDiscovery Platform 8 Demonstrations category

Ten new "eDiscovery Platform 8 for Administrators" modules added to the eDiscovery Platform 8 for Administrators category

Twelve new "eDiscovery Platform 8 for Users" modules added to the eDiscovery Platform 8 for Users category

New Enterprise Vault 11 Modules!

Sixty Five new "Enterprise Vault 11 Exchange Administration" modules added to the Enterprise Vault 11 Exchange Administration category

Seven new" Enterprise Vault 11 Whats New" modules added to the Enterprise Vault 11 Whats New category

New Cluster Server Modules!

Seven new "Cluster Server Special Topics" modules added to the Cluster Server Special Topics category

New System Recovery 2013 Modules!

Four new "System Recovery 2013" modules added to the System Recovery 2013 category

New Client Management Suite 7.5 Modules!

Eighteen new "Client Management Suite 7.5" modules added to the Client Management Suite 7.5 category

New NetBackup 5030 Appliance Modules!

Forteen new "NetBackup 5030 Appliance" modules added to the NetBackup 5030 Appliance category

New NetBackup 5030 Appliance Modules!

One new "NetBackup 5330 Appliance" Module added to the NetBackup 5330 category

New NetBackup 7.6 Blueprints - Job Aids in PDF format!

Two new "NetBackup 7.6 Blueprints - Job Aids in PDF format" added to the NetBackup 7.6 Blueprints - Job Aids in PDF format category

New Endpoint Protection 12.1.4 Modules!

Twenty six new "Endpoint Protection 12.1.4" Modules added to the Endpoint Protection category


How to Contact Support
  • How to Contact Support
    This module discusses how to obtain technical support from Symantec, what self-help resources are available, and what information to gather before calling support.
ApplicationHA
  • Symantec ApplicationHA 6.0 for VMware Differences
    This module explains the changes in ApplicationHA 6.0 with VMware. In this module, you learn how to understand availability layers and VMware HA integration, and to describe an overview of ApplicationHA 5.1 SP2, and ApplicationHA 6.0, as well as off the shelf application support. You also learn how to explain the integration of ApplicationHA with Veritas Operations Manager and Backup Exec.
  • Symantec ApplicationHA 6.0 for KVM, LDOM and LPAR
    This module describes the changes in ApplicationHA 6.0 for KVM, Oracle VM (LDOM), and LPAR. In this module, you learn how to understand availability layers and how this can be integrated with Veritas Cluster Server for increased application visibility and availability. You also learn how to understand application recovery with Veritas Cluster Server and Application HA, and how to recommend ApplicationHA deployment solutions with Veritas Cluster Server for KVM, LDOM and LPAR.
  • ApplicationHA 5.1- Overview
    In this module, you learn about the components of the VMware vSphere 4.1 datacenter environment. You also learn about how ApplicationHA integrates into the vSphere architecture.
  • ApplicationHA 5.1- Installing ApplicationHA
    In this module, you learn how to install ApplicationHA Console Server as well as guest components for both Linux and Windows virtual machines. You also learn how to install the VMware vSphere Client in order to validate the ApplicationHA installation.
  • ApplicationHA 5.1- Configuration and Administration
    In this module, you learn how to prepare applications and configure application monitoring using the ApplicationHA tab in the vSphere Client. You also learn about administering ApplicationHA.
  • ApplicationHA 5.1- Additional Symantec Solutions for Vmware
    In this module, you learn about storage, high availability, and disaster recovery solutions from Symantec that can be implemented in physical and virtual environments. You also learn about management tools to simplify datacenter management.
  • ApplicationHA 5.1- Architecture and Advanced Configuration
    In this module, you learn about the Veritas Cluster Server architecture on which ApplicationHA is based. You also learn how to use the VCS command-line interface to customize the ApplicationHA configuration, as well as how to troubleshoot problems.
Backup Exec
Backup Exec 2014
Backup Exec 2014 Blueprints - Job Aids in PDF Format
  • Backup Exec 2014: PowerShell Integration
    This white paper for Backup Exec 2014 describes the Backup Exec Management Client - requirements, known limitations and best practices
  • Backup Exec 2014 White Paper-Data Lifecycle Management
    This white paper for Backup Exec 2014 describes Data Lifecycle Management - fundamentals and best practices
  • BE 2014 Blueprints - Agent for Windows.pdf
    These Blueprints are designed to show customer challenges and how Backup Exec solves these challenges. Each Blueprint consists of: —Pain Points: what challenges customers face; —Whiteboard: Shows how Backup Exec solves the customer challenges; —Recommended Configuration: Shows recommended installation; —Do’s: Gives detailed configurations suggested by Symantec; —Don'ts: What configurations & pitfalls customers should avoid; —Advantages: Summarizes the Backup Exec advantages. Use these Blueprints to: —Understand the customer challenges and how Backup Exec solves them; —Present the Backup Exec best practice solution. Note: This course requires latest version of Adobe Reader to launch.
  • BE 2014 Blueprints - Blueprint for Backup Exec 3600 R3 Appliance.pdf
  • BE 2014 Blueprints - D2D2T Advantages.pdf
  • BE 2014 Blueprints - Deduplication.pdf
  • BE 2014 Blueprints - Exchange.pdf
  • BE 2014 Blueprints - Hyper-V.pdf
  • BE 2014 Blueprints - Large Environments.pdf
  • BE 2014 Blueprints - Optimized Duplication.pdf
  • BE 2014 Blueprints - OST Powered Appliances.pdf
  • BE 2014 Blueprints - P2V and B2V.pdf
  • BE 2014 Blueprints - Performance Tuning.pdf
  • BE 2014 Blueprints - Private Cloud Services.pdf
  • BE 2014 Blueprints - Remote Office Protection.pdf
  • BE 2014 Blueprints - SharePoint.pdf
  • BE 2014 Blueprints - Simplified Disaster Recovery.pdf
  • BE 2014 Blueprints - Small Environments.pdf
  • BE 2014 Blueprints - SQL.pdf
  • BE 2014 Blueprints - VMware.pdf
  • Symantec Backup Exec 2014 Blueprint for Data Lifecycle Management
    Symantec Backup Exec 2014 BluePrint for Data Lifecycle Management discusses the functional behavior of data life cycle management in Backup Exec 2014 It consists of : Pain Points: Lists the challenges that a customer faces Whiteboard: Shows how Backup Exec solves the customer challenges Recommended Configuration: Shows recommended installation Dos: Gives detailed configurations suggested by Symantec Don'ts: What configurations and pitfalls customers must avoid Advantages: Summarizes the Backup Exec advantages.
Backup Exec 2014 Differences
  • BE 2014: Overview (1 of 43)
    This module describes the new features and enhancements made to Backup Exec 2014. It also covers the new features and enhancements made to Backup Exec 2014 agents, options, and utilities. Finally, it covers the end-of-life platforms and features in Backup Exec 2014.
  • Installing BE 2014 (2 of 43)
    This module describes the Backup Exec 2014 installation process along with the requirements and prerequisites for installing Backup Exec 2014. It also covers the licensing options and the components installed with Backup Exec. Finally, it describes the steps to perform a typical installation and information displayed in the Migration Report.
  • BE 2014: Licensing (3 of 43)
    This module describes the Backup Exec 2014 Licensing editions and licensing schemes for Backup Exec 2014 agents and options. It also covers the prerequisites and deployment information for installing Small Business Server and Small Business Edition licenses, Capacity Edition licenses, and Backup Exec V-Ray Edition licenses. Additionally, it describes the upgrade path for the Desktop and Laptop Option in Backup Exec 2012 and Backup Exec 2014. Finally, it covers the license related logging and debugging information included in the Debug Monitor.
  • BE 2014 Installation Enhancements: New Default Database (4 of 43)
    This module describes the Backup Exec 2014 default database features and the requirements and prerequisites for installing Microsoft SQL Server 2008 R2 SP2 Express. It also covers the Microsoft SQL Server 2008 R2 SP2 Express installation process, the upgrade process, and upgrade paths. Finally, it covers how to troubleshoot installation and configuration issues.
  • BE 2014 Installation Enhancements: BE Credentials (5 of 43)
    This module describes the improvements made to the Backup Exec Logon Accounts Manager. It also covers how to set a schedule for performing resource credential checks.
  • Installing the BE 2014 Server on Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2 (6 of 43)
    This module describes the platform support and prerequisites for installing the Backup Exec 2014 server on Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2 systems. It also covers the component updates and installation impacts. Finally, it describes the Kernel Mode Driver modifications and installation log locations.
  • Upgrading to BE 2014 (7 of 43)
    This module covers the upgrade paths available for Backup Exec 2014 and the upgrade process. It also describes the job migration process and the enhancements to the migration report. In addition, the module covers the basic techniques to troubleshoot Backup Exec 2014 upgrade issues.
  • Upgrading to BE 2014 CASO (8 of 43)
    This module describes the Backup Exec 2014 CASO functionality. It also covers how to upgrade a Backup Exec 2012 CASO environment to Backup Exec 2014. In addition, the module covers components upgraded in a CASO environment. Finally, it describes how to perform a rolling upgrade and view the migration report.
  • BE 2014: Graphical User Interface Enhancements (9 of 43)
    This module covers the enhancements made to the status bar in Backup Exec 2014. It also covers the enhancements made to switching server details and viewing granular server details. In addition, the module describes the enhancements made to the backup selection list pertaining to resource ordering and global and backup-level excludes. Finally, it describes the enhancements made to the job name and job description fields in Backup Exec 2014.
  • BE 2014 Job Monitor (10 of 43)
    This module describes the job monitoring options in Backup Exec 2014, and the Backup Exec 2014 Job Monitor. It also covers the standard and compact views in the job monitor. Finally, the module covers the commands and filters for viewing jobs and job history.
  • BE 2014 Core: Storage Enhancements (11 of 43)
    This module describes the storage options available in Backup Exec 2014. It also describes the reasons for depreciating Kernel-mode drivers from Backup Exec 2014 and the key modifications made to Backup Exec 2014.
  • BE 2014 Data Lifecycle Management (12 of 43)
    This module covers the fundamentals and benefits of DLM. It also describes the DLM evolution, architecture, and terminology. In addition, the module covers DLM rules pertaining to expiration, retention, and dependency. The module also describes the DLM enhancements made to handling disk cartridge devices. Finally, it describes how to troubleshoot issues related to DLM.
  • BE 2014 Core: Retired Servers Group (13 of 43)
    This module describes the need for the Retired Servers group. It also covers the features and functionality of the Retired Servers group. In addition, the module covers how to retire a server.
  • BE 2014 Core: Mixed Backup Method (14 of 43)
    This module covers the mixed backup method, its functionality, and support in Backup Exec 2014.
  • BE 2014 Core: Multi-server Backup Definitions (15 of 43)
    This module describes multi-server backup definitions. It also covers how to create, edit, and monitor a multi-server backup definition. In addition it describes the enhancements made to archive job options.
  • Enhancements to System State Backups and Active Directory Granular Restore (16 of 43)
    This module describes the enhancements made to System State backups in Backup Exec 2014. It also describes the Backup Exec 2014 enhancements made to GRT backups and restores of Microsoft Windows Server 2012 R2 Active Directory.
  • BE 2014 Restore Enhancements (17 of 43)
    This module describes how to restore data from a single backup set or multiple backup sets. In addition, it describes how to restore data from a device or media. Finally, the module covers how to restore data from backup sets created by a specific backup job.
  • BE 2014 Scheduling Enhancements (18 of 43)
    This module covers the Backup Options Schedule tab modifications. It also covers the restricted hourly schedule and its recurrence patterns. Additionally, the module describes scheduling options and the recurrence pattern of the Monthly option – Days of the Month schedule and the Monthly option – Dates of the Month schedule. Finally, it covers the Include Dates and Per-job Exclude Dates, Jobs without a schedule and setting the job log level to capture Backup Exec Server logs.
  • BE 2014 Schedule Upgrade (19 of 43)
    This module covers the Backup Exec versions that can be upgraded to Backup Exec 2014. It also describes about the different scenarios to upgrade to Backup Exec 2014. In addition, the module covers the workflow of the Backup Exec scheduler during an upgrade. Finally, it describes the behavior of the Backup Exec scheduler during different upgrade scenarios.
  • Enhancements to BE 2014 Alerts (20 of 43)
    This module describes how to configure alerts in Backup Exec 2014. It also describes the enhancements made to alerts in Backup Exec 2014.
  • BE 2014 Support for Resilient File System (ReFS) (21 of 43)
    This module covers Resilient File System and Alternate Data Streams. It also describes Backup Exec 2014 support for Resilient File System – Alternate Data Streams.
  • BE 2014 Core: Support for Microsoft Windows Server 2012 Storage Spaces (22 of 43)
    This module describes the Backup Exec 2014 support for Microsoft Windows Server 2012 storage spaces.
  • BE 2014 Core: Support for 4k Disks (23 of 43)
    This module covers the basics of large sector sizes and the support for large sectors in Microsoft Windows Server 2012 and Backup Exec 2014. It also covers the backup requirements and GRT support of 4K disks. Finally, the module covers the issues related to 4K disks and how to troubleshoot large sector issues.
  • BE 2014 Enhancements for Windows User and System Registries (24 of 43)
    This module describes the registry updates for Microsoft Windows Server 2012 R2. It also covers how to back up and restore Microsoft Windows Server 2012 R2 user and system registries.
  • BE 2014 Support for Backup and Recovery of Microsoft Windows Recovery Environment (25 of 43)
    This module describes the features and functionality of the Windows Recovery Environment. It also describes the Backup Exec 2014 support for the Windows Recovery Environment. Finally, the module covers the backup and recovery process for Windows Recovery Environment.
  • Renaming the BE Server (26 of 43)
    This module covers the Backup Exec server rename issues. It also covers the Backup Exec 2014 server rename. In addition, the module describes the catalog self-healing basics. Finally, it covers the catalog self-healing process for a standalone Backup Exec server rename, a managed Backup Exec server rename, and a central administration server rename.
  • BE 2014 Advanced Open File Option Enhancements (27 of 43)
    This module covers the basics of Volume Shadow Copy providers. It also covers the iSCSI hardware VSS provider in Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2. Finally, the module describes the enhancements made to Backup Exec VSS provider selection logic.
  • BE 2014 Simplified Disaster Recovery Enhancements (28 of 43)
    This module describes how to install the Backup Exec 2014 Simplified Disaster Recovery Disk Creation Wizard and how to create a Backup Exec 2014 SDR disk. In addition, it also describes the Microsoft Windows Server 2012 and Windows 8 features supported by Backup Exec 2014 SDR. Finally, the module covers how to troubleshoot common SDR issues.
  • Delayed Cataloging Enhancements (29 of 43)
    This module describes delayed cataloging and the different delayed catalog operation options. It also describes the effect of Backup Exec cataloging on data byte count calculation.
  • BE Debug Monitor Enhancements (30 of 43)
    This module covers the basics of the Backup Exec Debug Monitor utility. It also describes the various limitations of Debug Monitor in earlier versions. Finally, the module covers the enhancements made to the Debug Monitor in Backup Exec 2014.
  • BE 2014: Enhancement to BE Utility (31 of 43)
    This module describes Backup Exec server security certificate management using the BEUtility tool. It also covers the self-healing approach in the server rename operation.
  • BE 2014 BEDBG (32 of 43)
    This module covers the basic functionality of BEDBG in Backup Exec 2014. It also covers the process flow of BEDBG in Backup Exec 2014.
  • BE 2014 BE Management Command Line Interface Enhancements (33 of 43)
    This module covers the basics of the Backup Exec Management Command Line Interface. It also describes the enhancements made to BEMCLI in Backup Exec 2014. Finally, it covers how to configure and work with BEMCLI.
  • BE 2014: Physical to Virtual Enhancements (34 of 43)
    This module describes the incremental conversion support. It also describes the one-time conversion to a virtual machine feature. In addition, the module describes the Backup Exec 2014 support for exclusion of disks from conversion. Finally, it describes the conversion support for 2 TB or larger disks.
  • BE 2014 Installation Enhancements: Push Installing Agent for Windows to Multiple Virtual Machines (35 of 43)
    This module describes the enhancements made to the Add a Server wizard for VMware vCenter server or ESX host and the Microsoft Hyper-V host. It also covers the steps to push-install the Backup Exec Agent for Windows to VMware or Hyper-V virtual machines.
  • BE 2014: Agent for VMware Enhancements (36 of 43)
    This module describes the new features in VMware vSphere 5.5. It also covers the VMware vSphere 5.5 features supported by Backup Exec 2014. Finally, the module describes the enhancements made to the Agent for VMware.
  • BE 2014: Agent for Hyper-V Enhancements (37 of 43)
    This module covers the Microsoft Windows Server 2012 R2: Hyper-V. It also describes Backup Exec 2014 support for various Hyper-V features and enhancements.
  • BE 2014: Microsoft SQL Server Agent Enhancements (38 of 43)
    This module describes the features and platforms supported by the Agent for Microsoft SQL Server in Backup Exec 2014. It also describes the enhancements made to Backup Exec 2014 to support Microsoft SQL Server. Finally, the module covers the Microsoft SQL server features that are not supported in Backup Exec 2014.
  • BE 2014: Agent for Microsoft SharePoint Enhancements (39 of 43)
    This module covers the basics of Backup Exec Agent for SharePoint and the supported SharePoint platforms. It also describes the new features in Microsoft SharePoint 2013 and Backup Exec 2014 GRT support for Microsoft SharePoint 2013. In addition, the module describes how to perform GRT backups and restores in Backup Exec 2014. Finally, it describes the claims-based authentication and how to troubleshooting SharePoint issues.
  • Site Mailbox (40 of 43)
    This module covers the role and functionality of Site Mailboxes. It also covers the internal working of Site Mailboxes. Finally, the module describes how to backup and restore Site Mailboxes.
  • BE 2014: Microsoft Exchange Server Agent Enhancements (41 of 43)
    This module describes the features and platforms supported by the Backup Exec Agent for Microsoft Exchange. It also covers the changes made to the Backup Exec Agent for Microsoft Exchange to support Microsoft Exchange 2013 GRT backups. Finally, it describes how to troubleshoot common Microsoft Exchange related issues.
  • BE 2014: Agent for Lotus Domino Enhancements (42 of 43)
    This module covers the limitations of existing restore options for Lotus Domino. It also describes the Create a copy of the database option. In addition, the module describes the internal changes made to the restore process. Finally, it covers the user interface enhancements to support new restore option.
  • BE 2014 Deduplication Enhancements (43 of 43)
    This module describes Deduplication version 7 in Backup Exec 2014. It also covers the Backup Exec 2014 dedup integrity and recoverability enhancements. In addition, the module covers the Dedup 64 TB support and performance enhancements. Finally, it describes the Dedup supportability improvements.
Backup Exec 2014 Differences (Japanese)
These modules are translated versions of the Backup Exec 2014: Differences course content in PDF format. When you click on Launch button, you can view or download a pdf file that contains the English and Japanese versions of the content, which you can review offline.
  • BE 2014: Overview (1 of 43)
    This module describes the new features and enhancements made to Backup Exec 2014. It also covers the new features and enhancements made to Backup Exec 2014 agents, options, and utilities. Finally, it covers the end-of-life platforms and features in Backup Exec 2014.
  • Installing BE 2014 (2 of 43)
    This module describes the Backup Exec 2014 installation process along with the requirements and prerequisites for installing Backup Exec 2014. It also covers the licensing options and the components installed with Backup Exec. Finally, it describes the steps to perform a typical installation and information displayed in the Migration Report.
  • BE 2014 Licensing (3 of 43)
    This module describes the Backup Exec 2014 Licensing editions and licensing schemes for Backup Exec 2014 agents and options. It also covers the prerequisites and deployment information for installing Small Business Server and Small Business Edition licenses, Capacity Edition licenses, and Backup Exec V-Ray Edition licenses. Additionally, it describes the upgrade path for the Desktop and Laptop Option in Backup Exec 2012 and Backup Exec 2014. Finally, it covers the license related logging and debugging information included in the Debug Monitor.
  • BE 2014 Installation Enhancements: New Default Database (4 of 43)
    This module describes the Backup Exec 2014 default database features and the requirements and prerequisites for installing Microsoft SQL Server 2008 R2 SP2 Express. It also covers the Microsoft SQL Server 2008 R2 SP2 Express installation process, the upgrade process, and upgrade paths. Finally, it covers how to troubleshoot installation and configuration issues.
  • BE 2014 Installation Enhancements: BE Credentials (5 of 43)
    This module describes the improvements made to the Backup Exec Logon Accounts Manager. It also covers how to set a schedule for performing resource credential checks.
  • Installing the BE 2014 Server on Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2 (6 of 43)
    This module describes the platform support and prerequisites for installing the Backup Exec 2014 server on Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2 systems. It also covers the component updates and installation impacts. Finally, it describes the Kernel Mode Driver modifications and installation log locations.
  • Upgrading to BE 2014 (7 of 43)
    This module covers the upgrade paths available for Backup Exec 2014 and the upgrade process. It also describes the job migration process and the enhancements to the migration report. In addition, the module covers the basic techniques to troubleshoot Backup Exec 2014 upgrade issues.
  • Upgrading to BE 2014 CASO (8 of 43)
    This module describes the Backup Exec 2014 CASO functionality. It also covers how to upgrade a Backup Exec 2012 CASO environment to Backup Exec 2014. In addition, the module covers components upgraded in a CASO environment. Finally, it describes how to perform a rolling upgrade and view the migration report.
  • BE 2014: Graphical User Interface Enhancements (9 of 43)
    This module covers the enhancements made to the status bar in Backup Exec 2014. It also covers the enhancements made to switching server details and viewing granular server details. In addition, the module describes the enhancements made to the backup selection list pertaining to resource ordering and global and backup-level excludes. Finally, it describes the enhancements made to the job name and job description fields in Backup Exec 2014.
  • BE 2014 Job Monitor (10 of 43)
    This module describes the job monitoring options in Backup Exec 2014, and the Backup Exec 2014 Job Monitor. It also covers the standard and compact views in the job monitor. Finally, the module covers the commands and filters for viewing jobs and job history.
  • BE 2014 Core: Storage Enhancements (11 of 43)
    This module describes the storage options available in Backup Exec 2014. It also describes the reasons for depreciating Kernel-mode drivers from Backup Exec 2014 and the key modifications made to Backup Exec 2014.
  • BE 2014 Data Lifecycle Management (12 of 43)
    This module covers the fundamentals and benefits of DLM. It also describes the DLM evolution, architecture, and terminology. In addition, the module covers DLM rules pertaining to expiration, retention, and dependency. The module also describes the DLM enhancements made to handling disk cartridge devices. Finally, it describes how to troubleshoot issues related to DLM.
  • BE 2014 Core: Retired Servers Group (13 of 43)
    This module describes the need for the Retired Servers group. It also covers the features and functionality of the Retired Servers group. In addition, the module covers how to retire a server.
  • BE 2014 Core: Mixed Backup Method (14 of 43)
    This module covers the mixed backup method, its functionality, and support in Backup Exec 2014.
  • BE 2014 Core: Multi-server Backup Definitions (15 of 43)
    This module describes multi-server backup definitions. It also covers how to create, edit, and monitor a multi-server backup definition. In addition it describes the enhancements made to archive job options.
  • Enhancements to System State Backups and Active Directory Granular Restore (16 of 43)
    This module describes the enhancements made to System State backups in Backup Exec 2014. It also describes the Backup Exec 2014 enhancements made to GRT backups and restores of Microsoft Windows Server 2012 R2 Active Directory.
  • BE 2014 Restore Enhancements (17 of 43)
    This module describes how to restore data from a single backup set or multiple backup sets. In addition, it describes how to restore data from a device or media. Finally, the module covers how to restore data from backup sets created by a specific backup job.
  • BE 2014 Scheduling Enhancements (18 of 43)
    This module covers the Backup Options Schedule tab modifications. It also covers the restricted hourly schedule and its recurrence patterns. Additionally, the module describes scheduling options and the recurrence pattern of the Monthly option – Days of the Month schedule and the Monthly option – Dates of the Month schedule. Finally, it covers the Include Dates and Per-job Exclude Dates, Jobs without a schedule and setting the job log level to capture Backup Exec Server logs.
  • BE 2014 Schedule Upgrade (19 of 43)
    This module covers the Backup Exec versions that can be upgraded to Backup Exec 2014. It also describes about the different scenarios to upgrade to Backup Exec 2014. In addition, the module covers the workflow of the Backup Exec scheduler during an upgrade. Finally, it describes the behavior of the Backup Exec scheduler during different upgrade scenarios.
  • Enhancements to BE 2014 Alerts (20 of 43)
    This module describes how to configure alerts in Backup Exec 2014. It also describes the enhancements made to alerts in Backup Exec 2014.
  • BE 2014 Support for Resilient File System (ReFS) (21 of 43)
    This module covers Resilient File System and Alternate Data Streams. It also describes Backup Exec 2014 support for Resilient File System – Alternate Data Streams.
  • BE 2014 Core: Support for Microsoft Windows Server 2012 Storage Spaces (22 of 43)
    This module describes the Backup Exec 2014 support for Microsoft Windows Server 2012 storage spaces.
  • BE 2014 Core: Support for 4k Disks (23 of 43)
    This module covers the basics of large sector sizes and the support for large sectors in Microsoft Windows Server 2012 and Backup Exec 2014. It also covers the backup requirements and GRT support of 4K disks. Finally, the module covers the issues related to 4K disks and how to troubleshoot large sector issues.
  • BE 2014 Enhancements for Windows User and System Registries (24 of 43)
    This module describes the registry updates for Microsoft Windows Server 2012 R2. It also covers how to back up and restore Microsoft Windows Server 2012 R2 user and system registries.
  • BE 2014 Support for Backup and Recovery of Microsoft Windows Recovery Environment (25 of 43)
    This module describes the features and functionality of the Windows Recovery Environment. It also describes the Backup Exec 2014 support for the Windows Recovery Environment. Finally, the module covers the backup and recovery process for Windows Recovery Environment.
  • Renaming the BE Server (26 of 43)
    This module covers the Backup Exec server rename issues. It also covers the Backup Exec 2014 server rename. In addition, the module describes the catalog self-healing basics. Finally, it covers the catalog self-healing process for a standalone Backup Exec server rename, a managed Backup Exec server rename, and a central administration server rename.
  • BE 2014 Advanced Open File Option Enhancements (27 of 43)
    This module covers the basics of Volume Shadow Copy providers. It also covers the iSCSI hardware VSS provider in Microsoft Windows Server 2012 and Microsoft Windows Server 2012 R2. Finally, the module describes the enhancements made to Backup Exec VSS provider selection logic.
  • BE 2014 Simplified Disaster Recovery Enhancements (28 of 43)
    This module describes how to install the Backup Exec 2014 Simplified Disaster Recovery Disk Creation Wizard and how to create a Backup Exec 2014 SDR disk. In addition, it also describes the Microsoft Windows Server 2012 and Windows 8 features supported by Backup Exec 2014 SDR. Finally, the module covers how to troubleshoot common SDR issues.
  • Delayed Cataloging Enhancements (29 of 43)
    This module describes delayed cataloging and the different delayed catalog operation options. It also describes the effect of Backup Exec cataloging on data byte count calculation.
  • BE Debug Monitor Enhancements (30 of 43)
    This module covers the basics of the Backup Exec Debug Monitor utility. It also describes the various limitations of Debug Monitor in earlier versions. Finally, the module covers the enhancements made to the Debug Monitor in Backup Exec 2014.
  • BE 2014: Enhancement to BE Utility (31 of 43)
    This module describes Backup Exec server security certificate management using the BEUtility tool. It also covers the self-healing approach in the server rename operation.
  • BE 2014 BEDBG (32 of 43)
    This module covers the basic functionality of BEDBG in Backup Exec 2014. It also covers the process flow of BEDBG in Backup Exec 2014.
  • BE 2014 BE Management Command Line Interface Enhancements (33 of 43)
    This module covers the basics of the Backup Exec Management Command Line Interface. It also describes the enhancements made to BEMCLI in Backup Exec 2014. Finally, it covers how to configure and work with BEMCLI.
  • BE 2014: Physical to Virtual Enhancements (34 of 43)
    This module describes the incremental conversion support. It also describes the one-time conversion to a virtual machine feature. In addition, the module describes the Backup Exec 2014 support for exclusion of disks from conversion. Finally, it describes the conversion support for 2 TB or larger disks.
  • BE 2014 Installation Enhancements: Push Installing Agent for Windows to Multiple Virtual Machines (35 of 43)
    This module describes the enhancements made to the Add a Server wizard for VMware vCenter server or ESX host and the Microsoft Hyper-V host. It also covers the steps to push-install the Backup Exec Agent for Windows to VMware or Hyper-V virtual machines.
  • BE 2014: Agent for VMware Enhancements (36 of 43)
    This module describes the new features in VMware vSphere 5.5. It also covers the VMware vSphere 5.5 features supported by Backup Exec 2014. Finally, the module describes the enhancements made to the Agent for VMware.
  • BE 2014: Agent for Hyper-V Enhancements (37 of 43)
    This module covers the Microsoft Windows Server 2012 R2: Hyper-V. It also describes Backup Exec 2014 support for various Hyper-V features and enhancements.
  • BE 2014: Microsoft SQL Server Agent Enhancements (38 of 43)
    This module describes the features and platforms supported by the Agent for Microsoft SQL Server in Backup Exec 2014. It also describes the enhancements made to Backup Exec 2014 to support Microsoft SQL Server. Finally, the module covers the Microsoft SQL server features that are not supported in Backup Exec 2014.
  • BE 2014: Agent for Microsoft SharePoint Enhancements (39 of 43)
    This module covers the basics of Backup Exec Agent for SharePoint and the supported SharePoint platforms. It also describes the new features in Microsoft SharePoint 2013 and Backup Exec 2014 GRT support for Microsoft SharePoint 2013. In addition, the module describes how to perform GRT backups and restores in Backup Exec 2014. Finally, it describes the claims-based authentication and how to troubleshooting SharePoint issues.
  • Site Mailbox (40 of 43)
    This module covers the role and functionality of Site Mailboxes. It also covers the internal working of Site Mailboxes. Finally, the module describes how to backup and restore Site Mailboxes.
  • BE 2014: Microsoft Exchange Server Agent Enhancements (41 of 43)
    This module describes the features and platforms supported by the Backup Exec Agent for Microsoft Exchange. It also covers the changes made to the Backup Exec Agent for Microsoft Exchange to support Microsoft Exchange 2013 GRT backups. Finally, it describes how to troubleshoot common Microsoft Exchange related issues.
  • BE 2014: Agent for Lotus Domino Enhancements (42 of 43)
    This module covers the limitations of existing restore options for Lotus Domino. It also describes the Create a copy of the database option. In addition, the module describes the internal changes made to the restore process. Finally, it covers the user interface enhancements to support new restore option.
  • BE 2014 Deduplication Enhancements (43 of 43)
    This module describes Deduplication version 7 in Backup Exec 2014. It also covers the Backup Exec 2014 dedup integrity and recoverability enhancements. In addition, the module covers the Dedup 64 TB support and performance enhancements. Finally, it describes the Dedup supportability improvements.
Backup Exec 2012
Backup Exec 2012 Differences
  • BE2010-R3-SP3 and BE2012-SP2 Differences: What’s New in Backup Exec 2010 R3 SP3 and Backup Exec 2012 SP2 (1 of 9)
    This module give a product overview and discusses support for various platforms.
  • BE2010-R3-SP3 and BE2012-SP2 Differences: Installing Backup Exec 2010 R3 SP3 and Backup Exec 2012 SP2 (2 of 9)
    This module discusses prerequisites, requirements and installation procedure.
  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft Windows Server 2012 features - Part 1 (3 of 9)
    Module discusses support for Windows Data Deduplication Volumes, Resilient File System and VSS Writer.
  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft Windows Server 2012 features – Part 2 (4 of 9)
    Module continues discussing support for Windows Recovery Partition, other supported features and unsupported features.
  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft Windows 2012 Hyper-V (5 of 9)
    Discusses VHDX, Hyper-V VMs, Cluster Shared Volumes, incremental backups, backup and restore, and unsupported features.
  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for VMware vSphere 5.1 (6 of 9)
    This module concentrates on support for VMWare 5.1, VMs running MS Windows 2012, and VM backup and restore.
  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft Exchange (7 of 9)
    Module describes support, backup, and restore for MS Exchange 2013, and 2010-SP3.
  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft SharePoint 2013 (8 of 9)
    This module discusses Backup Exec 2012 support for MS SharePoint 2013.
  • BE2010-R3-SP3 and BE2012-SP2 Differences: Support for Microsoft SQL Server (9 of 9)
    This module discusses support for Microsoft SQL Server.
  • What Is New in Backup Exec 2012 (1 of 6)
    In this module, you learn about the new features and enhancements made to Backup Exec 2012 core. You also learn about the new features and enhancements made to Backup Exec 2012 agents. Finally, you learn about the new features and enhancements made to Backup Exec 2012 options.
  • Understanding the Backup Exec 2012 Graphical User Interface (2 of 6)
    In this module, you learn about the rationale for the new Backup Exec 2012 graphical user interface. You also learn about the layout and elements used for various Backup Exec functions. Finally, you learn about the new Backup Exec 2012 views, tasks, and the functions performed in each view.
  • Configuring Storage in Backup Exec 2012 (3 of 6)
    In this module, you learn about the rationale for the new Backup Exec 2012 Storage view. You also learn about the layout and elements used for various storage functions. In addition, you learn about the new features and enhancements made to the Backup Exec 2012 Storage view. Finally, you learn how to create and configure storage objects.
  • Backup Exec Private Cloud Services (4 of 6)
    In this module, you learn about Backup Exec private cloud services. You also learn about the types of Backup Exec private cloud services offerings, how to configure Backup Exec private cloud services, and the key installation requirements. In addition, you learn about the features of private cloud services in Backup Exec 2012. Finally, you learn how to troubleshoot Backup Exec private cloud services issues.
  • Patch Management Enhancements (5 of 6)
    In this module, you learn about previous patch management issues and the patch management enhancements made to Backup Exec 2012. You also learn about the LiveUpdate process flow and how to configure discovery schedules. Finally, you learn about the different methods to update AWS.
  • End of Life Items (6 of 6)
    In this module, you learn about the Backup Exec options, agents, and job and interface objects that have been terminated. You also learn about the operating systems, products, and tools that are no longer supported, and software versions that are not tested.
Backup Exec 2012 Administration: Installation and Configuration
  • BE 2012 Admin: Install & Config: Course Introduction (1 of 33)
    In this module, you learn about the course in brief.
  • BE 2012 Admin: Install & Config: Backup Exec Fundamentals (2 of 33)
    In this module, you learn about data backup and Symantec’s backup solution. You also learn about the key benefits, functionality, and architecture of Backup Exec 2012.
  • BE 2012 Admin: Install & Config: Installing BE 2012 (3 of 33)
    In this module, you learn how to install a Backup Exec server and use the Backup Exec Administration Console. You also learn how to update and upgrade to Backup Exec 2012.
  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo A (4 of 33)
    In this demonstration, you learn how to perform a custom installation of Backup Exec 2012.
  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo B (5 of 33)
    In this demonstration, you learn how to start Backup Exec 2012, view, and understand the information displayed in the various Widgets of the Home tab.
  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo C (6 of 33)
    In this demonstration, you learn to view, work with, and interpret the information and elements in the Backup and Restore tab, Storage tab and Reports tab of the Backup Exec 2012 console.
  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo D (7 of 33)
    In this demonstration, you learn how to create a configured view in Backup Exec 2012.
  • BE 2012 Admin: Install & Config: Installing BE 2012 - Demo E (8 of 33)
    In this demonstration, you learn how to create and configure a new Backup Exec logon account.
  • BE 2012 Admin OD ILT: Install and Config: Storage Devices (9 of 33)
    In this module, you learn about the types of devices you can use with Backup Exec. You also learn how to configure devices from within the Backup Exec Administration Console. Finally, you learn how to establish device pools to be used by Backup Exec.
  • BE 2012 Admin: Install & Config: Storage Devices - Demo A (10 of 33)
    In this demonstration, you learn how to install Backup Exec tape drivers.
  • BE 2012 Admin: Install & Config: Storage Devices - Demo B (11 of 33)
    In this demonstration, you learn how to create a disk storage device using the Configuration Wizard.
  • BE 2012 Admin: Install & Config: Storage Devices - Demo C (12 of 33)
    In this demonstration, you learn how to view and interpret disk storage device properties.
  • BE 2012 Admin: Install & Config: Storage Devices - Demo D (13 of 33)
    In this demonstration, you learn how to create a storage pool using the Configuration Wizard.
  • BE 2012 Admin: Install & Config: Storage Devices - Demo E (14 of 33)
    In this demonstration, you learn how to view and interpret storage default values.
  • BE 2012 Admin: Install & Config: Data Management (15 of 33)
    In this module, you learn how to organize media into media sets. You also learn why media catalogs are essential to restore operations.
  • BE 2012 Admin: Install & Config: Backing Up Data (16 of 33)
    In this module, you learn how to create and configure backup jobs, and how to run backup jobs manually and according to a schedule. You also learn about the Granular Restore Technology feature and about system state backup.
  • BE 2012 Admin: Install & Config: Backing Up Data - Demo A (17 of 33)
    In this demonstration, you learn how to add a server to Backup Exec 2012.
  • BE 2012 Admin: Install & Config: Backing Up Data - Demo B (18 of 33)
    In this demonstration, you learn how to create a server group.
  • BE 2012 Admin OD ILT: Install and Config: Backing Up Data - Demo C (19 of 33)
    In this demonstration, you learn how to back up files and folders.
  • BE 2012 Admin: Install & Config: Backing Up Data - Demo D (20 of 33)
    In this demonstration, you learn how to create a one-time backup job.
  • BE 2012 Admin: Install & Config: Backing Up Data - Demo E (21 of 33)
    In this demonstration, you learn to create a new back up job using the settings from an existing backup.
  • BE 2012 Admin: Install & Config: Backing Up Data - Demo F (22 of 33)
    In this demonstration, you learn how to add a stage to a backup job.
  • BE 2012 Admin: Install & Config: Backing Up Data - Demo G (23 of 33)
    In this demonstration, you learn how to perform a system state backup.
  • BE 2012 Admin: Install & Config: Restoring Data (24 of 33)
    In this module, you learn about the basic functionality of restore jobs and the guided methods to restore and search for data. You also learn how to run restore jobs.
  • BE 2012 Admin: Install & Config: Restoring Data - Demo A (25 of 33)
    In this demonstration, you learn how to restore data to its default location.
  • BE 2012 Admin: Install & Config: Restoring Data - Demo B (26 of 33)
    In this demonstration, you learn how to restore data to an alternate location.
  • BE 2012 Admin: Install & Config: Restoring Data - Demo C (27 of 33)
    In this demonstration, you learn how to restore date using the Search Wizard.
  • BE 2012 Admin: Install & Config: Simplified Disaster Recovery (28 of 33)
    In this module, you learn about the basics of Simplified Disaster Recovery. You also learn about the new features in Simplified Disaster Recovery and the process to create a custom Simplified Disaster Recovery disk. Finally, you learn how to perform disaster recovery using Simplified Disaster Recovery.
  • BE 2012 Admin: Install and Config: Simplified Disaster Recovery - Demo A (29 of 33)
    In this demonstration, you learn how to determine the critical and non-critical system devices and backup critical system components using a Simplified Disaster Recovery enabled backup job.
  • BE 2012 Admin: Install & Config: Simplified Disaster Recovery - Demo B (30 of 33)
    In this demonstration, you learn how to perform a complete online restore of a computer.
  • BE 2012 Admin: Install & Config: Virtual Machine Conversion (31 of 33)
    In this module, you learn about the basic concepts of virtual machine conversion and the supported virtual conversion configurations. In addition, you learn about the different virtual machine conversion options. Finally, you learn about the process and workflows for virtual machine conversion.
  • BE 2012 Admin: Install & Config: Virtual Machine Conversion - Demo A (32 of 33)
    In this demonstration, you learn how to backup a computer and convert it to a virtual machine after the backup completes.
  • BE 2012 Admin: Install & Config: Database Maintenance (33 of 33)
    In this module, you learn how to use the Backup Exec Utility for database maintenance operations. You also learn about the requirements and process to change the location of the Backup Exec database.
Backup Exec 2012 Administration: Manage and Administer
  • BE 2012 Admin: Manage & Admin: Remote Agents (1 of 8)
    In this module, you learn about functions and capabilities of the Agent for Windows. You also learn how to install and protect computers using the Agent for Windows. In addition, you learn about the functions of the Agent for Linux and how to backup Linux servers using the agent.
  • BE 2012 Admin: Manage & Admin: Agent for Applications & Databases (2 of 8)
    In this module, you learn about the function of the Agent for Applications and Databases. You also learn how to install the Agent for Applications and Databases, and the applications supported by the Agent for Applications and Databases. Finally, you learn how to protect an Active Directory environment using the Agent for Microsoft Active Directory.
  • BE 2012 Admin: Manage & Admin: Agent for Microsoft SQL Server (3 of 8)
    In this module, you learn about the components and functions of a Microsoft SQL Server database, and the capabilities of the Agent for Microsoft SQL Server. You also learn how to back up and restore a Microsoft SQL Server database using Backup Exec.
  • BE 2012 Admin: Manage & Admin: Agent for Microsoft Exchange Server (4 of 8)
    In this module, you learn about the basic components of Microsoft Exchange and the capabilities of the Agent for Microsoft Exchange Server. You also learn about the server requirements for backing up Microsoft Exchange. In addition, you learn about Backup Exec 2012 support for Exchange 2010 and the process to backup and restore Microsoft Exchange data. Finally, you learn about the restore options available for Microsoft Exchange.
  • BE 2012 Admin: Manage & Admin: Agent for Microsoft SharePoint Server (5 of 8)
    In this module, you learn about the purpose and function of the Agent for Microsoft SharePoint Server and the system requirements for the agent. You also learn how to back up and restore SharePoint Server 2003, 2007, and 2010.
  • BE 2012 Admin: Manage & Admin: Virtual Environment Agents (6 of 8)
    In this module, you learn about virtualization technologies and its benefits. You also learn about the installation procedure for the Agent for VMware and Hyper-V. In addition, you learn about the benefits of the Agent for VMware and how to back up and restore VMware data. Finally, you learn about the benefits of the Agent for Microsoft Hyper-V, how to back up and restore Hyper-V data, and how Backup Exec backs up Microsoft application data on virtual machines.
  • BE 2012 Admin: Manage & Admin: Deduplication Option (7 of 8)
    In this module, you learn about deduplication and Open Storage Technology fundamentals, and Backup Exec support for deduplication. You also learn how to install and configure the Deduplication Option, and run a deduplication job. In addition, you learn about optimized duplication for GRT.
  • BE 2012 Admin: Manage & Admin: Appendix D - Archiving Options for BE 2012 (8 of 8)
    In this module, you learn about the concept of data archival, the key components of the Archiving Option, and the Archiving Option support for Microsoft Exchange and file systems. You also learn how to install the Archiving Option, and archive Microsoft Exchange mailboxes and File Systems. Finally, you learn how to restore data from archives, and protect Archiving Option components.
Backup Exec 2010
Backup Exec 2010 Differences
  • BE2010 - Differences: What is New in Backup Exec 2010
    This module provides a brief description of the new features and enhancements introduced in Backup Exec 2010. The end-of-life items in Backup Exec 2010 are also discussed in this module.
  • BE2010 - Differences: Installation and Upgrade
    This module describes the enhancements made to the Backup Exec 2010 installation wizard and explains how to install Backup Exec 2010 and RAWS. In addition, the module also explains how to upgrade from an earlier version of Backup Exec to Backup Exec 2010.
  • BE2010 - Differences: Support for Windows Server 2008 R2 and Windows 7
    This module describes the new features and enhancements made to Backup Exec 2010 to support Windows Server 2008 R2 and Windows 7 clients.
  • BE2010 - Differences: Virtualization Enhancements
    This module describes the enhancements made to the Backup Exec Agent for Microsoft Hyper-V and the Backup Exec Agent for VMware Virtual Infrastructure.
  • BE2010 - Differences: Archiving Options for Backup Exec 2010
    This module describes the Archiving Options introduced in Backup Exec 2010 for Microsoft Exchange and File System.
  • BE2010 - Differences: Backup Exec Agent for Enterprise Vault Enhancements
    This module describes the enhancements made to the Backup Exec Agent for Enterprise Vault in Backup Exec 2010.
  • BE2010 - Differences: Migrating Data from Enterprise Vault to Backup Exec 2010
    This module describes the Migrator feature introduced in Backup Exec 2010. The Migrator feature migrates older archived items from high cost Enterprise Vault storage to low cost tertiary storage.
  • BE2010 - Differences: Support for Exchange 2010
    This module describes the enhancements made to Backup Exec 2010 to support Microsoft Exchange 2010.
  • BE2010 - Differences: Deduplication Option for Backup Exec 2010
    This module describes the Backup Exec Deduplication feature introduced in Backup Exec 2010. Deduplication identifies and eliminates redundant data, reducing the amount of disk required to store the deduplicated data.
Backup Exec 2010 Installation and Configuration
  • BE2010 Install & Configure - Course Introduction (1 of 7)
    This module provides a brief description of the new features and enhancements introduced in Backup Exec 2010.
  • BE2010 Install & Configure - Backup Exec Fundamentals (2 of 7)
    This module describes the Backup Exec architecture, installation prerequisites and procedure, and discusses how to configure and run a basic backup and restore job.
  • BE2010 Install & Configure - Devices and Media (3 of 7)
    This module describes the devices and media supported by Backup Exec, and the procedure to configure and manage devices. The module also covers managing media and describes Media catalogs.
  • BE2010 Install & Configure - Backing Up Data (4 of 7)
    This module describes the basics components of a backup job, and how to configure and run backup jobs. The module also covers GRT-enabled backups and system state backups.
  • BE2010 Install & Configure - Establishing Backup Policies (5 of 7)
    This module discusses policies, templates, relationship rules, and the procedure to create a policy-based backup job.
  • BE2010 Install & Configure - Restoring Data (6 of 7)
    This module describes how to configure and run restore jobs.
  • BE2010 Install & Configure - Performance Tuning and Database Maintenance (7 of 7)
    This module describes device management and discusses the procedures to manage and maintain the Backup Exec database.
Backup Exec 2010 Manage and Administer
  • BE2010 Manage & Administer - Remote Agents (1 of 8)
    This module describes how to configure and work with Remote agents, like Remote Agent for Windows Systems, Remote Agent for Linux and UNIX Servers, and Active Directory Recovery Agent.
  • BE2010 Manage & Administer - Database Agents (2 of 8)
    This module presents an overview of the Database agents and their installation procedure. This module also lists the databases that are supported by various Backup Exec agents.
  • BE2010 Manage & Administer - Agent for Microsoft SQL Server (3 of 8)
    This module describes the functionality of the Agent for Microsoft SQL Server and the process to backup and restore SQL Server database.
  • BE2010 Manage & Administer - Agent for Microsoft Exchange Server (4 of 8)
    This module discusses the functionality of the Agent for Microsoft Exchange Server and the process to backup and restore Microsoft Exchange Server. This module also covers the procedures to backup and restore Microsoft Exchange 2010.
  • BE2010 Manage & Administer - Agent for SharePoint Server (5 of 8)
    This module describes the functionality of the Agent for Microsoft SharePoint and the process to backup and restore Microsoft SharePoint .
  • BE2010 Manage & Administer - Virtual Environment Agents (6 of 8)
    This module describes the enhancements made to the Backup Exec Agent for Microsoft Hyper-V and the Backup Exec Agent for VMware Virtual Infrastructure.
  • BE2010 Manage & Administer - Archiving Options for Backup Exec 2010 (7 of 8)
    This module describes the Archiving Options introduced in Backup Exec 2010 for Microsoft Exchange and File System.
  • BE2010 Manage & Administer - Deduplication Option (8 of 8)
    This module describes the Backup Exec Deduplication feature introduced in Backup Exec 2010. Deduplication identifies and eliminates redundant data, reducing the amount of disk required to store the deduplicated data.
Backup Exec 2010 Special Topics
  • BE2010 - Working with Microsoft Exchange Granular Recovery Technology
    This module describes how Granular Recovery Technology works with Microsoft Exchange and the features of the Exchange Agent.
  • BE2010 - Configuring and Troubleshooting Tape Hardware
    This module describes tape hardware types and their features and the configuration and troubleshooting procedures.
  • BE2010 - Deduplicating Data Using Backup Exec
    This module briefly describes the data deduplication technology that Backup Exec implements.
  • BE2010 - Using the Symantec Backup Exec Agent for VMware Virtual Infrastructure
    This module explains the features of the Symantec Backup Exec Agent for VMware Virtual Infrastructure, how it works, troubleshooting tips, and best practices.
  • BE2010 - Maintaining the Backup Exec 2010 Environment
    This module explains how to install Backup Exec hotfixes and service packs, maintain and protect Backup Exec databases, and maintain backup devices.
  • BE2010 - Backing Up and Restoring Enterprise Vault
    This module describes Enterprise Vault and its components, the Enterprise Vault Agent, and the procedure to back up and restore Enterprise Vault.
  • BE2010 - Using Granular Recovery Technology with Microsoft SharePoint
    This module discusses the configuration and use of Granular Recovery Technology with Microsoft SharePoint.
  • BE2010 - Backup-to-Disk Best Practices
    This module briefly describes the backup-to-disk folder feature and the backup-to-disk best practices
  • BE2010 - Migrating Data from Enterprise Vault to Backup Exec 2010
    This module describes the process to migrate data from Enterprise Vault servers to Backup Exec.
  • BE2010 - Archiving Exchange Data Using Backup Exec
    This module explains how to archive Microsoft Exchange data by using Backup Exec.
  • BE2010 - Archiving File System Data Using Backup Exec
    This module explains how to archive File System data using Backup Exec.
Backup Exec 12
Backup Exec 12.5
  • BE 12.5 - Windows Servers Enhancements
    This module explains the enhanced functionality implemented in Symantec Backup Exec 12.5 for Windows Servers to support SQL Server 2008, Oracle 11g, and the 64-bit edition of Domino 8. Also covered in this are SharePoint Agent enhancements and NDMP Option enhancements.
  • BE 12.5 - Backing Up and Restoring Enterprise Vault
    This module briefly introduces Enterprise Vault concepts. It also discusses the essential concepts of the Backup Exec Agent for Enterprise Vault, and the procedure to backup and restore Enterprise Vault and its components.
  • BE 12.5 - Exchange Backup and Restore Best Practices
    This module addresses some of the recommended best practices for Exchange Sever backups and restores. The following best practives are discissed: Preparing Exchange Server for Backup, Backing Up the Exchange Information Store Data, Recovering Data for Exchange Information Store, Restoring Data for Exchange Server 2000 and 2003, Disaster Recovery of an Exchange Server.
  • BE 12.5 - Backup Exec Support for Microsoft Virtual Server 2005 and Hyper-V
    This module discusses the fundamental concepts of Symantec Backup Exec Microsoft Virtual Agent. It also describes the procedure to backup and restore Microsoft Virtual Server 2005 and Hyper-V.
  • BE 12.5 - Backup and Recovery of VMware Virtual Infrastructure
    This module discusses the functionality, configuration, and implementation of VMware Virtual Infrastructure. In addition, it discusses how to use the capabilities of Symantec Backup Exec 12.5 for Windows Servers to protect the VMware environment and some of the best practices for backup and recovery.
Backup Exec 12.0
  • BE 12 - Enhanced Backup and Recovery
    Learn how to back up and recover encrypted data and compressed data. Backing up IIS, Terminal Server Services, Active Directory and Microsoft Windows 2008 server will also be covered.
  • BE 12 - Installing and Managing Advanced Open File Option (AOFO)
    Learn how to install and utilize the Advanced Open File Option.
  • BE 12 - Advanced Open File Option (AOFO) and the Volume Shadow Copy Service (VSS)
    Learn the basics about VSS and how it works. Also, learn what system configurations require VSS or VSP, how to configure them for a backup job and how to troubleshoot them.
  • BE 12 - Installing and Managing Central Admin Server Option (CASO)
    Learn how to install and use the Central Admin Server Option.
  • BE 12 - CASO Best Practices
    Learn the best practices for using catalogs, creating backup jobs, restoring information and using alerts and reports with the Central Admin Server Option.
Backup Exec Appliance
Backup Exec Appliance - R3
  • BE3600-Appliance-R3_What’s new in Backup Exec 3600 R3 Appliance (1 of 10)
    This module describes the new features and enhancements introduced in the Backup Exec 3600 R3 Appliance. It also explains the limitations of the Backup Exec 3600 R3 Appliance.
  • BE3600-Appliance-R3_Connecting to the Backup Exec 3600 R3 Appliance (2 of 10)
    This module explains the Backup Exec 3600 R3 Appliance Web interface and its usage.
  • BE3600-Appliance-R3_Upgrading to Backup Exec 3600 R3 Appliance (3 of 10)
    This module describes the upgrade paths available for Backup Exec 3600 R3 Appliance. It also explains the Backup Exec 3600 R3 Appliance upgrade process and discusses how to troubleshoot upgrade issues.
  • BE3600-Appliance-R3_Updating Backup Exec 3600 Appliance (4 of 10)
    This module describes the offline updates mode and its advantages. It also explains the process to install and configure Microsoft Windows Server Update Service and Symantec LiveUpdate Server.
  • BE3600-Appliance-R3_Symantec Critical System Protection (5 of 10)
    This module describes the functionality SCSP, and its implementation details in Backup Exec 3600 R3 Appliance.
  • BE3600-Appliance-R3_NIC Teaming (6 of 10)
    This module describes the concept of NIC Teaming. It also explains the supported NIC Teaming modes for the Backup Exec 3600 R3 Appliance, and the procedure to configure NIC Teaming.
  • BE3600-Appliance-R3_Monitoring and Troubleshooting BE 3600 R3 Appliance Hardware (7 of 10)
    This module describes the different methods to monitor various components of the Backup Exec 3600 R3 Appliance. It also explains the benefits of AutoSupport and how to troubleshoot AutoSupport issues. In addition, it discusses how to interpret hardware failures and their causes.
  • BE3600-Appliance-R3_Appliance Disaster Recovery (8 of 10)
    This module describes the tasks involved in the Backup Exec 3600 R3 Appliance disaster recovery process. It also explains the preservation of Backup Exec components during disaster recovery and the scenarios that require the Appliance disaster recovery process to be initiated.
  • BE3600-Appliance-R3_USB Reimage Failsafe Protection (9 of 10)
    This module describes the USB target platform device feature and the process for reimaging the Backup Exec Appliance.
  • BE3600-Appliance-R3_Backup Exec 3600 R3 Appliance Localization (10 of 10)
    This module describes the Appliance localization support. It also explains how to configure Appliance localization, and troubleshoot known Appliance localization issues.
Backup Exec 3600
  • Backup Exec 3600 Appliance: Setup and Basic Management Tasks
    This video describes the initial configuration and basic management tasks for the Backup Exec 3600 data protection appliance.
  • Backup Exec 3600 Appliance: System Replacement: Preparation and Recovery
    This video describes the steps to prepare a malfunctioning system for replacement, as well as how to recover the new unit to the state of the original.
  • BE 3600 Appliance Demo - Bad Drive Replacement (MP3 video)
    This video provides a brief overview of how to replace a hot swappable hard drive in Backup Exec 3600, including how to determine which drive needs replacement.
  • BE 3600 Appliance Demo - Bad Power Supply Replacement (MP3 video)
    This video provides a brief overview of how to replace a hot swappable power supply in Backup Exec 3600, including how to determine which power supply needs replacement.
  • BE 3600 Disaster Recovery - Bad Appliance Demo
    This module demonstrates how to remove discs from a failed chassis and steps to take to reinstitute the system in a working appliance.
  • BE 3600 Disaster Recovery - Bad Drives Demo
    This module demonstrates how to replace failed discs in an existing appliance and steps to take to re-configure the raid5 array in a working appliance.
  • Backup Exec 3600 Appliance: Fundamentals
    In this module, you learn you learn about the Backup Exec 3600 appliance and the benefits of using it. You also learn about the appliance features and the common appliance deployment scenarios. Finally, you learn about the common appliance server roles, such as the Central Administration Server Option, Managed Media Server, and Stand-alone Media Server.
  • Backup Exec 3600 Appliance: Hardware Specifications
    In this module, you learn about the hardware architecture of the Backup Exec 3600 appliance and the power supply specifications. In addition, you learn about the features of disk modules and drives and how to mount the appliance in the rack. Finally, you learn about the environmental conditions essential for proper functioning of the appliance.
  • Backup Exec 3600 Appliance: Software Specifications
    In this module, you learn about the software programs, agents, options, and tools preinstalled on the Backup Exec 3600 appliance. You also learn about the default factory settings for the appliance and the appliance installation flow. In addition, you learn how to perform the pre-configuration checks for the appliance. Finally, you learn how to perform appliance initial configuration and post-configuration tasks.
  • Backup Exec 3600 Appliance: Tasks and Procedures
    In this module, you learn about the Backup Exec 3600 appliance Web interface, appliance administration using PowerShell, and the methods to update and upgrade the appliance. You also learn how to enable and disable Remote Desktop and monitor the components of the appliance.
  • Backup Exec 3600 Appliance: Features
    In this module, you learn about the appliance support for virtual environments and cloud services. You also learn about the scenarios that require the disaster recovery process to be initiated and the steps in the disaster recovery process. Finally, you learn how to launch the Backup Exec administration console.
Brightmail Gateway
Brightmail Gateway 9.0
  • Brightmail Gateway 9.0 - Introduction to Brightmail Gateway 9.0
    This module provides an introduction to Brightmail Gateway 9.0. It also describes its features and architecture.
  • Brightmail Gateway 9.0 - Installation and Configuration
    This module covers how to install and configure Brightmail Gateway 9.0.
  • Brightmail Gateway 9.0 - Adaptive Reputation Management
    This module describes Adaptive Reputation Management in Brightmail Gateway 9.0
  • Brightmail Gateway 9.0 - Antispam Policies
    This module covers how to create antispam policies in Brightmail Gateway 9.0. It also introduces bounce attack prevention.
  • Brightmail Gateway 9.0 - Antivirus Policies
    This module covers how to create antivirus policies in Brightmail Gateway 9.0. It also covers configuration of LiveUpdate and scan settings.
  • Brightmail Gateway 9.0 - Content Compliance Policy
    This module covers how to setup content compliance scanning. It also describes how to use content compliance policy for structured data matching.
  • Brightmail Gateway 9.0 - Managing User and Host Configuration
    This module covers how to manage user and host configuration in Brightmail Gateway 9.0.
  • Brightmail Gateway 9.0 - Managing Control Center Settings
    This module covers how to configure control center settings of Brightmail Gateway 9.0.
  • Brightmail Gateway 9.0 - Managing Instant Messaging Settings
    This module covers how to manage instant messaging filtering in Brightmail Gateway 9.0.
Brightmail Gateway 8.0
  • Brightmail Gateway 8.0 - Introduction
    This module provides an introduction to Brightmail Gateway 8.0. It also covers key features and architecture in detail.
  • Brightmail Gateway 8.0 - Installation and Configuration
    This module describes how to install and configure Brightmail Gateway 8.0. Overview of Brightmail Gateway Control Center is also discussed.
  • Brightmail Gateway 8.0 - Adaptive Reputation Management
    This module describes Adaptive Reputation Management feature introduced in Brightmail Gateway 8.0. You learn how to configure good and bad senders policies. You also learn to configure connection classification.
  • Brightmail Gateway 8.0 - Antispam Policies
    This module describes how to configure Email Spam Policies in Brightmail Gateway 8.0. You learn to configure spam quarantine and spam scan settings. You also learn to configure sender authentication.
  • Brightmail Gateway 8.0 - Antivirus Policies
    This module describes how to configure Email Virus Policies in Brightmail Gateway 8.0. You learn how to configure settings for LiveUpdate and virus quarantine.
  • Brightmail Gateway 8.0 - Content Compliance Policy
    This module describes how to set up content compliance scanning in Brightmail Gateway 8.0. You also learn to use content compliance policies for structured data matching.
  • Brightmail Gateway 8.0 - Managing User and Host Configuration
    This module describes how to manage user and host configuration through Brightmail Gateway 8.0 Control Center.
  • Brightmail Gateway 8.0 - Managing Control Center Settings
    This module describes how to manage Brightmail Gateway 8.0 settings through Brightmail Gateway 8.0 Control Center.
  • Brightmail Gateway 8.0 - Using LDAP for Brightmail Gateway 8.0
    This module covers different LDAP services supported by Brightmail Gateway 8.0. You learn how to create and manage LDAP-based group policies.
  • Brightmail Gateway 8.0 - Managing Instant Messaging Filtering
    This module provides an introduction to IM filtering in Brightmail Gateway 8.0. You learn to create IM virus and IM spam policies.
Cluster Server
Cluster Server Special Topics
  • IA Infobits: Extended Distance Clusters (1 of 7)
    This video describes what an extended distance cluster is and how it works. It describes the necessary components for setting up an extended distance cluster and also what other names may be used to describe this type of cluster.
  • IA InfoBits: Global Clusters (2 of 7)
    This video describes what a global cluster is and how it works. It describes the necessary components for setting up a global cluster.
  • IA InfoBits: VCS Failover Policies (3 of 7)
    This video describes 4 different failover policies that are available in VCS.
  • IA InfoBits: System Zones vs. Sites (4 of 7)
    This video describes the differences between System Zones and Sites in VCS. It describes when they are used and what the advantages are for each.
  • IA InfoBits: Replicated Data Clusters (5 of 7)
    This video describes what the components of a replicated data cluster are and how a replicated data cluster works.
  • IA InfoBits: What’s New in Storage Foundation 6.2 (6 of 7)
    This video describes some of the most important new features in Storage Foundation 6.2 such as new operating system support for Smart IO and Flexible Storage Sharing.
  • IA InfoBits: What’s New in VCS 6.2 (7 of 7)
    This video describes some of the most important new features in VCS 6.2 such as Majority Fencing and Application HA support for SAP HANA.
  • High Availability Architecture
    This video describes different high availability and disaster recovery architectures.
  • VCS Service Group Objects
    This video describes the service group objects that VCS uses to protect an application and how they work with each other.
  • High Availability Failover Configurations
    This video describes the 4 different types of customer HA failover configurations.
  • IO Fencing Basics
    This video describes what IO fencing is and how VCS uses it.
  • Intelligent Monitoring Framework
    This video describes the Intelligent Monitoring Framework (IMF) that VCS uses to detect a fault.
  • Preferred Fencing
    This video describes what preferred fencing is and how VCS uses it to determine where an application should be running in the event of a failure.
  • Virtual Business Services (VBS) Basics
    This video describes what Virtual Business Services are and how they work.
  • Symantec Cluster (VCS) Components
    This video describes the 4 different components that are needed to create a cluster.
  • Symantec Cluster (VCS) Managing VMDK
    This video describes how VCS manages VMware VMDKs in a virtual clustered environment.
  • VCS Service Group Objects: A Closer Look
    This video uses demonstrations with the VCS Simulator and Linux virtual machines running VCS to expand on the information provided in the IA Infobits “VCS Service Group Objects” whiteboard video. Details of service group resources, their attributes and the agents that control them are provided.
  • Storage Foundation Product Family
    This video describes the different products that are part of the Storage Foundation product bundles. These include Storage Foundation, Storage Foundation HA, Storage Foundation Cluster File System and Storage Foundation for Oracle RAC.
  • Volume Management: Hardware vs. Software
    This video describes the differences between physical and logical volume management of storage. The advantages of a volume manager are explained.
  • Data Compression Basics
    This video describes how data compression works in Storage Foundation.
  • Symantec Replicator Option
    This video describes the 2 different products that are part of Symantec Replicator Option. Described are Veritas Volume Replicator (VVR) and Veritas File Replicator (VFR).
  • File Snapshots
    This video describes how file snapshots work in Storage Foundation.
  • Physical vs. Logical Point in Time
    This video describes the differences between physical and logical point in time copies. The advantages and disadvantages of each are explained.
  • Traditional Snapshot
    This video describes how a traditional physical snapshot works in Storage Foundation. It also describes what can be done with the snapshot once it is created.
  • Full Instant Logical Snapshot
    This video describes how a Full Instant logical snapshot works in Storage Foundation. It also describes what can be done with the snapshot once it is created.
  • Third Mirror Breakoff
    This video describes how a Third Mirror Breakoff physical snapshot works in Storage Foundation. It also describes what can be done with the snapshot once it is created.
  • Linked Breakoff
    This video describes how a Linked Breakoff snapshot works in Storage Foundation. It also describes what can be done with the snapshot once it is created.
  • VCS Custom Agents
    This video describes what a VCS custom agent is. It also describes how a customer can build one and possible actions that a customer can have in the agent.
  • VCS Application Agent
    This video describes what a VCS application agent is. It also describes the difference between an application agent and a custom agent.
  • Load-based Failover
    This video describes how load-based failover works in VCS. It is also known as Adaptive HA.
  • VCS Limits and Prerequisites
    This video describes how limits and prerequisites work in VCS.
  • High Availability for Virtual Machines
    This video describes how VCS is used to achieve high availability in virtual environments. It describes Implementing VCS to protect both physical and virtual machines.
  • VCS Triggers
    This video describes what VCS triggers are and how they are used.
  • SmartIO
    This video describes the SmartIO feature of Storage Foundation.
  • Flexible Storage Sharing
    This video describes the Flexible Storage Sharing (FSS) feature of the Storage Foundation Cluster File System.
  • Volume Layouts
    This video describes the different volume layouts that can be used in Storage Foundation. It describes Concat, Striped, Mirrored, Layered and RAID 5 layouts.
  • CDS: Cross-Platform Data Sharing
    This video describes the Cross Platform Data Sharing feature of Storage Foundation. It explains the advantages of CDS and 2 typical use cases.
  • DMP Basics
    This video describes the basics of Dynamic Multi-Pathing (DMP). It explains device discovery and IO path management.
  • Site Awareness
    This describes site awareness as a part of Storage Foundation. It describes how it is used with VCS and stretch clusters.
  • VVR Basics
    This video describes what Veritas Volume Replicator (VVR) is and how the product works.
  • VVR Objects
    This video describes the different data objects that are part of Veritas Volume Replicator (VVR), what their purpose is, and how they work together.
  • Storage Foundation Objects
    This video describes the different data objects that are part of Storage Foundation, what their purpose is, and how they work together.
  • Enclosure Based Naming
    This video describes what Enclosure Based Names (EBN) are and how they are used.
  • VCS Failover Configurations
    This video describes the 5 different types of customer failover configurations.
  • Cluster Communications Networks
    This video describes the types of communications networks that are needed for a high availability cluster.
Cluster Server 6
Cluster Server 6.0 In-Guest Clustering
  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Introduction (1 of 8)
    This module describes prerequisites for completing this courseware and provides an overview of the course topics.
  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: VMware vSphere High Availability Architecture (2 of 8)
    This topic describes the architecture of the VMware vSphere datacenter environment.
  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Symantec High Availability Architecture in VMware (3 of 8)
    This topic describes the Symantec architecture for supporting high availability in VMware environments.
  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Deploying Symantec HA in VMware (4 of 8)
    In this topic, you learn to install the Symantec HA Console and deploy Veritas Cluster Server in virtual machines.
  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Configuring Availability Using the HA Console (5 of 8)
    This topic describes how to use configuration wizards in the HA Console to configure high availability for common applications.
  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Symantec High Availability Operations (6 of 8)
    In this topic, you learn how to use the HA Console to monitor applications and perform cluster operations.
  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Configuring Other VCS Agents (7 of 8)
    This topic describes how to configure other agents for managing applications on virtual machines.
  • In-Guest Clustering in a VMware Environment Using Veritas Cluster Server 6.0.x: Other Symantec High Availability Solutions (8 of 8)
    In this module, you learn about other high availability solutions from Symantec that are supported in VMware environments.
Cluster Server 6.0 Virtual Business Service
  • Virtual Business Service
    This module discusses how to use the new Virtual Business Services feature, which is based on both Veritas Cluster Server 6.0 and Veritas Operations Manager 4.1, to manage multi-tier applications in a heterogeneous environment. In this module, you learn how to install and configure all the components needed for the VBS feature and how to use the new dependency types to configure the fault policy and behavior desired for the multi-tier application. You also learn how to configure a DR VBS pair, how to switch the production VBS to the DR site when necessary, and how to use the audit trails and logs available to you to support the VBS environment.
Cluster Server 6.0 for Windows Install and Configure
  • VCS 6.0 Win: Install and Config: High Availability and Clustering Concepts (1 of 14)
    In this module, you learn fundamental concepts of high availability environments, focusing on clustering technologies.
  • VCS 6.0 Win: Install and Config: VCS Building Blocks (2 of 14)
    In this module, you learn Veritas Cluster Server terminology to enable you to understand the basic components of a cluster. The relationship between these building blocks shows how the VCS architecture implements high availability.
  • VCS 6.0 Win: Install and Config: Preparing a Site for VCS (3 of 14)
    In this module, you learn how to prepare to install VCS and configure the cluster environment. The module discusses software and hardware requirements and recommendations and the licensing scheme.
  • VCS 6.0 Win: Install and Config: Installing and Upgrading VCS (4 of 14)
    In this module, you learn how to install and configure VCS using the product installer. By viewing key configuration file examples, you see how your selections are used by the product installer to create the VCS implementation. The module also discusses the various upgrade paths and rolling upgrade.
  • VCS 6.0 Win: Install and Config: VCS Operations (5 of 14)
    In this module, you learn how to use VCS tools to perform common operations on service group resources. This module also describes how you can use the VCS Simulator to learn how to manage clusters.
  • VCS 6.0 Win: Install and Config: VCS Configuration Methods (6 of 14)
    In this module, you learn how to start and stop VCS. The module also provides an overview of different types of configuration methods and controlling access to VCS administration functions.
  • VCS 6.0 Win: Install and Config: Preparing Services for VCS (7 of 14)
    In this module, you learn how to prepare the hardware and software resources to be placed under VCS control. You also learn how to test the application service and stop and migrate an application service.
  • VCS 6.0 Win: Install and Config: Online Configuration (8 of 14)
    In this module, you learn how to configure service groups and resources in a running VCS cluster. Examples of several resources are shown using graphical, and command-line interfaces. You also learn how to solve common configuration errors and testing the service group.
  • VCS 6.0 Win: Install and Config: Offline Configuration (9 of 14)
    In this module, you learn how to configure service groups and resources by editing the cluster configuration file and restarting cluster services. You also learn how to solve common configuration errors and testing the service group.
  • VCS 6.0 Win: Install and Config: Configuring Notification (10 of 14)
    In this module, you learn how to configure a highly available notification service to ensure that the appropriate personnel are notified when certain events occur in the cluster.
  • VCS 6.0 Win: Install and Config: Handling Resource Faults (11 of 14)
    In this module, you learn about Intelligent Resource Monitoring (IMF). In addition, you also learn how VCS responds to faulted resources. You also learn how to customize fault behavior by adjusting attributes that control VCS behavior.
  • VCS 6.0 Win: Install and Config: Cluster Communications (12 of 14)
    In this module, you learn about the components that enable cluster nodes to communicate over the network interconnect. Cluster membership formation is described as a key protection mechanism during startup and failover events.
  • VCS 6.0 Win: Install and Config: System and Communication Faults (13 of 14)
    In this module, you learn about system failures and cluster interconnect failures.
  • VCS 6.0 Win: Install and Config: Monitoring and Troubleshooting (14 of 14)
    In this module you learn about monitoring VCS, troubleshooting VCS, and archiving VCS related file.
Cluster Server 6.0 for Windows Manage and Administer
  • VCS 6.0 Win: Manage and Admin Example: Clustering Applications (1 of 8)
    In this module, you learn about the application service, VCS agents for managing applications, GenericService agent, and serviceMonitor agent.
  • VCS 6.0 Win: Manage and Admin Example: Clustering File Shares (2 of 8)
    In this module, you learn how to prepare file shares for high availability. In addition, you learn about the VCS resources for managing file shares and configuring file shares.
  • VCS 6.0 Win: Manage and Admin Example: Clustering Exchange Server (3 of 8)
    In this module, you learn about the VCS Database Agent for Exchange Server 2010 and supported Exchange Server configurations for high availability. In addition, you learn to install Exchange Server in a VCS environment and configure an Exchange Service Group.
  • VCS 6.0 Win: Manage and Admin Example: Clustering SQL Server (4 of 8)
    In this module, you learn about the SQL server in the VCS Environment, VCS Agents for SQL Server 2008, managing registry keys, installing SQL Server in the cluster, configuring a SQL Server Service Group, and monitoring databases.
  • VCS 6.0 Win: Manage and Admin Example: Clustering SharePoint Server (Optional) (5 of 8)
    In this module you learn how to install SharePoint Server 2010 in a SFW HA 6.0 cluster environment and configure SharePoint Server service groups. You also learn how to verify the SharePoint cluster configuration.
  • VCS 6.0 Win: Manage and Admin Cluster Management Lesson 1: Service Group Dependencies (6 of 8)
    In this module, you learn how to enforce application relationships using service group dependencies. You also learn about methods for controlling service group behavior.
  • VCS 6.0 Win: Manage and Admin Cluster Management Lesson 2: Startup and Failover Policies (7 of 8)
    In this module, you learn how to use policies to control how VCS starts up and fails over service groups. You also learn how to use the Simulator to model behavior, ensuring that your configuration is correct before implementing policies in a real-world environment.
  • VCS 6.0 Win: Manage and Admin Cluster Management Lesson 3: Managing Data Centers (8 of 8)
    In this module, you learn about the Veritas Operations Manager. You also learn to install and use Veritas Operations Manager.
Cluster Server 6.0 for Unix Install and Configure
  • VCS 6.0 for UNIX: Install & Config: Course Introduction (1 of 16)
    This module provides an overview of the courseware.
  • VCS 6.0 for UNIX: Install & Config: Lesson 1 – High Availability Concepts (2 of 16)
    In this module, you learn fundamental concepts of high availability environments, focusing on clustering technologies.
  • VCS 6.0 for UNIX: Install & Config: Lesson 2 – VCS Building Blocks (3 of 16)
    In this module, you learn Veritas Cluster Server terminology to enable you to understand the basic components of a cluster. The relationship between these building blocks shows how the VCS architecture implements high availability.
  • VCS 6.0 for UNIX: Install & Config: Lesson 3 – Preparing a Site for VCS Implementation (4 of 16)
    In this module, you learn how to prepare to install VCS and configure the cluster environment. Software and hardware requirements and recommendations are discussed, as well as tools for analyzing environments.
  • VCS 6.0 for UNIX: Install & Config: Lesson 4 – Installing VCS (5 of 16)
    In this module, you learn how to install and configure VCS using the Common Product Installer. By viewing key configuration file examples, you see how your selections are used by the CPI to create the VCS implementation.
  • VCS 6.0 for UNIX: Install & Config: Lesson 5 – VCS Operations (6 of 16)
    In this module, you learn how to use VCS tools to perform common operations on service group resources. This module also describes how you can use the VCS Simulator to learn how to manage clusters.
  • VCS 6.0 for UNIX: Install & Config: Lesson 6 – VCS Configuration Methods (7 of 16)
    In this module, you learn how to start and stop VCS. You also see an overview of different types of configuration methods, and you learn how to control access to VCS administration functions.
  • VCS 6.0 for UNIX: Install & Config: Lesson 7 – Preparing Services for High Availability (8 of 16)
    In this module, you learn how to prepare the hardware and software resources to be placed under VCS control. Following the recommended practice ensures that you can perform an effective and efficient VCS configuration.
  • VCS 6.0 for UNIX: Install & Config: Lesson 8 – Online Configuration (9 of 16)
    In this module, you learn how to configure service groups and resources in a running VCS cluster. Examples of several resources are shown using the Java graphical user interface and the command-line interface.
  • VCS 6.0 for UNIX: Install & Config: Lesson 9 – Offline Configuration (10 of 16)
    In this module, you learn how to configure service groups and resources by editing the cluster configuration file and restarting cluster services.
  • VCS 6.0 for UNIX: Install & Config: Lesson 10 – Configuring Notification (11 of 16)
    In this module, you learn how to configure a highly available notification service to ensure that the appropriate personnel are notified when certain events occur in the cluster.
  • VCS 6.0 for UNIX: Install & Config: Lesson 11 – Handling Resource Faults (12 of 16)
    In this module, you learn how VCS responds to faulted resources. You also learn how to customize fault behavior by adjusting attributes that control VCS behavior.
  • VCS 6.0 for UNIX: Install & Config: Lesson 12 – Intelligent Monitoring Framework (13 of 16)
    In this module, you learn about how the Asynchronous Monitoring Framework is used to perform intelligent monitoring of select resources.
  • VCS 6.0 for UNIX: Install & Config: Lesson 13 – Cluster Communications (14 of 16)
    In this module, you learn about the components that enable cluster nodes to communicate over the network interconnect. You also learn about cluster membership and how VCS responds to system and communication faults in cluster environments that do not implement fencing.
  • VCS 6.0 for UNIX: Install & Config: Lesson 14 – Data Protection Using SCSI 3-Based Fencing (15 of 16)
    In this module, you learn how the I/O fencing implementation in VCS protects data on shared storage. I/O fencing is the Symantec-recommended method for data protection.
  • VCS 6.0 for UNIX: Install & Config: Lesson 15 – Coordination Point Server (16 of 16)
    In this module, you learn how to implement data protecting using server-based coordination points.
Cluster Server 6.0 for Unix Manage and Administer
  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt – Course Introduction (1 of 6)
    This module provides an overview of the courseware.
  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 1 – Service Group Dependencies (2 of 6)
    In this module, you learn how to enforce application relationships using service group dependencies. You also learn alternative methods for controlling service group behavior in situations where service group dependencies are not applicable.
  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 2 – Reconfiguring Cluster Memberships (3 of 6)
    In this module, you learn how to add nodes to existing clusters. You also learn how to merge running clusters. This module reinforces all concepts and practices presented in other VCS modules.
  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 3 – Startup and Failover Policies (4 of 6)
    In this module, you learn how to use policies to control how VCS starts up and fails over service groups. You also learn how to use the Simulator to model behavior, ensuring that your configuration is correct before implementing policies in a real-world environment.
  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 4 – Alternate Network Configurations (5 of 6)
    In this module, you learn how to configure redundant network interfaces for improved high availability of network services. You also learn about alternative network configurations using parallel service groups, as well as Proxy and Phantom resources.
  • VCS 6.0 for UNIX: Manage & Admin – Cluster Mgmt: Lesson 5 – High Availability in the Enterprise (6 of 6)
    In this module, you learn about additional administrative tools for managing enterprise cluster environments. You also learn about high availability and disaster recovery for virtual environments.
  • VCS 6.0 for UNIX: Manage & Admin – Example App Config – Course Introduction (1 of 4)
    This module provides an overview of the courseware.
  • VCS 6.0 for UNIX: Manage & Admin – Example App Config: Lesson 1 – Clustering Applications (2 of 4)
    In this module, you learn how agents are used to make applications highly available. You learn how to configure the Application agent supplied with VCS, and other agents available for specific applications.
  • VCS 6.0 for UNIX: Manage & Admin – Example App Config: Lesson 2 – Clustering Databases (3 of 4)
    In this module, you learn how agents are used to make databases highly available. You learn how to configure the Oracle agent supplied with VCS, and other agents available for specific databases.
  • VCS 6.0 for UNIX: Manage & Admin - Example App Config: Lesson 3 - Clustering NFS Shares (4 of 4)
    In this example lesson you learn about clustering NFS shares, and are introduced to the VCS share and NFS resource types, including preparing NFS for high availability.
Cluster Server 5
Cluster Server 5.1 Special Topics
  • I/O Fencing Enhancements in VCS 5.1
    This module describes enhancements to the I/O fencing method of data protection in a Veritas cluster environment. The new configuration utilities and fencing modes supported in VCS 5.1 are described, as well as the new coordination point server (CPS) implementation.
  • High Availability Design
    This module describes design principles for local high availability applications and wide-area disaster recovery solutions using Veritas clustering and replication products from Symantec.
Cluster Server 5.1 for Windows
  • VCS 5.1 for Windows - High Availability Concepts
    In this module, you learn about the merits of high availability in the data center environment and how clustering is used to implement high availability. You also learn how applications are managed in a high availability environment and about the key requirements in a clustering environment.
  • VCS 5.1 for Windows - VCS Building Blocks
    In this module, you learn about Veritas Cluster Server terminology and Veritas Cluster Server communication mechanisms. You also learn about the Veritas Cluster Server architecture.
  • VCS 5.1 for Windows - Preparing a Site for VCS
    In this module, you learn about VCS hardware and software requirements. You also learn how to gather cluster design information to prepare for the VCS installation.
  • VCS 5.1 for Windows - Installing VCS
    In this module, you learn how to install SFW HA by using the Symantec product installer and display the configuration files created during installation. You also learn how to view the VCS configuration created during installation and install the Cluster Manager Java Console.
  • VCS 5.1 for Windows - VCS Operations
    In this module, you learn how to perform common cluster administrative operations, manage applications under the control of VCS service groups, and manage resources within VCS service groups. You also learn to use the VCS simulator.
  • VCS 5.1 for Windows - VCS Configuration Methods
    In this module, you learn how to start and stop VCS. You also learn about the different types of configuration methods, as well as how to control access to VCS administration functions.
  • VCS 5.1 for Windows - Preparing Services for VCS
    In this module, you learn how to prepare applications for the VCS environment, perform one-time configuration tasks, and test applications before placing them under VCS control. You also learn how to stop resources and manually migrate an application.
  • VCS 5.1 for Windows - Online Configuration
    In this module, you learn how to configure service groups and add resources using the online configuration tools. You also learn how to resolve common configuration errors, and test the service group to ensure that it is correctly configured.
  • VCS 5.1 for Windows - Offline Configuration
    In this module, you learn how to perform offline configuration procedures and resolve common errors made during offline configurations. You also learn how to test the service group to ensure that it is correctly configured.
  • VCS 5.1 for Windows - Configuring Notification
    In this module, you learn how to configure a highly available notification service to ensure that the appropriate personnel are notified when certain events occur in the cluster. You also learn how to use triggers for notifications
  • VCS 5.1 for Windows - Handling Resource Faults
    In this module, you learn how VCS responds to resource faults, and the procedure to recover from resource faults. You also learn how to customize fault behavior by setting attributes that control VCS behavior, and configure fault notifications and triggers.
  • VCS 5.1 for Windows - Cluster Communications
    In this module, you learn about the components that enable cluster nodes to communicate over the network interconnect, and how VCS determines cluster membership. You also learn about cluster interconnect configuration and its functions.
  • VCS 5.1 for Windows - System and Communication Faults
    In this module, you learn about how VCS responds to system and cluster interconnect failures.
  • VCS 5.1 for Windows - Troubleshooting
    In this module, you learn how to monitor VCS operations and apply troubleshooting techniques in a VCS environment. You also learn how to create an archive of VCS related files.
  • VCS 5.1 for Windows - Clustering Applications
    In this module, you learn about how application services work in a highly available environment, and how agents manage applications in a VCS cluster. You also learn about the VCS bundled GenericService and ServiceMonitor agents.
  • VCS 5.1 for Windows - Clustering SQL Server
    In this module, you learn about the guidelines and procedures for installing Microsoft SQL Server in a Veritas cluster environment. You also learn about the installation and configuration of the VCS database agent for SQL Server 2005.
  • VCS 5.1 for Windows - Clustering Exchange Server
    In this module, you learn about the guidelines and procedures for installing Microsoft Exchange server in a Veritas cluster environment. You also learn about installation and configuration of the VCS application agent for Exchange server.
  • VCS 5.1 for Windows - Clustering File Shares
    In this module, you learn about the recommended practice to prepare resources and manually test file share services before configuring a File Share service group. You also learn about the VCS resources for managing file shares and the FileShare configuration wizard.
  • VCS 5.1 for Windows - Reconfiguring Cluster Membership
    In this module, you learn how to remove and add nodes to existing clusters. You also learn how to merge two running clusters.
  • VCS 5.1 for Windows - Service Group Dependencies
    In this module, you learn about common example application relationships, service group dependencies and their example uses. You also learn how to configure service group dependencies and alternative methods for controlling service group interactions.
  • VCS 5.1 for Windows - Startup and Failover Policies
    In this module, you learn about the rules and policies for service group startup and failover. You also learn to use limits and prerequisites to control service group startup and failover, and use the simulator to model startup and failover policies.
  • VCS 5.1 for Windows - Data Center Availability
    In this module, you learn how to manage multiple clusters on different platforms and how to manage enterprise storage. You also learn how to improve disaster recovery and Enterprise message management.
Cluster Server 5.0 MP3 for Solaris
  • VCS 5.0 MP3 for Solaris: Install & Config--Course Introduction (1 of 16)
    This module describes the overall course organization and resources.
  • VCS 5.0 MP3 for Solaris: Install & Config: High Availability Concepts (2 of 16)
    In this module, you learn fundamental concepts of high availability environments, focusing on clustering technologies.
  • VCS 5.0 MP3 for Solaris: Install & Config: VCS Building Blocks (3 of 16)
    In this module, you learn Veritas Cluster Server terminology to enable you to understand the basic components of a cluster. The relationship between these building blocks shows how the VCS architecture implements high availability.
  • VCS 5.0 MP3 for Solaris: Install & Config: Preparing a Site for VCS (4 of 16)
    In this module, you learn how to prepare to install VCS and configure the cluster environment. Software and hardware requirements and recommendations are discussed, as well as tools for analyzing environments.
  • VCS 5.0 MP3 for Solaris: Install & Config: Installing VCS (5 of 16)
    In this module, you learn how to install and configure VCS using the Common Product Installer. By viewing key configuration file examples, you see how your selections are used by the CPI to create the VCS implementation.
  • VCS 5.0 MP3 for Solaris: Install & Config: VCS Operations (6 of 16)
    In this module, you learn how to use VCS tools to perform common operations on service group resources. This module also describes how you can use the VCS Simulator to learn how to manage clusters.
  • VCS 5.0 MP3 for Solaris: Install & Config: VCS Configuration Methods (7 of 16)
    In this module, you learn how to start and stop VCS. You also see an overview of different types of configuration methods, as well as how to control access to VCS administration functions.
  • VCS 5.0 MP3 for Solaris: Install & Config: Preparing Resources for VCS (8 of 16)
    In this module, you learn how to prepare the hardware and software resources to be placed under VCS control. Following the recommended practice ensures that you can perform an effective and efficient VCS configuration.
  • VCS 5.0 MP3 for Solaris: Install & Config: Online Configuration (9 of 16)
    In this module, you learn how to configure service groups and resources in a running VCS cluster. Examples of several resources are shown using the Java graphical user interface and the command-line interface.
  • VCS 5.0 MP3 for Solaris: Install & Config: Offline Configuration (10 of 16)
    In this module, you learn how to configure service groups and resources by editing the cluster configuration file and restarting cluster services.
  • VCS 5.0 MP3 for Solaris: Install & Config: Configuring Notification (11 of 16)
    In this module, you learn how to configure a highly available notification service to ensure that the appropriate personnel are notified when certain events occur in the cluster.
  • VCS 5.0 MP3 for Solaris: Install & Config: Handling Resource Faults (12 of 16)
    In this module, you learn how VCS responds to faulted resources. You also learn how to customize fault behavior by adjusting attributes that control VCS behavior.
  • VCS 5.0 MP3 for Solaris: Install & Config: Cluster Communications (13 of 16)
    In this module, you learn about the components that enable cluster nodes to communicate over the network interconnect. Cluster membership formation is described as a key protection mechanism during startup and failover events.
  • VCS 5.0 MP3 for Solaris: Install & Config: System and Communication Failures (14 of 16)
    In this module, you learn how VCS responds to system and communication faults in cluster environments that do not implement fencing.
  • VCS 5.0 MP3 for Solaris: Install & Config: I/O Fencing (15 of 16)
    In this module, you learn how the I/O fencing implementation in VCS protects data on shared storage. I/O fencing is the recommended method for data protection.
  • VCS 5.0 MP3 for Solaris: Install & Config: Troubleshooting (16 of 16)
    In this module, you learn how to monitor VCS and determine causes of problems. You also learn which VCS files must be included in standard system backups, and how to create a snapshot of the VCS software environment.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Introduction (1 of 10)
    This module describes the organization of the VCS Cluster Management course.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Reconfiguring Cluster Membership (2 of 10)
    In this module, you learn how to remove and add nodes to existing clusters. You also learn how to merge running clusters. This workshop module reinforces all concepts and practices presented in other VCS modules.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Service Group Dependencies (3 of 10)
    In this module, you learn how to enforce application relationships using service group dependencies. You also learn alternative methods for controlling service group behavior in situations where service group dependencies are not applicable.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Startup and Failover Policies (4 of 10)
    In this module, you learn how to use policies to control how VCS starts up and fails over service groups. You also learn how to use the Simulator to model behavior, ensuring that your configuration is correct before implementing policies in a real-world environment.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Multiple Network Interfaces (5 of 10)
    In this module, you learn how to configure redundant network interfaces for improved high availability of network services. You also learn about alternative network configurations using parallel service groups, as well as Proxy and Phantom resources.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Cluster Mgmt-Data Center Availability (6 of 10)
    In this module, you learn about additional administrative tools for managing enterprise cluster environments.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Example App Configurations-Introduction (7 of 10)
    This module describes the organization of the VCS Example Application Configurations course.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Example App Configurations-Ex 1: Cluster Apps (8 of 10)
    In this module, you learn how agents are used to make applications highly available. You learn how to configure the Application agent supplied with VCS, and other agents available for specific applications.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Example App Configurations-Ex 2: Clustering Databases (9 of 10)
    In this module, you learn how agents are used to make databases highly available. You learn how to configure the Oracle agent supplied with VCS, and other agents available for specific databases.
  • VCS 5.0 MP3 for Solaris: Manage & Admin-Example App Configurations-Ex 3: Clustering NFS Shares (10 of 10)
    In this module, you learn how to configure the NFS and Share agents to manage NFS shared file systems. You also learn how to configure the NFSRestart agent for lock reclamation after a failover.
CommandCentral Storage
CommandCentral Storage 5
CommandCentral Storage 5.2
  • CC Storage 5.2: Troubleshooting Basics (1 of 4)
    In this module, you learn how to view CommandCentral Storage diagnostic information and gather and interpret CommandCentral Storage logs. You also learn about the generic CommandCentral Storage troubleshooting methodology. Finally, you learn about CommandCentral Storage limitations and features that are no longer supported.
  • CC Storage 5.2: Troubleshooting Installation Issues (2 of 4)
    In this module, you learn to describe the CommandCentral Storage installation footprints. You also learn to troubleshoot CommandCentral Storage installation issues. Finally, you learn to interpret CommandCentral Storage installation logs.
  • CC Storage 5.2: Troubleshooting Discovery Issues (3 of 4)
    In this module, you learn how to troubleshoot CommandCentral Storage host discovery issues. You also learn about using HAL commands to troubleshoot hosts and explorer discovery issues. Finally, you learn about the Unified Agent basics and the steps to isolate Unified Agent issues.
  • CC Storage 5.2: Troubleshooting Reports, User Management, and Monitoring Issues (4 of 4)
    In this module, you learn about the common issues encountered when working with CommandCentral Storage reports. You also learn about troubleshooting user management issues and monitoring issues. Finally, you learn how to troubleshoot issues related to CommandCentral Storage new features and enhancements.
  • CC Storage 5.2 - Storage Resource Management Fundamentals
    In this module, you learn about storage resource management and challenges to storage resource management. You also learn that organizations spend large portions of their IT budgets to equip and manage storage facilities. In addition, you learn that implementing a phased approach is necessary to move your storage enterprise toward the goals established by the framework you choose.
  • CC Storage 5.2 - Introduction to CommandCentral
    In this module, you learn how CommandCentral conforms to the phased management approach to storage resource management. You also learn about each major component of CCS 5.2 and its features and functionality.
  • CC Storage 5.2 - Installing and Upgrading the Management Server
    In this module, you learn about the prerequisites and dependencies for installing the CommandCentral Storage server components. You also learn how to install, upgrade, and configure the CommandCentral Storage Management Server, Storage Change Manager, and the Agent Push Install Utility. Finally, you learn about the new licensing scheme for CommandCentral Storage 5.2.
  • CC Storage 5.2 - Working with the CommandCentral Interface
    In this module, you learn how to navigate through the GUI to access CCS functionality. You also learn about the console displays and where to find the information you need.
  • CC Storage 5.2 - Installing CommandCentral Agents
    In this module, you learn how to install, configure, and upgrade Standard Agents. You also learn how to install and configure Unified Agents and Control Hosts. In addition, you learn how to use both the GUI installer on Windows and the command-line interface on UNIX and Linux.
  • CC Storage 5.2 - Discovering Hosts Using CommandCentral Storage 5.2
    In this module, you learn about Command Central Storage’s host discovery mechanisms, which include agentless and agent-based mechanisms. You also learn about the types of agentless and agent-based discovery methods.
  • CC Storage 5.2 - Creating and Managing Policies
    In this module, you learn about the elements of a policy and how policies function in CommandCentral. You also learn how to administer policies in CommandCentral Storage. Finally, you learn about the functionality that policies provide in Storage Change Manager.
  • CC Storage 5.2 - Monitoring Storage Environments Using CCS 5.2
    In this module, you learn how CommandCentral monitors the storage enterprise and the items that it monitors. You also learn how CCS gathers data.
  • CC Storage 5.2 - Generating Reports Using CCS 5.2
    In this module, you learn to manage predefined reports. You also learn to create and manage custom and ad hoc reports. Finally, you learn about the CommandCentral Storage 5.2 enhancements to support enhanced reporting.
  • CC Storage 5.2 - Managing Users and Security Mechanisms
    In this module, you learn about Authentication and Authorization services and database security. You also learn how to add and modify users and roles within CommandCentral, and create Credential Groups.
  • CC Storage 5.2 - Managing Server Components
    In this module, you learn about server components. You also learn to manage and diagnose devices and explorers. Finally, you learn to back up and restore databases and configuration.
  • CC Storage 5.2 - Working with the Enterprise Reporter
    In this module, you learn about Enterprise Reporter functionality and security. You also learn about Enterprise Reporter architecture, components, installation, and how to configure a data rollup. Finally, you learn about reports and dashboards.
  • CC Storage 5.2 - Miscellaneous Enhancements
    In this module, you learn about the CommandCentral Storage 5.2 support for Solaris Zones and Solaris ZFS file systems. You also learn about the information CommandCentral Storage gathers after it discovers ESX servers and virtual machines. Finally, you learn about the enhancements made to CommandCentral Storage 5.2 for IBM XIV Storage Systems, Netapp Deduplication, and Thin Provisioning.
  • CC Storage Enterprise Reporter 5.2 - Introduction
    In this module, you learn about storage resource management and challenges to storage resource management. You also learn about the CommandCentral family and how it conforms to the phased management approach. Finally, you learn about the main components in CommandCentral Enterprise Reporter 5.2.
  • CC Storage Enterprise Reporter 5.2 - Installing and Upgrading
    In this module, you learn about the prerequisites and dependencies for installing Enterprise Reporter. You also learn the procedure to configure the Oracle database instance used by Enterprise Reporter. Finally, you learn how to install and upgrade Enterprise Reporter 5.2.
  • CC Storage Enterprise Reporter 5.2 - Configuring and Managing
    In this module, you learn how to configure data rollup, business views, and storage tiers. You also learn how to manage user accounts and user groups in Enterprise Reporter.
  • CC Storage Enterprise Reporter 5.2 - Generating Reports
    In this module, you learn about the different types of reports that can be created using CommandCentral Enterprise Reporter. You also learn how to create a Sample Report and create and modify an Ad-Hoc Report. Finally, you learn how to create an Advanced Report using Report Studio and create and modify Business Views.
  • CC Storage Enterprise Reporter 5.2 - New Features and Enhancements
    In this module, you learn about the new features and enhancements made to Enterprise Reporter. You also learn about the various technologies and virtualization systems that Enterprise Reporter supports. Finally, you learn about reclamation reports and their use.
  • CC Storage Change Manager 5.2 - Introduction
    In this module, you learn about storage resource management and challenges to storage resource management. You also learn about the CommandCentral family and how it conforms to the phased management approach. Finally, you learn about the main components in CommandCentral Storage Change Manager 5.2.
  • CC Storage Change Manager 5.2 - Installing
    In this module, you learn about the prerequisites and dependencies for installing the Storage Change Manager. You also learn how to install the Storage Change Manager.
  • CC Storage Change Manager 5.2 - Working with the Interface
    In this module, you learn about the Storage Change Manager’s graphical user interface. You also learn how to navigate through the various panes in Storage Change Manager to view the necessary information.
  • CC Storage Change Manager 5.2 - Monitoring Changes
    In this module, you learn about the change monitoring process in Storage Change Manager and how to monitor storage resources using custom policies. You also learn how to manage custom policies violations and use best practice policies.
  • CC Storage Change Manager 5.2 - Working with Reports
    In this module, you learn about the default reports that are shipped along with Storage Change Manager. You also learn how to customize reports, export report data, and archive reports. Finally, you learn how to create Ad-Hoc Reports.
  • CC Storage 5.2 – Differences: What's New in Veritas CommandCentral Storage 5.2
    In this module, you learn about the new features and enhancements in CommandCentral Storage 5.2. You also learn about the CommandCentral Storage 5.2 deployment environment and its key components.
  • CC Storage 5.2 – Differences: Installing Veritas CommandCentral Storage 5.2
    In this module, you learn about the guidelines and the procedure to install CommandCentral Storage 5.2 and its components. You also learn about the upgrade paths and the procedure to upgrade to CommandCentral Storage 5.2.
  • CC Storage 5.2 – Differences: Agentless Host Discovery
    In this module, you learn about the agentless discovery process and its benefits and methods. You also learn how to perform an agentless discovery using the Management Server and using discovery scripts on the host. The module also discusses the impact of agentless hosts on CommandCentral Storage reports and the limitations of the agentless discovery process.
  • CC Storage 5.2 – Differences: Working with Control Hosts
    In this module, you learn about the methods that CommandCentral Storage offers to discover hosts and Control Host fundamentals. You also learn how to install and configure a Control Host.
  • CC Storage 5.2 – Differences: Discovering Solaris Zones
    In this module, you learn about Solaris Zones and CommandCentral Storage 5.2 support for the Solaris Zones. You also learn about the setup requirements for the Solaris Zones and known issues related to CommandCentral Storage reports for Solaris Zones.
  • CC Storage 5.2 – Differences: Discovering VMware Environments
    In this module, you learn about CommandCentral Storage support for VMware environments and the information that CommandCentral Storage gathers by performing an agentless or agent-based discovery of virtual machines. You also learn how to configure CommandCentral Storage to discover ESX servers.
  • CC Storage 5.2 – Differences: Discovering Solaris ZFS File Systems
    In this module, you learn about the ZFS file system and CommandCentral Storage 5.2 support for the ZFS files system. You also learn about the setup requirements for the ZFS file system.
  • CC Storage 5.2 – Differences: Miscellaneous New Features and Enhancements
    In this module, you learn how to discover Storage Foundation Hosts using the Unified Agent. The module also discusses the enhancements made to Thin Provisioning and reporting in CommandCentral Storage 5.2. You also learn about CommandCentral Storage support for IBM XIV Storage Systems and Netapp Deduplication.
Control Compliance Suite
Control Compliance Suite 11
Control Compliance Suite 11.0 Administration
  • CCS 11.0: Admin: Course Introduction (1 of 17)
    This module introduces the CCS 11.0 Admin course.
  • CCS 11.0: Admin: Introduction to CCS 11.0 (2 of 17)
    This module presents an overview of compliance and what is new in CCS 11.0.
  • CCS 11.0: Admin: Installing the CCS Suite (3 of 17)
    In this module, you learn how to install CCS 11.0.
  • CCS 11.0: Admin: Upgrading the CCS Suite (4 of 17)
    In this lesson, you learn how to upgrade to CCS 11.0.
  • CCS 11.0: Admin: Installing and Upgrading the CCS Managers and Agents (5 of 17)
    In this module, you learn how to install and upgrade CCS Managers and Agents.
  • CCS 11.0: Admin: Initial Configuration (6 of 17)
    In this module, you learn how to get started with CCS 11.0 and prepare for data collection.
  • CCS 11.0: Admin: Getting started with CCS 11.0 (7 of 17)
    In this module, you learn how to import assets, collect and evaluate data, and manage exceptions.
  • CCS 11.0: Admin: Standards Manager (8 of 17)
    In this module, you learn how to work with standards, assess compliance with standards, and manage exceptions.
  • CCS 11.0: Admin: Policy Manager (9 of 17)
    In this module, you learn how to create policies, describe the policy life cycle, and manage policy compliance.
  • CCS 11.0: Admin: Controls Studio (10 of 17)
    In this module, you learn how to use Controls Studio.
  • CCS 11.0: Admin: Response Assessment Module (11 of 17)
    In this module, you learn how to use the Response Assessment module and evaluate results.
  • CCS 11.0: Admin: SCAP (12 of 17)
    In this module, you learn SCAP capabilities and how to work with SCAP benchmarks.
  • CCS 11.0: Admin: Ad Hoc Queries (13 of 17)
    In this module, you learn how to perform query building and how to query your enterprise.
  • CCS 11.0: Admin: Reporting and Dashboards (14 of 17)
    In this module, you learn how to work with dynamic dashboards and manage reports.
  • CCS 11.0: Admin: Vulnerability Manager (15 of 17)
    In this module, you learn how to import data into CCS and view vulnerability assessment data.
  • CCS 11.0: Admin: Risk Manager (16 of 17)
    In this module, you learn how to use the Risk Management Module and perform remediation.
  • CCS 11.0: Admin: External Data Systems (17 of 17)
    In this module, you learn how to connect to external data sources, Symantec products. This module also introduces third-party connectors.
Control Compliance Suite 11.0 Vulnerability Manager
  • CCS 11.0: Vulnerability Manager- Introducing Vulnerability Manager (1 of 2)
    In this module, you learn what Vulnerability Manager is, how it can help you ensure the security of your enterprise by discovering assets and detecting, reporting, and managing vulnerabilities. You also learn how to install, configure, manage, and update Vulnerability Manager.
  • CCS 11.0: Vulnerability Manager- Working with Vulnerability Manager (2 of 2)
    In this module, you learn to configure sites and asset groups, perform discovery and vulnerability scans, manage reports, remediation ticketing, and exceptions within your networks.
Control Compliance Suite 10
Control Compliance Suite 10.5 Administration
  • CCS 10.5 Administration: Introduction
    The Symantec Control Compliance Suite (CCS) 10.5 Administration e-learning modules are designed for professionals who are tasked with supporting, architecting, implementing, and monitoring of the Control Compliance Suite 10.5 product. These self-paced e-learning modules cover installing and managing Control Compliance Suite 10.5 and its data collectors that interface with the Control Compliance Suite 10.5. These modules also include demonstrations that enable you to test your new skills and begin to transfer those skills into your working environment.
  • CCS 10.5 Administration: Introducing Compliance (1 of 16)
    This module describes compliance concepts and how challenges to compliance are managed using CCS 10.5. You also describe some of the core functions and view how CCS 10.5 is architected logically.
  • CCS 10.5 Administration: Symantec Data Collectors (2 of 16)
    This module introduces you to the Symantec data collectors that integrate with Symantec Control Compliance Suite 10.5. Data collectors include Symantec Risk Management System (RMS), Symantec Enterprise Security Manager (ESM), Symantec Response Assessment Manager (RAM), Symantec Data Loss Prevention (DLP) Connector, and Symantec Altiris Service Desk 7 Connector.
  • CCS 10.5 Administration: Installing and Configuring the Risk Management System (3 of 16)
    This module describes best practices for planning an RMS deployment that includes the RMS console and Information server with various bv-Control product snap-ins. The module also describes how to install the RMS console, Information server, and bv-Control products.
  • CCS 10.5 Administration: Configuring RMS Components (4 of 16)
    This module describes how to configure bv-Control products and use bv-config to help manage your Windows environment. bv-Control products include bv-Control for Windows, bv-Control for Microsoft Exchange, bv-Control for Microsoft SQL Server, and bv-Control for UNIX.
  • CCS 10.5 Administration: Using RMS (5 of 16)
    This module describes how to navigate the RMS console and use the features provided by the RMS console, such as running queries, performing baselines, and managing tasks.
  • CCS 10.5 Administration: RMS Queries (6 of 16)
    This module describes how to build and use queries. You also learn how to run and fine tune queries using advanced query features.
  • CCS 10.5 Administration: Using bv-Control (7 of 16)
    This module describes how to audit your environment using one or more bv-Control products.
  • CCS 10.5 Administration: Installing and Configuring Enterprise Security Manager (8 of 16)
    This module describes how to install and configure Enterprise Security Manager (ESM) and ESM agent for use with CCS 10.5. The module also describes how to create and execute batch files to semi-automate and streamline ESM processes.
  • CCS 10.5 Administration: Installing Control Compliance Suite 10.5 (9 of 16)
    This module describes general predeployment considerations and preinstallation requirements. You also learn how to install or upgrade to CCS 10.5 and describe how to perform a silent installation.
  • CCS 10.5 Administration: Configuring Control Compliance Suite (10 of 16)
    This module describes how to perform the initial Control Compliance Suite 10.5 configuration. Initial tasks include registering the DPS, creating asset folders, creating reconciliation rules, creating asset import jobs, creating collection, evaluation, and reporting jobs, and viewing reports.
  • CCS 10.5 Administration: Administering Control Compliance Suite (11 of 16)
    This module describes how to navigate and manage the CCS 10.5 console and the CCS 10.5 Web console. You also learn how to create tiered and dynamic dashboards. In addition, you learn how to create and customize reports.
  • CCS 10.5 Administration: Intefacing with Symantec Products (12 of 16)
    This module describes how to interface with the CSV and ODBC data collectors. The module also describes how to interface with Symantec Protection Center, Symantec Data Loss Prevention, and Symantec Altiris Service Desk.
  • CCS 10.5 Administration: Advanced Integration (13 of 16)
    This module describes the Integration Services Subsystem (ISS) and Integration Service APIs. The module also shows you how to use PowerShell cmdlets and perform advanced data management.
  • CCS 10.5 Administration: Managing Standards (14 of 16)
    This module describes how to create standards and checks, provides an overview of the Security Content Automation Protocol (SCAP), and describes SCAP features. The module also shows you how to configure and use FDCC.
  • CCS 10.5 Administration: Policies, Entitlements, and Procedural Compliance (15 of 16)
    This module describes how to manage policies, entitlements, and procedural compliance.
  • CCS 10.5 Administration: Vulnerability Manager (16 of 16)
    This module introduces Vulnerability Manager, shows you how to prepare for installation, and install and configure the product. The module also shows you how to use Vulnerability Manager to assess your network security.
Control Compliance Suite 10.0 Administration
  • CCS 10.0 Vulnerability Manager
    This module introduces Vulnerability Manager, shows you how to prepare for installation, and install and configure the product. The module also shows you how to use Vulnerability Manager to assess your network security.
  • CCS 10.0 - Introduction
    The Symantec Control Compliance Suite (CCS) 10.0 Administration e-learning modules are designed for professionals who are tasked with supporting, architecting, implementing, and monitoring of the Control Compliance Suite 10.0 product. These self-paced e-learning modules cover installing and managing Control Compliance Suite 10.0 and its data collectors that interface with the Control Compliance Suite 10.0. These modules also include demonstrations that enable you to test your new skills and begin to transfer those skills into your working environment.
  • CCS 10.0 - Introducing Compliance
    In this module, you learn about compliance concepts and how challenges to compliance are managed using CCS 10.0. You also describe some of the core functions and view how CCS 10.0 is architected logically.
  • CCS 10.0 - Symantec Data Collectors
    This module introduces you to the Symantec data collectors that integrate with Symantec Control Compliance Suite 10.0. Data collectors include Symantec Risk Management System (RMS), Symantec Enterprise Security Manager (ESM), Symantec Response Assessment Manager (RAM), Symantec Data Loss Prevention (DLP) Connector, and Symantec Altiris Service Desk 7 Connector.
  • CCS 10.0 - Installing and Configuring the Risk Management System
    This module describes best practices for planning an RMS deployment that includes the RMS console and Information server with various bv-Control product snap-ins. The module also describes how to install the RMS console, Information server, and bv-Control products.
  • CCS 10.0 - Configuring bv-Control Products
    In this module, you learn how to configure bv-Control products and use bv-config to help manage your Windows environment. bv-Control products include bv-Control for Windows, bv-Control for Microsoft Exchange, bv-Control for Microsoft SQL Server, and bv-Control for UNIX.
  • CCS 10.0 - Using RMS
    This module describes how to navigate the RMS console and use the features provided by the RMS console, such as running queries, performing baselines, and managing tasks.
  • CCS 10.0 - RMS Queries
    In this module, you learn how to build and use queries. You also learn how to run and fine tune queries using advanced query features.
  • CCS 10.0 - Using bv-Control
    This module describes how to audit your environment using one or more bv-Control products.
  • CCS 10.0 - Installing and Configuring ESM
    This module describes how to install and configure Enterprise Security Manager (ESM) and ESM agent for use with CCS 10.0. The module also describes how to create and execute batch files to semi-automate and streamline ESM processes.
  • CCS 10.0 - Installing CCS 10.0
    This module describes general predeployment considerations and preinstallation requirements. You also learn how to install or upgrade to CCS 10.0 and describe how to perform a silent installation.
  • CCS 10.0 - Configuring CCS 10.0
    This module describes how to perform the initial Control Compliance Suite 10.0 configuration. Initial tasks include registering the DPS, creating asset folders, creating reconciliation rules, creating asset import jobs, creating collection, evaluation, and reporting jobs, and viewing reports.
  • CCS 10.0 - Administering CCS 10.0
    In this module, you learn how to navigate and manage the CCS 10.0 console and the CCS 10.0 Web console. You also learn how to create tiered and dynamic dashboards. In addition, you learn how to create and customize reports.
  • CCS 10.0 - Advanced Administration
    This module shows you how to collect data from Symantec and third-party products and import the data into CCS 10.0. Data collectors include Symantec Data Loss Prevention (DLP) Connector, Symantec Altiris Service Desk 7 Connector, comma-separated values (CSV), and open database connectivity (ODBC).
  • CCS 10.0 - Managing Compliance with CCS 10.0
    This module shows you how to collect data from Symantec and third-party products and import the data into CCS 10.0. Data collectors include Symantec Data Loss Prevention (DLP) Connector, Symantec Altiris Service Desk 7 Connector, comma-separated values (CSV), and open database connectivity (ODBC).
  • Integrating Symantec Products with Control Compliance Suite 10.0
    This module describes how to integrate Control Compliance Suite 10.0 with Symantec Data Loss Prevention and the Altiris Service Desk Connector. The module also shows you how to acquire third-party data using the comma-separated values (CSV) and open database connectivity (ODBC) data collectors.
Critical System Protection
Critical System Protection 5
Critical System Protection 5.2
  • SCSP 5.2 Admin: Intro to CSP (1 of 10)
    In this module you will learn about security threats that organizations face against their critical infrastructure and the types of technologies used to protection them. You will also learn about the different components of CSP and how they are used to protect servers.
  • SCSP 5.2 Admin: Install & Deploy (2 of 10)
    In this module you will learn how to install CSP and the different deployment methods.
  • SCSP 5.2 Admin: Install & Deploy - Demo (3 of 10)
    This module provides a demonstration on how to install CSP and the different deployment methods.
  • SCSP 5.2 Admin: Prevention & Detection (4 of 10)
    In this module you will learn about the different prevention and detection policies. You will learn about the components of a policy how to create your own policies.
  • SCSP 5.2 Admin: Prevention - Demo A (5 of 10)
    This module is a demonstration on how prevention policies work. You will see the policy in action and learn how to tune the policies to work with your applications. You will also learn how to build a policy for Apache Webserver for Windows. The knowledge from this exercise can be used in developing policies for other applications.
  • SCSP 5.2 Admin: Detection - Demo B (6 of 10)
    This module is a demonstration on how detection policies work. You will see how to create your own detection policies to monitor files, logs, registry keys for changes. You will also learn about the out of the box Baseline policies.
  • SCSP 5.2 Admin: Manage & Troubleshoot (7 of 10)
    This module you will learn about configurations that are used to determine certain aspects of how agents communicate and send events that are generated by policy violations. You will also learn how to troubleshoot agent issues. You will also learn how to create users and roles, and how CSP uses Active Directory for pass through authentication.
  • SCSP 5.2 Admin: Manage, Troubleshoot & Asset Manage - Demo (8 of 10)
    In this module is a demonstration on how to create configurations, filters, configuration groups and asset groups. You will also learn about creating asset groups and how to assign and apply policies and systems to these groups.
  • SCSP 5.2 Admin: Asset Manage (9 of 10)
    In this module you will learn about creating asset groups, assigning systems and policies to these groups and how to manage assets.
  • SCSP 5.2 Admin: Policies for VMware VSphere (10 of 10)
    In this module you will learn about the Vsphere Prevention and Detection policies that ship with CSP. These polices can be used to lockdown the Vsphere environment and provide monitoring of the ESXi host.
Data Center Security
Data Center Security: Server & Server Advanced 6.x
  • Symantec Data Center Security: Server Advanced Cheat Sheet v2.0
    The SDCSSA Cheat sheet is a 2 page document that should be avaialble to partners and customer to quickly reference some of the most common definitions and features of the Symantec Data Center Security: Server Advanced product.
Data Insight
Data Insight 4.0
  • Data Insight (DI) 4.0: Administration: Data Insight Overview (1 of 8)
    This module offers an introduction to the Data Insight product.
  • DI 4.0: Admin: Installing DI (2 of 8)
    In this module you learn about installing and upgrading Data Insight.
  • DI 4.0: Admin: DI - Initial Configuration (3 of 8)
    This lesson looks at global settings, licensing, and overall general configuration of Data Insight for a production environment.
  • DI 4.0: Admin: Configuring resources for monitoring (4 of 8)
    In this module, you learn how to configure Data Insight to utilize resources such as Active Directory, Filers, SharePoint, and Web applications.
  • DI 4.0: Admin: Navigating the console (5 of 8)
    In this module, you learn how to navigate the Data Insight console to view files, folders, and groups. You also learn about managing Custodians and generating reports.
  • DI 4.0: Admin: Using DI for risk, compliance, and data management (6 of 8)
    In this module, you are introduced to scenarios which demonstrate how Data Insight can be used for risk and compliance as well as data management.
  • DI 4.0: Admin: Integrating DI with other products (7 of 8)
    In this module, you learn how Data Insight integrates with Data Loss Prevention and Enterprise Vault.
  • DI 4.0: Admin: Troubleshooting (8 of 8)
    In this module, you learn how to perform basic troubleshooting of Data Insight and use Command Line tools for administration.
Data Insight 3.0
  • Data Insight 3.0 Admin: Overview (1 of 5)
    In this lesson, you will gain an understanding of Data Insight 3.0, its architecture and use cases.
  • Data Insight 3.0 Admin: Installing Data Insight (2 of 5)
    In this lesson, you will learn about the requirements to Install data Insight 3.0, some best practices for deploying Data Insight in your environment, and installation and post-installation configurations.
  • Data Insight 3.0 Admin: Configuring Data Insight (3 of 5)
    In this lesson, you learn how to configure Data Insight including global settings, integrating with other directory services, filers, containers, users and policies.
  • Data Insight 3.0 Admin: Using Data Insight (4 of 5)
    In this lesson, you learn how to use the user interface and how to view files, folders, users, groups and more. You will also learn about Data Custodians, how to view and generate reports, and some troubleshooting.
  • Data Insight 3.0 Admin: Data Insight and DLP Integration (5 of 5)
    In this lesson, you learn about Data Insight and DLP integration, configuration steps, data flow and use cases.
Data Insight 2.0
  • Data Insight 2.0: Admin: Data Insight Overview (1 of 5)
    This module introduces Data Insight and discusses its purpose, architecture, and use.
  • Data Insight 2.0: Admin: Installing Data Insight (2 of 5)
    This module describes planning for and performing Data Insight installations, as well as post-installation configuration steps. A demonstration showing the installation process is included.
  • Data Insight 2.0: Admin: Configuring Data Insight (3 of 5)
    This module introduces the learner to the Data Insight management console, which is the main tool used in Data Insight. It describes how to configure different elements of Data Insight, including global settings, Active Directory settings, users, containers, and policies.
  • Data Insight 2.0: Admin: Using Data Insight (4 of 5)
    This module covers basic navigation in the management console, as well as viewing settings and results for files, folders, users, and groups. It introduces how to generate reports and troubleshoot Data Insight from information contained in the management console.
  • Data Insight 2.0: Admin: Data Insight and DLP Integration (5 of 5)
    This module describes the integration between the Data Insight product and Symantec Data Loss Prevention (DLP).
Data Loss Prevention
Data Loss Prevention 12.5
Data Loss Prevention 12.5 Administration
  • DLP 12.5: Admin: Introduction to Symantec Data Loss Prevention (1 of 32)
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 12.5: Admin: Navigation and Reporting (2 of 32)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 12.5: Admin: Dashboard creation and distribution - Demo (3 of 32)
    This demonstration steps through the creation of a dashboard report and how to send it using email and steps through configuring a user's reporting preferences.
  • DLP 12.5: Admin: Incident Remediation and Workflow (4 of 32)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 12.5: Admin: Incident Remediation - Demo (5 of 32)
    This demonstration steps through remediating incidents based on specific users and roles and steps through configuring new roles and users.
  • DLP 12.5: Admin: Policy Management (6 of 32)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 12.5: Admin: Exporting and importing policy templates, and creating a policy - Demo (7 of 32)
    This demonstration steps through how to export and import policy templates and steps through the creation of a policy based on a template.
  • DLP 12.5: Admin: Response Rule Management (8 of 32)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 12.5: Admin: Creating Automated Response Rules - Demo (9 of 32)
    This demonstration steps through the creation of Automated Response rules and how to add automated response rules to a policy.
  • DLP 12.5: Admin: Described Content Matching (10 of 32)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12.5: Admin: Creating a DCM policy (Data identifiers) - Demo (11 of 32)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.
  • DLP 12.5: Admin: Exact Data Matching and Directory Group Matching (12 of 32)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12.5: Admin: Creating an EDM index for a Directory Group Match - Demo (13 of 32)
    This demonstration steps through creating an EDM index for a Directory Group Match.
  • DLP 12.5: Admin: Indexed Document Matching (14 of 32)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12.5: Admin: Creating an IDM index - Demo (15 of 32)
    This demonstration steps through creating an IDM index.
  • DLP 12.5: Admin: Vector Machine Learning (16 of 32)
    This module covers the VML detection method, its use cases, and how to use it in policies.
  • DLP 12.5: Admin: Creating a VML profile and policy - Demo (17 of 32)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.
  • DLP 12.5: Admin: Network Monitor (18 of 32)
    This module reviews Symantec Data Loss Prevention Mobile Email Monitor features and Network Monitor features.
  • DLP 12.5: Admin: Creating and applying L7 filters - Demo (19 of 32)
    This demonstration steps through configuring L7 filters and applying them to a policy.
  • DLP 12.5: Admin: Network Prevent (20 of 32)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 12.5: Admin: Blocking a SMTP message - Demo (21 of 32)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.
  • DLP 12.5: Admin: Mobile Email Monitor and Mobile Prevent (22 of 32)
    This module introduces Mobile Prevent and its features and capabilities.
  • DLP 12.5: Admin: Using Mobile Prevent - Demo (23 of 32)
    This demonstration steps through configuring a Mobile Prevent policy and response rule, and how it is used.
  • DLP 12.5: Admin: Network Discover and Network Protect (24 of 32)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.
  • DLP 12.5: Admin: Scheduling incremental scans and viewing the resulting reports, and quarantining at-risk data - Demo (25 of 32)
    This demonstration steps through scheduling an incremental scan, viewing the reports that are generated and steps through configuring and using the Quarantine feature.
  • DLP 12.5: Admin: Endpoint Prevent (26 of 32)
    This module introduces the Endpoint Prevent product including event coverage, reporting, management options of the Symantec Data Loss Prevention Endpoint agent, and best practices.
  • DLP 12.5: Admin: Creating Endpoint Response Rules, and using Endpoint Prevent to block an attempt to copy data to a USB device - Demo (27 of 32)
    This demonstration steps through creating Endpoint specific response rules, and steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.
  • DLP 12.5: Admin: Endpoint Discover (28 of 32)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 12.5: Admin: Adding and running an Endpoint target scan and viewing incidents and scan details - Demo (29 of 32)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.
  • DLP 12.5: Admin: Enterprise Enablement (30 of 32)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 12.5: Admin: System Administration (31 of 32)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
  • DLP 12.5: Admin: Using the Log Collection and Configuration tool - Demo (32 of 32)
    This demonstration steps through how to use the Log Collection and Configuration tool.
Data Loss Prevention 12.5 Install and Deploy
  • DLP 12.5: Install and Deploy: Installing Symantec Data Loss Prevention (1 of 2)
    This lesson describes how to install Symantec Data Loss Prevention. There are three demos within the module which step through installing on Oracle 11g, Enforce server, and the installation of DLP agents on endpoint machines.
  • DLP 12.5: Install and Deploy: Upgrading to Symantec Data Loss Prevention 12.5 (2 of 2)
    This lesson details the upgrade process for the Symantec Data Loss Prevention system. There is a demo included which steps through using the Upgrade Wizard.
Data Loss Prevention 12.5 Differences
  • DLP 12.5: Diffs: Platform and reporting features (1 of 4)
    This module covers platform and reporting enhancements available in the new release.
  • DLP 12.5: Diffs: Detection features (2 of 4)
    This module covers detection enhancements available in the new release.
  • DLP 12.5: Diffs: Network and Mobile features (3 of 4)
    This module covers enhancements available on the Network Monitor and Email Mobile Monitor in the new release.
  • DLP 12.5: Diffs: Storage features (4 of 4)
    This module covers storage enhancements available in the new release. Specifically the Data Owner Portal feature.
  • Symantec Data Loss Prevention 12.5: Differences Update-Endpoint Features
    This module covers Endpoint enhancements available in the new 12.5 release. It is an adjunct to the four modules in the Data Loss Prevention 12.5: Differences course.
Data Loss Prevention 12.0
Data Loss Prevention 12.0 Administration
  • DLP 12: Admin: Introduction to Symantec Data Loss Prevention (1 of 32)
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 12: Admin: Navigation and Reporting (2 of 32)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 12: Admin: Dashboard creation and distribution - Demo (3 of 32)
    This demonstration steps through the creation of a dashboard report and how to send it using email and steps through configuring a user's reporting preferences.
  • DLP 12: Admin: Incident Remediation and Workflow (4 of 32)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 12: Admin: Incident Remediation - Demo (5 of 32)
    This demonstration steps through remediating incidents based on specific users and roles and steps through configuring new roles and users.
  • DLP 12: Admin: Policy Management (6 of 32)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 12: Admin: Exporting and importing policy templates, and creating a policy - Demo (7 of 32)
    This demonstration steps through how to export and import policy templates and steps through the creation of a policy based on a template.
  • DLP 12: Admin: Response Rule Management (8 of 32)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 12: Admin: Creating Automated Response Rules - Demo (9 of 32)
    This demonstration steps through the creation of Automated Response rules and how to add automated response rules to a policy.
  • DLP 12: Admin: Described Content Matching (10 of 32)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12: Admin: Creating a DCM policy (Data identifiers) - Demo (11 of 32)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.
  • DLP 12: Admin: Exact Data Matching and Directory Group Matching (12 of 32)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12: Admin: Creating an EDM index for a Directory Group Match - Demo (13 of 32)
    This demonstration steps through creating an EDM index for a Directory Group Match.
  • DLP 12: Admin: Indexed Document Matching (14 of 32)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 12: Admin: Creating an IDM index - Demo (15 of 32)
    This demonstration steps through creating an IDM index.
  • DLP 12: Admin: Vector Machine Learning (16 of 32)
    This module covers the VML detection method, its use cases, and how to use it in policies.
  • DLP 12: Admin: Creating a VML profile and policy - Demo (17 of 32)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.
  • DLP 12: Admin: Mobile Email Monitor and Network Monitor (18 of 32)
    This module reviews Symantec Data Loss Prevention Mobile Email Monitor features and Network Monitor features.
  • DLP 12: Admin: Creating and applying L7 filters - Demo (19 of 32)
    This demonstration steps through configuring L7 filters and applying them to a policy.
  • DLP 12: Admin: Network Prevent (20 of 32)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 12: Admin: Blocking a SMTP message - Demo (21 of 32)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.
  • DLP 12: Admin: Mobile Prevent (22 of 32)
    This module introduces Mobile Prevent and its features and capabilities.
  • DLP 12: Admin: Using Mobile Prevent - Demo (23 of 32)
    This demonstration steps through configuring a Mobile Prevent policy and response rule, and how it is used.
  • DLP 12: Admin: Network Discover and Network Protect (24 of 32)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.
  • DLP 12: Admin: Scheduling incremental scans, viewing resulting reports, and quarantining at-risk data - Demo (25 of 32)
    This demonstration steps through scheduling an incremental scan, viewing the reports that are generated and steps through configuring and using the Quarantine feature.
  • DLP 12: Admin: Endpoint Prevent (26 of 32)
    This module introduces the Endpoint Prevent product including event coverage, reporting, management options of the Symantec Data Loss Prevention Endpoint agent, and best practices.
  • DLP 12: Admin: Creating Endpoint Response Rules, and using Endpoint Prevent to block an attempts to copy to USB devices - Demo (27 of 32)
    This demonstration steps through creating Endpoint specific response rules, and steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.
  • DLP 12: Admin: Endpoint Discover (28 of 32)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 12: Admin: Adding and running an Endpoint target, and viewing incidents and scan details - Demo (29 of 32)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.
  • DLP 12: Admin: Enterprise Enablement (30 of 32)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 12: Admin: System Administration (31 of 32)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
  • DLP 12: Admin: Using the Log Collection and Configuration tool - Demo (32 of 32)
    This demonstration steps through how to use the Log Collection and Configuration tool.
Data Loss Prevention 11.5
Data Loss Prevention 11.5 Administration
  • DLP 11.5: Admin: Introduction to Symantec Data Loss Prevention (1 of 47)
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 11.5: Admin: Navigation and Reporting (2 of 47)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 11.5: Admin: Dashboard creation and distribution - Demo (3 of 47)
    This demonstration steps through the creation of a dashboard report and how to send it using email.
  • DLP 11.5: Admin: Reporting preferences - Demo (4 of 47)
    This demonstration steps through configuring a user's reporting preferences.
  • DLP 11.5: Admin: Web Archive - Demo (5 of 47)
    This demonstration steps through configuring a user's reporting preferences.
  • DLP 11.5: Admin: Incident Remediation and Workflow (6 of 47)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 11.5: Admin: Incident Remediation - Demo (7 of 47)
    This demonstration steps through remediating incidents based on specific users and roles.
  • DLP 11.5: Admin: Creating roles and users - Demo (8 of 47)
    This demonstration steps through configuring new roles and users.
  • DLP 11.5: Admin: Policy Management (9 of 47)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 11.5: Admin: Exporting and importing policy templates - Demo (10 of 47)
    This demonstration steps through how to export and import plicy templates.
  • DLP 11.5: Admin: Creating a policy based on a template - Demo (11 of 47)
    This demonstration steps through the creation of a policy based on a template.
  • DLP 11.5: Admin: Using Severity in a policy - Demo (12 of 47)
    This demonstration steps through how to use severity settings in a policy.
  • DLP 11.5: Admin: Response Rule Management (13 of 47)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 11.5: Admin: Creating Automated Response Rules - Demo (14 of 47)
    This demonstration steps through the creation of Automated Response rules.
  • DLP 11.5: Admin: Adding automated responses to a policy - Demo (15 of 47)
    This demonstration steps through how to add automated response rules to a policy.
  • DLP 11.5: Admin: Described Content Matching (16 of 47)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11.5: Admin: Creating a DCM policy (Data identifiers) - Demo (17 of 47)
    This demonstration steps through the creation of a DCM policy using Data Identifiers.
  • DLP 11.5: Admin: Creating a policy from the PCI template - Demo (18 of 47)
    This demonstration steps through creating a DCM policy using the PCI policy template.
  • DLP 11.5: Admin: Exact Data Matching and Directory Group Matching (19 of 47)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11.5: Admin: Creating an EDM index for a Directory Group Match - Demo (20 of 47)
    This demonstration steps through creating an EDM index for a Directory Group Match.
  • DLP 11.5: Admin: Indexed Document Matching (21 of 47)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11.5: Admin: Creating an IDM index - Demo (22 of 47)
    This demonstration steps through creating an IDM index.
  • DLP 11.5: Admin: Vector Machine Learning (23 of 47)
    This module covers the VML detection method, its use cases, and how to use it in policies.
  • DLP 11.5: Admin: Creating a VML profile and policy - Demo (24 of 47)
    This demonstration steps through the creation of a VML profile and using it in a VML policy.
  • DLP 11.5: Admin: Network Monitor Review (25 of 47)
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.
  • DLP 11.5: Admin: Introduction to Network Prevent (26 of 47)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 11.5: Admin: Blocking a SMTP message - Demo (27 of 47)
    This demonstration steps through configuring Network Prevent for Email to block a SMTP message.
  • DLP 11.5: Admin: Introduction to Symantec Data Loss Prevention for Tablets (28 of 47)
    This module introduces the Symantec Data Loss Prevention for Tablets, or Tablet Prevent product.
  • DLP 11.5: Admin: Using Tablet Prevent - Demo (29 of 47)
    This demonstration steps through configuring a Tablet Prevent policy and how it is used.
  • DLP 11.5: Admin: Introduction to Network Discover and Network Protect (30 of 47)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.
  • DLP 11.5: Admin: Performing an Exchange scan - Demo (31 of 47)
    This demonstration steps through configuring and performing an Exchange scan.
  • DLP 11.5: Admin: Scheduling incremental scans and viewing the resulting reports - Demo (32 of 47)
    This demonstration steps through scheduling an incremental scan and viewing the reports that are generated.
  • DLP 11.5: Admin: Quarantining at risk data - Demo (33 of 47)
    This demonstration steps through configuring and using the Quarantine feature.
  • DLP 11.5: Admin: Scanning a file-system target - Demo (34 of 47)
    This demonstration steps through configuring and performing a file-system scan.
  • DLP 11.5: Admin: Introduction to Endpoint Prevent (35 of 47)
    This module introduces the Endpoint Prevent product including event coverage, reporting, and best practices.
  • DLP 11.5: Admin: Agent configuration management - Demo (36 of 47)
    This demonstration steps through how to manage and apply agent configurations.
  • DLP 11.5: Admin: Defining Endpoint Devices - Demo (37 of 47)
    This demonstration steps through how to define authorized Endpoint devices.
  • DLP 11.5: Admin: Using Endpoint Prevent to block an attempt to copy data to a USB device - Demo (38 of 47)
    This demonstration steps through configuring Endpoint Prevent to block an attempt to copy sensitive data to an undefined USB device.
  • DLP 11.5: Admin: Creating Endpoint Response Rules - Demo (39 of 47)
    This demonstration steps through creating Endpoint specific response rules.
  • DLP 11.5: Admin: Managing Endpoint DLP Agents (40 of 47)
    This module covers the management options of the Symantec Data Loss Prevention Endpoint agent.
  • DLP 11.5: Admin: Using SMP to manage the DLP Agent - Demo (41 of 47)
    This demonstration steps through how to use Symantec Management Platform to manage the DLP Agent.
  • DLP 11.5: Admin: Introduction to Endpoint Discover (42 of 47)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 11.5: Admin: Adding and running an Endpoint target and viewing incidents and scan details - Demo (43 of 47)
    This demonstration steps through the configuration of adding an Endpoint target, running the scan, and viewing the incidents and scan details.
  • DLP 11.5: Admin: Enterprise Enablement (44 of 47)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 11.5: Admin: System Administration (45 of 47)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
  • DLP 11.5: Admin: Credential Management - Demo (46 of 47)
    This demonstration steps through how to configure and use the Credential Management feature.
  • DLP 11.5: Admin: Using the Log Collection and Configuration tool - Demo (47 of 47)
    This demonstration steps through how to use the Log Collection and Configuration tool.
Data Loss Prevention 11.0
Data Loss Prevention 11.0 Administration
  • DLP 11: Administration— Complementary Symantec Products
    This appendix lesson describes the complementary Symantec products that can integrate with Symantec Data Loss Prevention 11.
  • DLP 11: Administration— Introduction to DLP (1 of 15)
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 11: Administration— Navigation and Reporting (2 of 15)
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 11: Administration— Incident Remediation and Workflow (3 of 15)
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 11: Administration— Policy Management (4 of 15)
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 11: Administration— Response Rule Management (5 of 15)
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 11: Administration— Described Content Matching (6 of 15)
    This module covers the DCM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11: Administration— Exact Data Matching and Directory Group Matching (7 of 15)
    This module covers the EDM and DGM detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11: Administration— Indexed Document Matching (8 of 15)
    This module covers the IDM detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 11: Administration— Network Monitor Review (9 of 15)
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.
  • DLP 11: Administration— Introduction to Network Prevent (10 of 15)
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 11: Administration— Introduction to Network Discover and Network Protect (11 of 15)
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, managing the scans, and configuring Data Insight integration.
  • DLP 11: Administration— Introduction to Endpoint Prevent (12 of 15)
    This module introduces the Endpoint Prevent product including event coverage, agent management, reporting, and best practices.
  • DLP 11: Administration— Introduction to Endpoint Discover (13 of 15)
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 11: Administration— Enterprise Enablement (14 of 15)
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 11: Administration— System Administration (15 of 15)
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
Data Loss Prevention 10.5
Data Loss Prevention 10.5 Administration
  • DLP 10.5 Standard Ed. Admin - Intro to DLP
    This module introduces the Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - Navigation and Reporting
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - Incident Response and Workflow
    This module describes the incident response methodology and workflow features common to the Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - TrueMatch Detection Method
    This module covers the TrueMatch detection method, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 10.5 Standard Ed. Admin - Policy Management
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - Response Rule Management
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention Standard.
  • DLP 10.5 Standard Ed. Admin - Deployment Best Practices
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention Standard customers.
  • DLP 10.5 Standard Ed. Admin - System Administration
    This module details the server administration aspects of the Symantec Data Loss Prevention Standard product.
  • DLP 10.5 Admin - Intro to DLP
    This module introduces the Symantec Data Loss Prevention suite.
  • DLP 10.5 Admin - Navigation and Reporting
    This module describes the navigation and reporting features common to the Symantec Data Loss Prevention products.
  • DLP 10.5 Admin - Incident Remediation and Workflow
    This module describes the incident remediation and workflow features common to the Symantec Data Loss Prevention products.
  • DLP 10.5 Admin - Policy Management
    This module covers information related to Policy Management as it pertains to Symantec Data Loss Prevention.
  • DLP 10.5 Admin - Response Rule Management
    This module presents the details of Response Rule Management as it applies to Symantec Data Loss Prevention.
  • DLP 10.5 Admin - TrueMatch Detection Methods
    This module covers the TrueMatch detection methods, which you can use to define confidential data in your policies and then to detect that data in your enterprise.
  • DLP 10.5 Admin - Advanced EDM
    This module provides a deeper explanation of EDM, covering data source preparation, secure transport of data sources, strategies for refreshing data sources and indexes, and advanced use of EDM.
  • DLP 10.5 Admin - Network Monitor Review
    This module reviews Symantec Data Loss Prevention Network Monitor features and includes filtering and best practices.
  • DLP 10.5 Admin - Intro to Network Prevent
    This module introduces the Network Prevent products including Network Prevent (Email) and Network Prevent (Web).
  • DLP 10.5 Admin - Intro to Network Discover and Network Protect
    This module introduces the Network Discover and Network Protect products, including creating targets, scanning various repositories, and managing the scans.
  • DLP 10.5 Admin - Intro to Endpoint Prevent
    This module introduces the Endpoint Prevent product including event coverage, agent management, reporting, and best practices.
  • DLP 10.5 Admin - Intro to Endpoint Discover
    This module introduces the Endpoint Discover product including creating Endpoint Discover targets and reporting.
  • DLP 10.5 Admin - Enterprise Enablement
    This module details the strategies and best practices for reducing risk and enabling Symantec Data Loss Prevention customers.
  • DLP 10.5 Admin - System Administration
    This module details the server administration aspects of the Symantec Data Loss Prevention product suite.
Data Loss Prevention 9.0
Data Loss Prevention 9.0 Administration
  • DLP 9.0 - Administration Overview
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Data Loss Prevention
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Endpoint Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices. Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Symantec Data Loss Prevention
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Reporting, Incident Remediation and Workflow
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Policy Management
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Response Rule Management
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - TrueMatch Detection Methods
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Advanced EDM
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Policy Best Practices
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Network Monitor Review
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Network Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Network Discover and Protect
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Endpoint Prevent
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Introduction to Endpoint Discover
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - Enterprise Enablement
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
  • DLP 9.0 - System Administration
    This course covers the configuration and administration of the Symantec Data Loss Prevention Enforce platform including reporting, workflow, and incident response management, policy management and detection, response management, and deployment best practices.  Additionally, you will be introduced to all of the Symantec Data Loss Prevention products.
Deepsight
  • Deepsight Intelligence Portal (DIP) Overview (1 of 7)
    This lesson discusses the variety of intelligence the portal provides, demonstrates how to set up your account and familiarize yourself with the portal, reviews the analyst journals, discusses who to contact if you have a problem, and describes what is covered in the lessons of this course.
  • DIP Building Technology Lists (2 of 7)
    This lesson discusses how technology lists can help your organization focus on key intelligence and how to use DeepSight to create an effective technology list.
  • DIP Creating Alerts (3 of 7)
    This lesson describes how to manage delivery methods, how alerts can simplify monitoring of key intelligence, and how to use DeepSight to configure alerts.
  • DIP Leveraging Alerts and Research (4 of 7)
    This lesson describes how you can find and utilize alerts and how to use the Research page to close operational issues.
  • DIP Utilizing Datafeeds (5 of 7)
    This lesson describes information in the Datafeeds tab and discusses how to utilize the User Audit log.
  • DIP Creating Custom Reports (6 of 7)
    This lesson describes how to run a custom report and schedule a report.
  • DIP Managing Users and Licenses (7 of 7)
    This lesson describes how to change company profile information, add a new user, update a user's information and assign a license to a user, add a license, and determine license usage.
  • Symantec DeepSight Early Warning Services Portal (Lessons 1-7)
    This video is for those who need to install, deploy, configure, manage, administer, and troubleshoot the Symantec DeepSight Early Warning Services portal.
Desktop and Laptop Option (DLO)
  • Symantec Desktop and Laptop Option (SDLO) 7.5 Differences Fundamentals (1 of 6)
    This module describes the functionality of the Desktop and Laptop Option. It explains the key benefits of using DLO and about the DLO components. Finally, the DLO deployment architecture is also explained.
  • What's new in SDLO 7.5 (2 of 6)
    This module introduces the new features in Symantec Desktop and Laptop Option 7.5. It also explains the enhancements made to Symantec Desktop and Laptop Option 7.5.
  • Installing SDLO 7.5 (3 of 6)
    This module lists the pre-installation tasks prior to installing DLO and the system requirements. It also covers the installation of DLO components and the Desktop Agent. It describes the DLO post-installation tasks. Finally, it covers the upgradation to DLO 7.5 and various key DLO components.
  • Support for Microsoft Windows Server 2012 and Microsoft Windows 8 Desktop (4 of 6)
    This module describes the DLO 7.5 support for Deduplication NTFS volume and Resilient File system. It also explains the DLO 7.5 support for Microsoft Windows 8 Desktop. Finally, it covers the DLO 7.5 support for the BitLocker feature.
  • Desktop and Laptop Option support for Deduplication (5 of 6)
    This module explains the basic concept of DLO deduplication. It also covers the DLO deduplication architecture and its key components. In addition, it explains how to set up a DLO deduplication environment. Finally, it explains the DLO deduplication methods.
  • SDLO Log Gather Tool (6 of 6)
    This module describes the functionality of the DLO Log Gather tool. It covers the requirements and installation details of the DLO Log Gather tool. It also explains the configuration of the DLO Log Gather tool and the steps to run the tool. Finally, it describes each DLO log in detail.
  • Symantec Desktop and Laptop Option 7.5 Fundamentals: Overview (1 of 12)
    This module describes the functionality of the Desktop and Laptop Option. It explains the key benefits of using DLO, the SDLO deployment architecture and the DLO components. Finally, it covers the SDLO database commands and their functions.
  • Installing SDLO 7.5 (2 of 12)
    This module describes the Symantec Desktop and Laptop Option 7.5 installation process. It also covers the installation process for Symantec DLO 7.5 Desktop Agent. Finally, it lists the pre-installation and post-installation tasks.
  • Upgrading and Migrating to SDLO 7.5 (3 of 12)
    This module describes the upgradation of the BE-DLO server and agents to SDLO 7.5. It lists the steps to perform a domain migration. It also covers the upgradation of the NBU-DLO server and agents to SDLO 7.5. Finally, it covers the upgradation of NetBackup Professional to SDLO 7.5.
  • What's new in SDLO 7.5 (4 of 12)
    This module introduces the new features in Symantec Desktop and Laptop Option 7.5. It also explains the enhancements made to Symantec Desktop and Laptop Option 7.5.
  • Configuring and Setting up SDLO (5 of 12)
    This module explains the SDLO 7.5 Profiles and Backup selections. It also covers the concept of Delta File Transfer. In addition, it describes the managing of SDLO storage locations. Finally, it also describes the Automated User assignments and explains how to apply Global Exclude filters.
  • Managing SDLO Users and Computers (6 of 12)
    This module describes the Desktop Agent users in SDLO. It covers the steps to create a new network user data folder. In addition, it explains the addition, management, and migration of Desktop Agent users. Finally, it explains the management of Desktop Agent computers.
  • Performing SDLO Backups and Restores (7 of 12)
    This module explains the backup and restore of data using SDLO 7.5. It covers the backup and recovery of SDLO servers and user data. Finally, it also explains the different methods of SDLO data recovery.
  • Understanding the Symantec Desktop Agent (8 of 12)
    This module describes the configuration of the Desktop Agent. It covers the usage of the Desktop Agent for backing up and restoring files. Finally, it explains the functionality of the Desktop Agent.
  • SDLO support for Deduplication (9 of 12)
    This module explains the basic concept of DLO deduplication. It also covers the DLO deduplication architecture and its key components. In addition, it explains how to set up a DLO deduplication environment. Finally, it explains the DLO deduplication methods and the working of the Garbage collection utility.
  • Support for Microsoft Windows Server 2012 and Microsoft Windows 8 Desktop (10 of 12)
    This module describes the DLO 7.5 support for Deduplication NTFS volume and Resilient File system. It also explains the DLO 7.5 support for Microsoft Windows 8 Desktop. Finally, it covers the DLO 7.5 support for the BitLocker feature.
  • SDLO Log Gather Tool and Debugging (11 of 12)
    This module describes the functionality of the DLO Log Gather tool. It covers the requirements and installation details of the DLO Log Gather tool. It also explains the configuration of the DLO Log Gather tool and the steps to run the tool. In addition, it describes how to view and interpret DLO logs. Finally, it also describes the SDLO Command Line Interface Management tools.
  • Monitoring SDLO Jobs, Alerts, and Reports (12 of 12)
    This module describes the monitoring of the SDLO Job history. It also explains how to view Job history and alerts. Finally, it describes how to run and view the reports.
  • Symantec Desktop and Laptop Option 7.6: FAQ
    ​This documents answers the frequently asked questions about Symantec Desktop and Laptop Option 7.6 product.
Disaster Recovery Advisor
  • Introducing Symantec Disaster Recovery Advisor (1 of 4)
    In this module, you learn about the need for risk assessment and how Symantec Disaster Recovery Advisor (DRA) aids in performing risk assessments. Further, you learn how to install DRA and navigate through the DRA console.
  • Configuring DRA for scanning (2 of 4)
    In this module, you learn about the basic scan configuration tasks and describe the entities that you can configure in DRA. You then learn how to configure these entities. You also learn how to manage these entities in DRA using sites and scanning groups. Finally, you learn how DRA scans the IT environment, how to identify issues with the scan process, and most common issues that are encountered.
  • Managing user access (3 of 4)
    In this module, you learn about user management in DRA. You learn how to add a DRA user and import Active Directory users in DRA. You also learn about roles, scope and profiles that are associated to the user accounts.
  • Using the Comparison module (4 of 4)
    In this module, you learn about the Comparison module in DRA. You learn how to create worksheets and comparison groups. Finally, you learn how to perform host configuration comparisons.
Disaster Recovery Orchestrator
Disaster Recovery Orchestrator 6.1 for MS Azure
  • Disaster Recovery Orchestrator (SDRO) 6.1-Introduction to SDRO 6.1 (1 of 10)
    In this module, you get an overview of Symantec Disaster Recovery Orchestrator (SDRO) 6.1. It shows the architecture and lays out the components of SDRO.
  • SDRO 6.1-SDRO 6.1 Requirements (2 of 10)
    In this module, you learn about the hardware and software requirements for installing Symantec Disaster Recovery Orchestrator 6.1.
  • SDRO 6.1-Preparing the Cloud Environment (3 of 10)
    In this module, you learn about the steps to set up the Microsoft Azure infrastructure for installing Symantec Disaster Recovery Orchestrator 6.1.
  • SDRO 6.1-Installing and Configuring SDRO 6.1 (4 of 10)
    In this module, you learn about the Console and Client installation of Symantec Disaster Recovery 6.1.
  • SDRO 6.1-Configuring Applications for Disaster Recovery (5 of 10)
    In this module, you learn about the Disaster Recovery Orchestrator Console settings. You also learn about the considerations for configuring an application for disaster recovery. Finally, you learn to configure a SQL and a custom application for disaster recovery.
  • SDRO 6.1-Administering Disaster Recovery of Applications (6 of 10)
    In this module, you learn about the various Disaster Recovery Orchestrator operations. You also learn about the disaster recovery and application monitoring settings of an application. Additionally, you learn to use the SDRO reports. Finally, you learn to remove the recovery configuration of an application.
  • SDRO 6.1-SDRO 6.1 Agents (7 of 10)
    In this module, you learn about the infrastructure and application agents of Symantec Disaster Recovery Orchestrator 6.1.
  • SDRO 6.1-Synchronization of Application Data (8 of 10)
    In this module, you learn about the file replication components of Symantec Disaster Recovery Orchestrator. You also learn about the replication agents in Symantec Disaster Recovery Orchestrator.
  • SDRO 6.1-Backing-up, Repairing And Uninstalling SDRO 6.1 (9 of 10)
    In this module, you learn how to backup the Symantec Disaster Recovery Orchestrator Console. You also learn to repair Symantec Disaster Recovery Orchestrator Console and Client installations. Finally, you learn to uninstall Symantec Disaster Recovery Orchestrator.
  • SDRO 6.1-Troubleshooting SDRO 6.1 (10 of 10)
    In this module, you learn about the Symantec Disaster Recovery Orchestrator logs. You also learn to troubleshoot common issues of Symantec Disaster Recovery Orchestrator. Finally, you learn about the limitations and known issues of Symantec Disaster Recovery Orchestrator 6.1.
eDiscovery Platform powered by Clearwell
eDiscovery Platform 8 powered by Clearwell
eDiscovery Platform 8 Demonstrations
  • Symantec eDiscovery Platform 8.0 Create Legal Hold Demo (1 of 74)
    Configure system admin for legal hold and escalation manager for an employee from the employee list. Create a legal hold associated with a case.
  • SEDP8 Send System Admin Notice Demo (2 of 74)
    Add a system admin notice to a legal hold and send to two system administrators and configure nine. custodians to hold. View the system admin notice in OWA.
  • SEDP8 Send Custodian Notice Demo (3 of 74)
    Add a custodian notice to a legal hold and send it to nine custodians. View a custodian notice in OWA.
  • SEDP8 Customize Hold Notice Language Demo (4 of 74)
    Add an attachment and customize the body of a custodian notice. Send the custodian notice and view the message and attachment in OWA.
  • SEDP8 Create survey question Demo (5 of 74)
    Add a survey question to a custodian notice and send it to nine custodians.
  • SEDP8 Respond to hold notices and surveys Demo (6 of 74)
    Open custodian and system admin notices in OWA. Open the confirmation page and confirm compliance.
  • SEDP8 Create Legal Hold Notice Templates Demo (7 of 74)
    Create a custodian notice template. Use the new template to send a custodian notice to a custodian
  • SEDP8 Customize Reminders and Escalations Demo (8 of 74)
    Create and send a reminder for a custodian notice. Create and send an escalation for a system admin notice. View the reminder and escalation in OWA.
  • SEDP8 Track Legal Holds Demo (9 of 74)
    View legal hold information on the All Cases > Dashboard, Case Home, and the Legal Holds > Status pages. View survey results and add a custodian to an existing custodian notice.
  • SEDP8 Release Legal Holds Demo (10 of 74)
    Release a legal hold and view the legal hold activity for custodians.
  • SEDP8 Manage Legal Holds Demo (11 of 74)
    Perform a legal holds and collections backup and review the Symantec eDiscovery Platform license.
  • SEDP8 Review Legal Hold Reports Demo (12 of 74)
    Generate and view Legal Hold Defensibility, Legal Hold Activity, and Legal Hold Survey reports.
  • SEDP8 Create Tag Sets Demo (13 of 74)
    Create two tag sets using radio buttons.
  • SEDP8 Use Tag Variations Demo (14 of 74)
    Create a tag set using checkboxes, sub-tags for sub-tags, and recommending a comment.
  • SEDP8 Perform Basic Searches Demo (15 of 74)
    Perform an entire corpus search. Perform a basic keyword search and a keyword search with Boolean operators. Save searches.
  • SEDP8 View Discussion Threads Demo (16 of 74)
    View the discussion threads associated with the items found in a search. View the information provided for the discussion thread including; Summary, Thread, Terms, Conversations, Senders, and Attachments. Copy a discussion thread to a folder.
  • SEDP8 Filter Data Demo (17 of 74)
    Apply various filters. Use filters to find documents and then tag the documents.
  • SEDP8 Perform OCR Job Demo (18 of 74)
    Find files without indexed text and then perform an OCR job on those documents.
  • SEDP8 Perform Advanced Keywords and Participant Searches Demo (19 of 74)
    Perform an advanced keyword search using; copy/paste, stemming, variations, proximity, wildcards, grouping and Boolean operators. Modify the advanced keyword search by adding identifiers to the search criteria. Perform a participants search. Save the searches.
  • SEDP8 Perform Freeform Search Demo (20 of 74)
    Perform and save a freeform search.
  • SEDP8 Perform Tag Search Demo (21 of 74)
    Perform a tag search.
  • SEDP8 Perform Audio Search Demo (22 of 74)
    Perform an Audio Search.
  • SEDP8 Create Search Report Demo (23 of 74)
    Generate and view search reports.
  • SEDP8 Manage Saved Searches Demo (24 of 74)
    Copy saved searches to new locations and deletes the old searches.
  • SEDP8 Using Review Mode to Tag and Native View Demo (25 of 74)
    Review the various views available for use. View the various functions available in the review mode view. Tag items while in review mode. View items in both text and native views.
  • SEDP8 Redact Documents Demo (26 of 74)
    Use the various redaction tools to perform and save redactions.
  • SEDP8 Document Cache with Hit Highlighting Demo (27 of 74)
    Perform document cache with cache highlighting enabled.
  • SEDP8 Generate Reports from Dashboard Demo (28 of 74)
    Generate; Case Review Progress, Reviewer Progress, Folder Status and Tag Status reports. Save and view the tag status report in Microsoft Excel.
  • SEDP8 Create and Run Automation Rule Demo (29 of 74)
    Create and run an automation rule.
  • SEDP8 Tag and Folder Documents for Export Demo (30 of 74)
    Folder and tag items for export.
  • SEDP8 Run a Native Only Export Demo (31 of 74)
    Perform a native only export.
  • SEDP8 Run a Metadata Export Demo (32 of 74)
    Perform a metadata export.
  • SEDP8 Prepare for Production Demo (33 of 74)
    Create and configure a production folder.
  • SEDP8 Perform Production Demo (34 of 74)
    Run a production.
  • SEDP8 Export Production Demo (35 of 74)
    Perform an export of a production.
  • SEDP8 System settings and UI Demo (36 of 74)
    View the configuration settings available under the System > Setting tabs. View the configuration setting on the other system sub tabs including; Users, Appliances, Sessions, Jobs, Schedules, and License.
  • SEDP8 Run a Case Backup Demo (37 of 74)
    Perform a case backup.
  • SEDP8 Use the Clearwell Utility Demo (38 of 74)
    Use the Clearwell Utility to stop and start the services.
  • SEDP8 Upload Logs for Support Demo (39 of 74)
    Use the System > Support Features to create a .zip file for upload to Symantec eDiscovery support.
  • SEDP8 Modify the All Cases Settings Demo (40 of 74)
    Modify the All Cases > Settings.
  • SEDP8 Create a New Case Demo (41 of 74)
    Create a new case.
  • SEDP8 Configure Processing Settings Demo (42 of 74)
    Configure various processing settings.
  • SEDP8 Add Case Folder source Demo (43 of 74)
    Add and configure a case folder source for a case.
  • SEDP8 Perform Discovery Demo (44 of 74)
    Perform discovery and then analyze the results before performing processing. Generate a report of the discovery statistics.
  • SEDP8 Perform Processing Demo (45 of 74)
    Perform processing and then perform post processing quality control checks.
  • SEDP8 Create and Batch Folders Demo (46 of 74)
    Create folders and then batch documents into folders.
  • SEDP8 Use Load File Import (LFI) Demo (47 of 74)
    Perform a load file import.
  • SEDP8 Create Roles Demo (48 of 74)
    Create tag sets for use in demonstration. View rights in default roles. Create a custom role.
  • SEDP8 Create Access Groups Demo (49 of 74)
    Create access group.
  • SEDP8 Create Access Profiles Demo (50 of 74)
    View the rights in default access profiles. Create a custom access profile.
  • SEDP8 Create Users Demo (51 of 74)
    Create new users
  • SEDP8 Test Roles Demo (52 of 74)
    Assign roles to users and test rights.
  • SEDP8 Test Access Profiles Demo (53 of 74)
    Assign access profiles to users and test rights.
  • SEDP8 Add Users to Access Groups Demo (54 of 74)
    Add users to access groups and test access to entities.
  • SEDP8 Active Directory Discovery Demo (55 of 74)
    Perform Active Directory and Enterprise Vault discovery.
  • SEDP8 Adding Source Accounts Demo (56 of 74)
    Create source accounts for access to sources.
  • SEDP8 Adding Sources Demo (57 of 74)
    Create sources for collection.
  • SEDP8 Create Destination Demo (58 of 74)
    Create destinations for the collections.
  • SEDP8 Creating Collections Demo (59 of 74)
    Create collection to organize collection tasks to collect various sources.
  • SEDP8 Creating Collection Tasks Demo (60 of 74)
    Create collection tasks to collect various sources.
  • SEDP8 Filter Collection Tasks Demo (61 of 74)
    Apply filters to the collection tasks.
  • SEDP8 Assigning Custodians to Collection Tasks Demo (62 of 74)
    Configure custodians for assignment during collection.
  • SEDP8 Running Collection Task Demo (63 of 74)
    Run collection tasks.
  • SEDP8 Perform EV Search Preview Demo (64 of 74)
    Create an EV Search Task. Analyze and preview the items found after running the EV Search Task.
  • SEDP8 EV-Data-Hold-in-Place (EV Holds) Demo (65 of 74)
    Create, run and release an EV Hold Task.
  • SEDP8 Create an OnSite Collection Demo (66 of 74)
    Create an OnSite Collector.
  • SEDP8 Install an OnSite Collector Demo (67 of 74)
    Install an OnSite Collector
  • SEDP8 Run OnSite Collector Demo (68 of 74)
    Run the OnSite Collector.
  • SEDP8 Upload an OnSite Collector Demo (69 of 74)
    Upload the items collected using the OnSite Collector.
  • SEDP8 Creating Collection Sets Demo (70 of 74)
    Create collection sets.
  • SEDP8 Analyzing Collection Set Demo (71 of 74)
    Analyze the data in a collection set.
  • SEDP8 Add Collection Set to Case Demo (72 of 74)
    Add the collection set to a case and process the collection set.
  • SEDP8 Review Collection Reports Demo (73 of 74)
    Export information about the collections and view in Microsoft Excel.
  • SEDP8 Basic Troubleshooting Collections Demo (74 of 74)
    View basic logs for troubleshooting collections.
eDiscovery Platform 8 for Administrators
  • Symantec eDiscovery Platform 8.0: For Administrators (SEDP8 Admin) Lesson 01: Symantec eDiscovery Platform Fundamentals 1
    This presentation discusses Symantec eDiscovery Platform architecture, in addition to providing an overview of installation, upgrading and patch management.
  • SEDP8 Admin Lesson 02: Symantec eDiscovery Platform Fundamentals 2 (2 of 10)
    This presentation introduces system settings, basic tasks, backups and the Clearwell Utility, as well as how to work with Symantec Support.
  • SEDP8 Admin Lesson 03: Case Creation (3 of 10)
    This presentation covers creating cases and configuring processing settings.
  • SEDP8 Admin Lesson 04: Source Setup, Discovery and Processing (4 of 10)
    This presentation explains how to set up sources and perform discovery and processing on sources.
  • SEDP8 Admin Lesson 05: Object Security (5 of 10)
    This presentation explains the configuration of security using roles, access profiles and access groups.
  • SEDP8 Admin Lesson 06: User and Custodian Setup and Management (6 of 10)
    This presentation explains how to create users and custodians as well as the custodian manager functionality.
  • SEDP8 Admin Lesson 07: Identification and Collection Fundamentals (7 of 10)
    This presentation covers identifying and collecting data of interest, and discusses the use of source accounts, sources, destinations, collections and collection tasks.
  • SEDP8 Admin Lesson 08: Collections and Collection Tasks (8 of 10)
    This presentation covers creating collections and collection tasks, and also discusses Enterprise Vault search preview and Enterprise Vault Hold-in-Place.
  • SEDP8 Admin Lesson 09: OnSite Collections and Collection Sets (9 of 10)
    This presentation covers creating, downloading, installing, running and uploading OnSite collections, and it also discusses creating and analyzing collection sets.
  • SEDP8 Admin Lesson 10: Collection Reporting and Maintenance (10 of 10)
    This presentation covers collection reports available and the various maintenance tasks for collections.
eDiscovery Platform 8 for Users
  • Symantec eDiscovery Platform 8.0: For Users (SEDP8 Users) Lesson 01: Introduction to Electronic Discovery (1 of 12)
    This lesson introduces users to eDiscovery, explains EDRM, and discusses how data is discovered and collected.
  • SEDP8 Users Lesson 02: Introduction to Symantec eDiscovery (2 of 12)
    This lesson introduces the Symantec eDiscovery Platform user interface, shows how to create a case and describes a case management workflow.
  • SEDP8 Users Lesson 03: Legal Holds and Sending Hold Notices (3 of 12)
    This lesson explains how to create Legal Holds and send Legal Hold notices.
  • SEDP8 Users Lesson 04: Customizing Notes and Managing Confirmations (4 of 12)
    This lesson shows how to customize Hold Notices and explains how custodians can confirm their Hold Notices.
  • SEDP8 Users Lesson 05: Legal Hold Tracking and Management (5 of 12)
    This lesson teaches users how to track, edit and release Hold Notices, and also discusses Legal Hold administration.
  • SEDP8 Users Lesson 06: Tags and Folders (6 of 12)
    This lesson shows how to manage Tags and Folders, and perform bulk operations in Symantec eDiscovery Platform.
  • SEDP8 Users Lesson 07: Document List, Filters and Analytics (7 of 12)
    This lesson discusses navigating the Document List page, using Search Filters, and using Analysis tools in Symantec eDiscovery Platform.
  • SEDP8 Users Lesson 08: Advanced Searching (8 of 12)
    This lesson teaches users how to use Symantec eDiscovery Platform search functionality to identify responsive documents in an eDiscovery investigation.
  • SEDP8 Users Lesson 09: Review Mode and Review Management (9 of 12)
    This lesson shows how to use Review Mode, including automation rules and redaction, and provides details on review management tasks.
  • SEDP8 Users Lesson 10: Exporting Data: Native Only and Metadata Exports (10 of 12)
    This lesson discusses Printing, Export workflow, Native Only exports and Metadata exports.
  • SEDP8 Users Lesson 11: Creating and Exporting Productions (11 of 12)
    This lesson teaches users how to manage productions in Symantec eDiscovery Platform.
  • SEDP8 Users Lesson 12: Transparent Predictive Coding Survey (optional) (12 of 12)
    This lesson explains how Transparent Predictive Coding works to simplify and facilitate the identification of responsive documents in an eDiscovery project.
eDiscovery Platform 8 Implementation
  • Symantec eDiscovery Platform 8.0: Implementation (SEDP8 Implement) : Lesson 01: Symantec eDiscovery Platform 8.0 Overview (1 of 7)
    This presentation discusses legal discovery, the EDRM, how Symantec eDiscovery Platform complies with the EDRM, and the available eDiscovery Platform appliances.
  • SEDP8 Implement Lesson 02: Introduction to designing an eDiscovery Platform deployment (2 of 7)
    This presentation discusses the three possible types of eDiscovery Platform deployment design: single-appliance, distributed architecture and VM deployments.
  • SEDP8 Implement Lesson 03: Preparing the environment for installing eDiscovery Platform (3 of 7)
    This presentation discusses hardware, software and compatibility requirements for installing eDiscovery Platform 8.0.
  • SEDP8 Implement Lesson 04: Installing eDiscovery Platform 8.0 (4 of 7)
    This presentation discusses the steps for installing eDiscovery Platform, including the optional steps involved in setting up audio processing.
  • SEDP8 Implement Lesson 05: Upgrading to eDiscovery Platform 8.0 (5 of 7)
    This presentation discusses software versions and paths supported for upgrade to eDiscovery Platform 8.0 and illustrates how to perform an upgrade to v.8.0.
  • SEDP8 Implement Lesson 06: Validating the environment (6 of 7)
    This presentation discusses what an administrator must do after installation or upgrade to verify the eDiscovery Platform environment is functioning properly.
  • SEDP8 Implement Lesson 07: Configuring eDiscovery Platform 8.0 (7 of 7)
    This presentation discusses what an administrator must do after installation or upgrade to configure eDiscovery Platform 8.0 in preparation for reviewing documents.
eDiscovery Platform 8 Whats New
  • Symantec eDiscovery Platform 8.0: What's New (SEDP8 WN) Course Overview (1 of 14)
    This is an overview of the course.
  • SEDP8 WN Review Automation Rules (2 of 14)
    This module describes the new review automation rules, including: Background; Reasoning; Architecture; Configuration; Basic troubleshooting.
  • SEDP8 WN Mixed Mode Production Slip Sheets (3 of 14)
    This module describes the enhancements to production slip sheets, including: Purpose; Architecture; Basic troubleshooting.
  • SEDP8 WN Custodian Attribute Filtering for Enterprise Vault Collections (4 of 14)
    This module describes the new custodian attribute filtering, including: Background; Reasoning; Workflow; Basic troubleshooting
  • SEDP8 WN Load File Resilience: Auto Detection of File Encoding (5 of 14)
    This module describes the enhancements to Load File Imports, including: Purpose; Architecture; Basic troubleshooting.
  • SEDP8 WN Enhanced Permission (6 of 14)
    This module describes the enhancements to permissions, including: Purpose; Installation; Configuration; Working with enhanced permissions.
  • SEDP8 WN Componentized VM Deployments (7 of 14)
    This module describes the new componentized VM deployments, including: Background; Architecture; Installation; Configuration; Deployment; Basic Troubleshooting.
  • SEDP8 WN Enterprise Vault.cloud Collector (8 of 14)
    This module describes the new Enterprise Vault.cloud collections, including: Purpose; Architecture; Basic troubleshooting.
  • SEDP8 WN Item Level View (9 of 14)
    This module describes the enhancements to item level views, including: Background, requirements and prerequisites; Architecture; Installation; Configuration; Demonstration.
  • SEDP8 WN Legal Hold Formatting Toolbar (10 of 14)
    This module describes the new legal hold formatting toolbar, including: Background, requirements and prerequisites; Basic troubleshooting.
  • SEDP8 WN Improved Enterprise Vault Date Range Searches (11 of 14)
    This module describes the enhancements to Enterprise Vault date range searches, including: Background, requirements and prerequisites; Architecture; Installation; Configuration; Basic troubleshooting.
  • SEDP8 WN Lync 2013 Collections (12 of 14)
    This module describes the new Lync 2013 collections, including: Background, requirements and prerequisites; Architecture; Demonstration; Installation; Configuration; Deployment; Basic troubleshooting.
  • SEDP8 WN Tag and Folder Picker (13 of 14)
    This module describes the enhancements to the tag and folder picker, including: Background, requirements and prerequisites; Architecture; Deployment; Basic troubleshooting.
  • SEDP8 WN SharePoint Connector (14 of 14)
    This module describes the new SharePoint Connector, including: Background, requirements and prerequisites; Architecture; Installation; Configuration; Deployment; Basic troubleshooting.
eDiscovery Platform 7 powered by Clearwell
eDiscovery Platform 7 Differences
  • Symantec eDiscovery Platform 7.1.5: Differences - Rights Management Services (RMS)
    This module introduces the differences in the new version 7.1.5 emphasizing Audio Search and including configuration, deployment and scalability.
  • Clearwell 7.x: Differences--Custodian Manager [7.1.3 and 7.1.4] (1 of 10)
    You look at the purpose and workflow associated with Custodian Manger. You view reference material for new jobs, features and basic troubleshooting.
  • Clearwell 7.x: Differences--Enterprise Vault (EV) Search Preview [7.1.3 and 7.1.4] (2 of 10)
    This lesson uses the Enterprise Vault (EV) Search Preview to analyze and preview Enterprise Vault sources prior to collection or placing EV Holds on data.
  • Clearwell 7.x: Differences--Installer Improvements [7.1.3 and 7.1.4] (3 of 10)
    This module describes the changes to the Clearwell installation/upgrade process for this release of the software.
  • Clearwell 7.x: Differences--Upgrade considerations [7.1.3 and 7.1.4] (4 of 10)
    This module is designed to present miscellaneous information relevant to upgrading prior versions of Clearwell to v.7.1.3.
  • Clearwell 7.x: Differences--Processing [7.1.3 and 7.1.4] (5 of 10)
    You are introduced to the improvements made to Processing. This includes; improved container handling, strong file typing based processing and Load File Import (LFI) processing. You are also introduced to the new processing reports.
  • Clearwell 7.x: Differences--Enterprise Vault Integration, Case Matter Management Fields, and Telemetry [7.1.3 and 7.1.4] (6 of 10)
    You learn three enhancements made in Clearwell 7.1.3. The first is the handling of Blind Carbon Copy (BCC) and Distribution List (DL) handling between Enterprise Vault and Clearwell. The next enhancement, is working with the case matter management fields in both the user interface and programmatically. Lastly, we introduce the advantages of using telemetry and patch notifications within Clearwell
  • Clearwell 7.x: Differences--Search, Review, and Search Reports [7.1.3 and 7.1.4] (7 of 10)
    You learn the enhancements to the Search Report and the Search Hit Report. The changes to Separate Tagging of Attachments (STOA) are explained. You learn about searching the e-mail header data. Lastly, you look at the new Transparent Predictive Coding graphs.
  • Clearwell 7.x: Differences--Exports and Productions [7.1.3 and 7.1.4] (8 of 10)
    This module provides a concise discussion of the new Image Remediation as well as the new Export features incorporated into Symantec Clearwell eDiscovery Platform v.7.1.3.
  • Clearwell 7.x: Differences--Audio Search [7.1.3 and 7.1.4] (9 of 10)
    This module provides an introduction to the Audio Search feature. It explains how Audio Search works as well as teaches how to use it in Clearwell. It includes some discussion of the feature’s configuration, deployment and scalability, as well as how to perform troubleshooting of the feature.
  • Clearwell 7.x: Differences--Miscellaneous Updates [7.1.3 and 7.1.4] (10 of 10)
    This module instructs you on the updated functionality of the Transparent Predictive Coding feature. It explains how this version of Clearwell is now capable of supporting data collection from MS Exchange Server 2013, and it also demonstrates how Clearwell now implements requirements specified in Dodd-Frank legislation.
eDiscovery Platform 7 Transparent Predictive Coding
  • Clearwell 7.x: Transparent Predictive Coding – Course Introduction (1 of 11)
    This introductory module covers course objectives, intended audience, agenda, and administrative notes.
  • Clearwell 7.x: Transparent Predictive Coding – Predictive Coding Overview (2 of 11)
    In this module, you learn what Predictive Coding is, the benefits of Clearwell’s Transparent Predictive Coding, a brief review of considerations from Predictive Coding cases, and planning points for managing discovery requirements when using Predictive Coding.
  • Clearwell 7.x: Transparent Predictive Coding – Understanding Statistics and Predictive Coding Technology (3 of 11)
    This module helps you better understand statistical concepts pertinent to Predictive Coding, and covers the use of statistics and information retrieval as integrated in Clearwell.
  • Clearwell 7.x: Transparent Predictive Coding – Best Practices Workflow (4 of 11)
    This module offers an overview of the Clearwell Transparent Predictive Coding Best Practices workflow, reviewing all the steps at a high level. The module covers Preparation steps, Creating a Control Set, the Training process, and how to complete a Predictive Coding project.
  • Clearwell 7.x: Transparent Predictive Coding – Preparation Steps (5 of 11)
    In this module, we cover the initial steps in the Best Practices workflow. First you learn how users can define the specific population of documents that will be used for Predictive Coding. Next, the module covers details for the steps of ECA and Data Culling, and Managing non-standard documents. The last section covers important information about tagging documents and items.
  • Clearwell 7.x: Transparent Predictive Coding – Setup and Training (6 of 11)
    This lesson covers core parts of the Transparent Predictive Coding Best Practices workflow. Specifically, the objectives for this lesson are to help you understand how to set up folders for Predictive Coding, how to create and manage the Control Set, and how to train the predictive coding system.
  • Clearwell 7.x: Transparent Predictive Coding – Demo-Setup and Training (7 of 11)
    This demonstration walks through the setup and training steps of the Best Practices workflow.
  • Clearwell 7.x: Transparent Predictive Coding – Testing, Predicting, and Finishing (8 of 11)
    In this module, you learn how to test the Predictive Coding model, understand reports and prediction ranks, apply predictions once a desired level of accuracy is achieved, and manage next steps after Predictive Coding.
  • Clearwell 7.x: Transparent Predictive Coding – Demo-Testing, Predicting, and Finishing (9 of 11)
    This demonstration walks through testing, predicting, and finishing a Predictive Coding project.
  • Clearwell 7.x: Transparent Predictive Coding – Transparent Predictive Coding Administration (10 of 11)
    This module helps you understand the administration of Transparent Predictive Coding, including how to use the Prediction Status page, how to import and export Predictive Coding data, how to monitor Predictive Coding in the Review Dashboard, and a few other important tasks.
  • Clearwell 7.x: Transparent Predictive Coding – Alternate Use Cases and Workflows (11 of 11)
    In this module, you learn how to use Transparent Predictive Coding for alternate goals and workflows. This includes use cases such as prioritized review, privilege identification, highly relevant identification, and quality control checks.
eDiscovery Platform 7 Special Topics
  • Symantec Clearwell eDiscovery Platform: Load File Import
    In this module you learn to use the Load File Import feature in order to set up a Load File Source for processing. In addition, you learn to troubleshoot Load File Import errors. Finally, you learn to set up a Clearwell Production Export to be imported into another Clearwell server.
  • Clearwell eDiscovery Platform 7.1.2 Distributed Architecture
    This lesson will help you understand the basic concepts of Distributed Architecture, and can assist in configuring your own clustered environments to take advantages of the Distributed Collection, Processing , Review, and Export capabilities in Symantec Clearwell eDiscovery Platform v7.1.2.
eDiscovery Platform 7 Legal Holds and Collections
  • Clearwell 7.x: Legal Holds and Collections: Introduction to Clearwell (1 of 8)
    You review Legal Discovery and EDRM, discuss Clearwell Appliance characteristics, perform Clearwell application installation overview, preview Clearwell Login and UI fundamentals and describe High-level workflows with Clearwell.
  • Clearwell 7.x: Legal Holds and Collections: Legal Holds and Hold Notices (2 of 8)
    This lesson includes performing Legal Hold overview, importing and managing custodians, as well as, creating and sending Hold Notices.
  • Clearwell 7.x: Legal Holds and Collections: Customizing Notices and Managing Confirmations (3 of 8)
    You learn how to use the options for Hold Notice customizations so they fit your requirements, and discover how custodians can confirm their Hold Notices.
  • Clearwell 7.x: Legal Holds and Collections: Legal Hold Management and Tracking (4 of 8)
    You learn how to track, edit and release Hold Notices, and you also learn about Legal Hold administration.
  • Clearwell 7.x: Legal Holds and Collections: Identification and Collection Fundamentals (5 of 8)
    You are introduced to the fundamentals of the Clearwell Identification and Collection module.
  • Clearwell 7.x: Legal Holds and Collections: Collections and Collection Tasks (6 of 8)
    You learn about creating Collections, running Collection Tasks and managing EV Holds in Symantec Clearwell eDiscovery Platform.
  • Clearwell 7.x: Legal Holds and Collections: OnSite Collections and Collection sets (7 of 8)
    You learn how OnSite Collections and Collection Sets work, and how you can use them in your overall eDiscovery data collection efforts.
  • Clearwell 7.x: Legal Holds and Collections: Collection Reporting and Maintenance (8 of 8)
    You learn about the reporting capabilities and supporting activities in the Clearwell Collection module.
eDiscovery Platform 7 Processing Review and Export
  • Clearwell 7.x: Processing, Review and Export: Introduction to Clearwell (1 of 12)
    You review Legal Discovery and EDRM, discuss Clearwell Appliance characteristics, perform Clearwell application installation overview, preview Clearwell Login and UI fundamentals and describe High-level workflows with Clearwell.
  • Clearwell 7.x: Processing, Review and Export: Clearwell System Settings (2 of 12)
    The basic Clearwell appliance architecture is explained. You configure basic system setting options and manage system-level tasks. You manage backups that adhere to clients’ policies and requirements and use the Clearwell Utility to manage tasks, and understand Clearwell services. Finally, there is a discussion of working with Clearwell Support to efficiently resolve issues.
  • Clearwell 7.x: Processing, Review and Export: Case Creation and Management (3 of 12)
    You organize collected source data on your network for processing by Clearwell. Explain the All Cases area in Clearwell and manage case settings. You create a new case in Clearwell and select processing settings that fit your requirements.
  • Clearwell 7.x: Processing, Review and Export: Source Setup, Discovery and Processing (4 of 12)
    You initiate and manage Discovery jobs (Pre-Processing jobs). You use the pre-processing options to evaluate and cull data prior to processing. You also process data and track data processing jobs.
  • Clearwell 7.x: Processing, Review and Export: Document List, Filters and Analytics (5 of 12)
    You learn about the organization and features on the Document List page. You manage the search filters to filter and organize data, and use Clearwell’s analysis tools, including Discussion threads, Participants, Reports, and Find Similar.
  • Clearwell 7.x: Processing, Review and Export: Advanced Search and Predictive Coding (6 of 12)
    You use Clearwell’s Advanced Search capabilities to manage effective searching and formulate accurate keyword searches. You utilize Transparent Predictive Coding and its workflow within the Clearwell eDiscovery processes. Use Concept Search to explore and identify concepts and terms. Create and manage Saved Searches.
  • Clearwell 7.x: Processing, Review and Export: Tags and Folders (7 of 12)
    You create and manage tags and tag structures. Create and manage folders, batch folders, and assign folders for review. Apply tags or folders to large groups of documents.
  • Clearwell 7.x: Processing, Review and Export: User Setup and Management (8 of 12)
    You learn the details of user management, and discover the differences between System User and Case User setup. Set up User Profile and Roles for users. Manage Access Profiles for users.
  • Clearwell 7.x: Processing, Review and Export: Review Mode and Review Management (9 of 12)
    You discover the features and benefits available in the Review Mode in Clearwell. Use Redaction functionality to redact documents. Use Document Cache, Term Highlighting, Review Dashboard and other review management features.
  • Clearwell 7.x: Processing, Review and Export: Exporting Data – Native Only and Metadata Exports (10 of 12)
    Print documents to PDF or hard copy using Clearwell’s print functionality. Discover general workflow for creating and running exports. Perform Native Only exports from Clearwell. Perform Metadata exports from Clearwell.
  • Clearwell 7.x: Processing, Review and Export: Creating and Exporting Productions (11 of 12)
    Document production and the basic production workflow in Clearwell are explained. You create and manage a production in Clearwell. Export a production with appropriate format.
  • Clearwell 7.x: Processing, Review and Export: Clearwell Review (12 of 12)
    This lesson offers review and consolidation of comprehension of typical case workflow and Clearwell management procedures.
Encryption
Endpoint Encryption 11
  • Symantec Endpoint Encryption (SEE) 11 Course Introduction (1 of 20)
    In this module, you learn how Symantec Endpoint Encryption can protect laptop and desktop systems, and about the content of these course videos.
  • SEE 11 Opening Quiz (2 of 20)
    In this quiz you will test your knowledge of Symantec Endpoint Encryption and be tested on various aspects of the product that you will learn about during this course.
  • SEE 11 Technical Introduction (3 of 20)
    This course video offers a brief overview of Symantec Endpoint Encryption, along with features, benefits and architecture.
  • SEE 11 Management Server Installation (4 of 20)
    In this module, you review the purpose of the management server, look at system requirements, see an overview of the account types and roles needed, protocols and ports used, and learn about connecting to the SQL database.
  • SEE 11 Installation Quiz (5 o 20)
    In this quiz you will test your knowledge of the previous courseware. The quiz also reinforces and allows review of topics covered.
  • SEE 11 Management Server Post Installation Steps (6 of 20)
    In this module, you will look at the initial configuration of the management server after installation. Includes a process overview, directory synchronization, web service configuration, and verification of the installation.
  • SEE 11 Management Server Quiz (7 of 20)
    In this module, you learn about setting up security in Process Manager. You also learn how to set up reporting in Workflow Designer, how to add reporting components to the Vacation Request project, and how to process a task in Process Manager.
  • SEE 11 SEEMS Management Console (8 of 20)
    In this module, you will look at using the Management Console for administration, and the Configuration Manager vs. the Management Console. You will also explore using the Configuration Manager, roles overview and installation overview.
  • SEE 11 SEEMS Installation Lab (9 of 20)
    In this lab you will have an opportunity to install the management server and various client agents.
  • SEE 11 Policy Options (10 of 20)
    In this module you will configure Symantec Endpoint Encryption policy options, enabling and accessing policy options for the Management Agent, Drive Encryption, and Removable Media Encryption. The module also includes best practices for using recovery certificates and the background images for the drive encryption login screen.
  • SEE 11 SEEMS Policy Lab (11 of 20)
    In this lab you will configure Active Directory Group Policy and Native Policy in preparation for the client rollout. You will configure MMC snap-in restrictions so users will only have access to the necessary snap-ins.
  • SEE 11 Reporting (12 of 20)
    This module introduces you to Symantec Endpoint Encryption reports. You will learn how to customize report appearance, view reports on the console, and create and edit custom reports.
  • SEE 11 Administration Quiz (13 of 20)
    In this quiz you will test your knowledge of the previous courseware. The quiz also reinforces and allows review of topics covered.
  • SEE 11 Drive Encryption (14 of 20)
    This module will give you an overview of drive encryption. You will get an introduction to the auto-logon feature, smart cards and tokens, supported disk types, encryption details, and user registration.
  • SEE 11 Drive Encryption Lab (15 of 20)
    In this lab you will create and install the endpoint Management Agent and Drive Encryption clients. You will also experience the pre-boot authentication and user experience as well as the help desk experience.
  • SEE 11 SEE Removable Media Encryption (16 of 20)
    This training module introduces you to the purpose and features of Symantec Endpoint Encryption’s Removable Media Encryption. It also discusses recovery certificates and portability options.
  • SEE 11 Removable Media Encryption Lab (17 of 20)
    In this lab you will create and install the Removable Media Encryption (RME) client. You will also copy files to and from a USB drive, as well as manually encrypt and decrypt files.
  • SEE 11 Data Loss Prevention Integration with Symantec Endpoint Encryption (18 of 20)
    In this module you will use Symantec Endpoint Encryption Removable Media Encryption with Data Loss Prevention to evaluate files that users attempt to copy over to removable drives and determine whether the user is permitted to actually copy this material or if the data should be encrypted when moved to removable media.
  • SEE 11 Client Management Lab (19 of 20)
    In this lab you will administer the endpoint. You will install\enable auto logon and simulate the user experience. You will also experience different aspects of the drive encryption administrator tasks, including Remote Decryption, Admin User authentication. Finally, you will view a variety of reports available in Symantec Endpoint Encryption.
  • SEE 11 Reporting and Recovery Quiz (20 of 20)
    In this final activity for this courseware you will test your knowledge of recovery and reporting for Symantec Endpoint Encryption.
Encryption Basics
  • Encryption Basics-1 of 3: Definitions and Caesar's Cipher
    This core module introduces encryption basics, discussing Caesar's Cypher, and defining cryptography terms.
  • Encryption Basics-2 of 3: Keys, Encryption Types, and Digital Signatures
    In this module you will learn about the different types of encryption, such as: symmetric-key, public-key, private key, and PGP public key. Digital signatures are examined.
  • Encryption Basics-3 of 3: Cyphers, Keys, Encryption Types, and Certificates
    This module describes trust models, such as direct trust, hierarchical trust and web of trust. Keys and their algorithms are explained, as well as signing and trusting keys. Certificates are compared to keys.
PGP Universal Server 3.2 & Desktop 10.2
PGP Universal Server 3.2 & Desktop 10.2 Special Topics
  • PGP US 3.2 & Desktop 10.2: Name Changes (1 of 4)
    This module offers an introduction to name changes introduced with the 10.3 and 3.3 releases of the encryption products.
  • PGP US 3.2 & Desktop 10.2: SEMS DLP Integration (2 of 4)
    In this module you learn about integration of PGP Universal Server with Data Loss Prevention and Symantec Messaging Gateway.
  • PGP US 3.2 & Desktop 10.2: Mobile Encryption (3 of 4)
    This lesson looks at the mobile encryption offering for iOS devices.
  • PGP US 3.2 & Desktop 10.2: File Share Dropbox (4 of 4)
    In this module, you learn how to configure Universal Server and PGP Desktop to integrate with Dropbox. Also a look at using File Share Encryption for iOS with Dropbox.
PGP Universal Server 3.2 & Desktop 10.2 Install and Configure
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Course Introduction (1 of 38)
    This module offers an introduction to the lesson which will be covered in the Install, Configure, and Deploy section of this training.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Cryptography Essentials (2 of 38)
    In this module you learn about early cryptography along with many terms and definitions required to understand modern cryptography. We also look at different encryption methods and standards.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Product Introduction (3 of 38)
    This lesson looks at the various PGP Encryption products available. Including PGP Universal Server, PGP Desktop, PGP Command line, and the PGP Mobile products.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Installing PGP Universal Server (4 of 38)
    In this module, you learn how to prepare for and install PGP Universal Server. This module also introduces PGP Universal Server administrative user interfaces.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Installing Universal Server – Demo A (5 of 38)
    This demonstration steps through the installation tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Installing Universal Server – Demo B (6 of 38)
    This demonstration steps through some of the key configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Consumers and Groups (7 of 38)
    This module provides an overview of how the Universal Server separates users and devices into consumer groups for policy enforcement. Also a look at creating Internal User accounts on the Universal Server and generating keypairs for these users.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Consumers and Groups - Demo A (8 of 38)
    This demonstration steps through some of the key configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Administrative Keys (9 of 38)
    In this module you learn about the various high-level administrative keys on the Universal Server for enabling services or securing data.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Administrative Keys - Demo A (10 of 38)
    This demonstration steps through creating an Additional Encryption Key (ADK) in PGP Desktop to add to a Universal Server.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Administrative Keys - Demo B (11 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Server Messaging (12 of 38)
    In this lesson, you learn how to recognize the use and purpose of Learn mode and cover the configuration of the lower level mail flow on the Universal Server. Also, we will be discussing Mail Proxies and learn how the proxies change based on the placement of the Universal Server.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Monitoring and Reporting (13 of 38)
    In this lesson, you learn how to maintain and backup the PGP Universal Server. The focus of this lesson is administrative tasks and how to monitor and maintain the Universal Server. Explaining how to locate the various logs available and filter them for information. Configuring remote backups.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Monitoring and Reporting - Demo A (14 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Mail Policy (15 of 38)
    In this lesson, you learn how to explain default mail processing, define conditions, actions and key searches, describe the key lookup process and how to create custom chains and rules.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Mail Policy - Demo A (16 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Key Not Found (17 of 38)
    In this lesson, you learn how to understand differences between internal and external users and manage the options available when you do not find a key for recipients.
  • PGP US 3.2 & Desktop 10.2: Install & Config: Web Messenger (18 of 38)
    In this lesson, you learn how to use and configure Web Messenger and other external delivery options.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Web Messenger - Demo A (19 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Preparing Universal Server for PGP Desktop Clients (20 of 38)
    This lesson defines and discusses the importance of directory synchronization, which is the method by which a PGP Universal Server can take advantage of your existing LDAP infrastructure to create users and groups.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Preparing Universal Server for PGP Desktop Clients - Demo A (21 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Keys (22 of 38)
    In this lesson, you learn about key settings, key modes, and properties for the users. We will look at the different modes available, subkeys, key usage flags, and smart cards. These are all very important settings as they determine what the users are allowed to do, how secure the data is, and how accessible it is by the organization.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring Client Enrollment (23 of 38)
    In this lesson, you learn how to use the three different types of enrollment available for users. Enrollment is designed to allow the administrator to choose a method which best fits within the organization.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring Client Enrollment - Demo A (24 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Installing PGP Desktop (25 of 38)
    In this lesson, we introduce the PGP Desktop features and discuss the requirements for installing and licensing PGP Desktop.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Create General Policy Settings (26 of 38)
    In this lesson, we talk about the settings on the General tab of a Consumer Policy.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Desktop Messaging (27 of 38)
    In this lesson, you discuss how PGP Desktop interacts with PGP Universal Server and then the desktop settings stored in the Messaging tab of a consumer policy and other messaging features for PGP Desktop.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Desktop Messaging - Demo A (28 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring PGP Whole Disk Encryption (29 of 38)
    In this module we will start to look at Whole Disk Encryption. It is very important that administrators know which options are available to limit or empower the users.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring PGP Whole Disk Encryption - Demo A (30 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Whole Disk Encryption Management and Recovery (31 of 38)
    There are many options available for Whole Disk Encryption. This module covers the settings and how they allow you to administer WDE.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: PGP Whole Disk Encryption Management and Recovery - Demo A (32 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring PGP Netshare (33 of 38)
    In this lesson you will see how to create Netshare encrypted directories. Configuration of policy and a PGP Netshare Group Key are also covered.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Configuring PGP Netshare - Demo A (34 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Other PGP Desktop Features (35 of 38)
    This lesson looks at the other PGP Desktop features available such as Virtual Disk, PGP Zip, and the PGP Shredder.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Other PGP Desktop Features - Demo A (36 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Clustering (37 of 38)
    This lesson covers Universal Server Clustering which is mentioned in a few of the previous modules. Clustering is used for redundancy and load balancing. A basic understanding of the functionality is necessary for administrators who will need to do deployments of the encryption products which will require multiple Universal Servers.
  • PGP Universal Server 3.2 & Desktop 10.2: Install & Config: Clustering - Demo A (38 of 38)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
PGP Universal Server 3.2 & Desktop 10.2 Maintain and Troubleshoot
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: Course Introduction (1 of 15)
    This module offers an introduction to the lesson which will be covered in the Maintain and Troubleshoot section of this training.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Support Tools (2 of 15)
    In this lesson, you learn how to use the Support Knowledge Base and documentation library and are introduced to the Universal Server services.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Command Line Administration (3 of 15)
    In this lesson, you learn how to access the command line to view settings, services, logs and processes. Also enable debug logging and install VMware Tools.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Command Line Administration - Demo A (4 of 15)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Troubleshooting (5 of 15)
    In this lesson, you learn about the common troubleshooting commands and services.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Database Access and Reporting (6 of 15)
    In this lesson, you learn how to access the database the database and run reports using SQL queries.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Common Problems (7 of 15)
    In this lesson, you learn how to recognize and manage common PGP Universal Server problems.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Common Problems - Demo A (8 of 15)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Common Clustering Issues (9 of 15)
    In this lesson, you learn how to recognize some common cluster problems and troubleshoot them.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Server Common Messaging Issues (10 of 15)
    In this lesson, you learn how to recognize common messaging issues such as mail queuing, open relay, and mail routing issues.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Universal Web Messenger Issues (11 of 15)
    In this lesson, you learn how to recognize and manage user login problems and other common Web Messenger errors.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Desktop Services, Files and Folders (12 of 15)
    In this lesson, you learn how to understand the function of the managing services and to recognize and manage common PGP Desktop problems
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Desktop Installation and Enrollment Issues (13 of 15)
    In this lesson, you learn how to understand the enrollment process, to recognize and manage common Desktop installation, credentials and missing keyring problems.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Desktop Installation and Enrollment Issues - Demo A (14 of 15)
    This demonstration steps through some of the configuration tasks learned in the corresponding lesson.
  • PGP Universal Server 3.2 & Desktop 10.2: Maintain & Troubleshoot: PGP Whole Disk Encryption Troubleshooting (15 of 15)
    In this lesson, you learn how to recognize and manage PGP Desktop WDE issues with recovery options and the boot drive encryption process.
Endpoint Encryption 8
  • Endpoint Encryption 8 Admin Introduction and Architecture (1 of 7)
    This module covers the introduction and architecture of Symantec Endpoint Encryption.
  • Endpoint Encryption 8 Admin SQL Server Configuration and Installation (2 of 7)
    This module covers the SQL Server configuration and installation.
  • Endpoint Encryption 8 Admin Symantec Endpoint Encryption Management Server Installation (3 of 7)
    This module covers the installation of the Symantec Endpoint Encryption Management Server and its components.
  • Endpoint Encryption 8 Admin Client Installation and Deployment (4 of 7)
    This module covers the installation and deployment of the Symantec Endpoint Encryption client software.
  • Endpoint Encryption 8 Admin Client Password & Full Disk Recovery (5 of 7)
    This module covers the various features available to recover both passwords and hard disk data.
  • Endpoint Encryption 8 Admin Symantec Endpoint Encryption Removable Storage (6 of 7)
    This module covers the features and capabilities of the Removable Storage version of SEE.
  • Endpoint Encryption 8 Admin System Administration and Planning (7 of 7)
    This module covers the administrative roles and responsibilities, the different tools available for managing a SEE solution, and planning considerations for deployment.
Email Security.cloud
  • Symantec Email Data Protection- Customer Demonstration
    A walkthrough of the specific features and functionality of Email Data Protection. Upon completion of this course you will be better prepared to articulate the features of Email Data Protection and be able to create policies, rules, and actions to enforce company email policies.
  • Symantec Email Data Protection- Customer Migration Training
    For Partners and Customers who need to provide technical support. In this module you will learn about the Customer migration from the Email Content Control service to Email Data Protection.
  • Symantec Email Data Protection- Support Training
    For Partners and Customers who need to provide technical support. In this module you will learn about Email Data Protection, how to configure it in the Management Portal, new options in reporting, and how to troubleshoot it.
  • Symantec Email Security.cloud Supporting DMARC Validation
    This video will walk you through the DMARC addition to the inbound email scanning stack of technologies; including: —What it is; —Why it's been added; —How to enable the feature; —Where to find troubleshooting assistance.
  • Supporting Two-factor Authentication to the Administration Portal for Symantec.cloud
    This video will walk you through the Two Factor Authentication (2FA) and IP restriction enhancements to the .cloud administration portal. The session will specifically focus on: —What the functionality is for ; —Why it's been added; — How to enable the features ; —What the user experience will be like ; —Where to find troubleshooting assistance.
Endpoint Management powered by Altiris
Asset Management Suite
Asset Management Suite 7.5
  • Asset Management Suite 7.5: Administration- Course Introduction (1 of 15)
    This module provides an overview of the lessons, course objectives, and intended audience for the Symantec Asset Management Suite 7.5: Administration course.
  • AMS 7.5: Product Overview (2 of 15)
    This module provides a high-level overview of the purpose and components of Asset Management Suite.
  • AMS 7.5: Installing AMS (3 of 15)
    This module discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.
  • AMS 7.5: The Symantec Management Platform Resource Model (4 of 15)
    This module discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.
  • AMS 7.5: Migrating, Discovering and Importing Asset (5 of 15)
    This module discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7.5, and how to discover and import network assets.
  • AMS 7.5: Security and Organizational Views and Groups (6 of 15)
    This module provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.
  • AMS 7.5: Setting Up the Organizational Structure (7 of 15)
    This module discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.
  • AMS 7.5: Creating Assets (8 of 15)
    This module discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite.
  • AMS 7.5: Importing Assets with CMDB Solution and Data Connector (9 of 15)
    This module explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.
  • AMS 7.5: Maintaining Assets (10 of 15)
    This module discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.
  • AMS 7.5: Working with Contracts (11 of 15)
    This module discusses how to create and manage contract resources in Asset Management Suite and how to run preconfigured contract reports.
  • AMS 7.5: Working with Software Licensing (12 of 15)
    This module discusses the software license compliance model used in Asset Management Suite, how to set up software license management, and how to run preconfigured software licensing reports.
  • AMS 7.5: Working with Procurement (13 of 15)
    This module discusses how to set up and manage the procurement process in Asset Management Suite and how to run preconfigured procurement reports.
  • AMS 7.5: Working with Barcode Solution (14 of 15)
    This module discusses how to set up and use barcode functionality in Asset Management Suite to receive and create new assets, and to track and manage inventory.
  • AMS 7.5: Reporting Asset Management Information Using IT Analytics (15 of 15)
    This module discusses how to configure and use IT Analytics to review Key Performance Indicator, dashboard, detailed, and cube reports.
Asset Management Suite 7.1
  • AMS 7.1 Administration: Course Introduction
    This module provides an overview of the lessons, course objectives, and intended audience for the Asset Management Suite 7.1 Administration course.
  • AMS 7.1 Administration: Product Overview (1 of 15)
    This module provides a high-level overview of the purpose and components of Asset Management Suite.
  • AMS 7.1 Administration: Installing Asset Management Suite (2 of 15)
    This module discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.
  • AMS 7.1 Administration: The Symantec Management Platform Resource Model (3 of 15)
    This module discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.
  • AMS 7.1 Administration: Migrating, Discovering and Importing Asset (4 of 15)
    This module discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7.1, and how to discover and import network assets.
  • AMS 7.1 Administration: Security and Organizational Views and Groups (5 of 15)
    This module provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.
  • AMS 7.1 Administration: Setting Up the Organizational Structure (6 of 15)
    This module discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.
  • AMS 7.1 Administration: Creating Assets (7 of 15)
    This module discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite.
  • AMS 7.1 Administration: Importing Assets with CMDB Solution and Data Connector (8 of 15)
    This module explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.
  • AMS 7.1 Administration: Maintaining Assets (9 of 15)
    This module discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.
  • AMS 7.1 Administration: Working with Contracts (10 of 15)
    This module discusses how to create and manage contract resources in Asset Management Suite and how to run preconfigured contract reports.
  • AMS 7.1 Administration: Working with Software Licensing (11 of 15)
    This module discusses the software license compliance model used in Asset Management Suite, how to set up software license management, and how to run preconfigured software licensing reports.
  • AMS 7.1 Administration: Working with Procurement (12 of 15)
    This module discusses how to set up and manage the procurement process in Asset Management Suite and how to run preconfigured procurement reports.
  • AMS 7.1 Administration: Working with Barcode Solution (13 of 15)
    This module discusses how to set up and use barcode functionality in Asset Management Suite to receive and create new assets, and to track and manage inventory.
  • AMS 7.1 Administration: Reporting Asset Management Information Using IT Analytics (14 of 15)
    This module discusses how to configure and use IT Analytics to review Key Performance Indicator, dashboard, detailed, and cube reports.
  • AMS 7.1 Administration: Working with the Asset Management Workflows (15 of 15)
    This module discusses the optional asset management workflows that can be deployed in an organization to enable users to perform some common asset management functions.
Asset Management Suite 7.0
  • AMS 7.0 — Course Introduction
    This lesson provides an overview of the lessons, course objectives, and intended audience for the Asset Management Suite 7 Administration course.
  • AMS 7.0 — Lesson 1: Product Overview
    This lesson provides a high-level overview of the purpose and components of Asset Management Suite.
  • AMS 7.0 — Lesson 2: Installing Asset Management Suite 7
    This lesson discusses the system requirements and steps required for installing Asset Management Suite in the Symantec Management Platform environment.
  • AMS 7.0 — Lesson 3: The Symantec Management Platform Resource Model
    This lesson discusses the elements of the Symantec Management Platform’s resource model and explores the relationships among these elements.
  • AMS 7.0 — Lesson 4: Migrating, Discovering and Importing Asset
    This lesson discusses how to migrate assets and resource associations from Service and Asset Management Suite 6.5 to Asset Management Suite 7, and how to discover and import network assets.
  • AMS 7.0 — Lesson 5: Security and Organizational Views and Groups
    This lesson provides an overview of security in the Symantec Management Platform environment and discusses how to use Asset Management Suite’s scope-based security to safely and efficiently manage assets.
  • AMS 7.0 — Lesson 6: Setting Up the Organizational Structure
    This lesson discusses the different organizational resources you can create in Asset Management Suite, and shows how to use these resources to build out your organizational structure in the Symantec Management Console.
  • AMS 7.0 — Lesson 7: Creating Assets
    This lesson discusses how to manually create assets and run preconfigured asset reports in Asset Management Suite 7.
  • AMS 7.0 — Lesson 8: Importing Assets with CMDB Solution and Data Connector
    This lesson explores CMDB Solution and Data Connector and discusses how to use these components to define data sources for performing CMDB import and export operations; create and schedule data transfer rules; create CMDB rules to clean-up, normalize, or make bulk changes to CMDB data; and create custom resource types, resource association types, and data classes.
  • AMS 7.0 — Lesson 9: Maintaining Assets
    This lesson discusses how to perform a number of useful asset housekeeping tasks and how to use Asset Management Suite to retire and dispose of assets.
  • AMS 7.0 — Lesson 10: Working with Contracts
    This lesson discusses how to create and manage contract resources in Asset Management Suite 7 and how to run preconfigured contract reports.
  • AMS 7.0 — Lesson 11: Working with Software Licensing
    This lesson discusses the software license compliance model used in Asset Management Suite 7, how to set up software license management, and how to run preconfigured software licensing reports.
  • AMS 7.0 — Lesson 12: Working with Procurement
    This lesson discusses how to set up and manage the procurement process in Asset Management Suite 7 and how to run preconfigured procurement reports.
  • AMS 7.0 — Lesson 13: Working with Barcode Solution
    This lesson discusses how to set up and use barcode functionality in Asset Management Suite 7 to receive and create new assets, and to track and manage inventory.
  • Service and Asset Management and CMDB 6.5
    The Service and Asset Management Suite and CMDB online course covers how to properly setup and manage your asset environment. If you are tasked with entering asset information, importing data from active directory or other locations, tracking purchased or leased hardware and associating your assets with users and locations, this course will demonstrate the proper way to accomplish your goals. Other topics include managing software purchases and lease agreements to insure you are compliant.
Client Management Suite
Client Management Suite 7.5
  • CMS 7.5 SP1: Course Introduction (1 of 18)
    This module discusses the intended audience of the course, an overview of the lessons and topics and tips and tricks to accessing the course videos.
  • CMS 7.5 SP1: Understanding the Symantec Client Management Suite (2 of 18)
    This module discusses the relationships between the Symantec Management Platform and the Symantec Client Management Suite (CMS) software. It also illustrates the relationships between the key platform components and concepts that are used by CMS and describes the basic workings of the platform and CSM.
  • CMS 7.5 SP1: The Symantec Management Console (3 of 18)
    This module describes how to start the Symantec Management Console. It identifies the areas of the console and describes the tasks performed from the console. It also identifies the ITMS Management Views.
  • CMS 7.5 SP1: Symantec Management Platform Basics (4 of 18)
    This module discusses how to use the Microsoft Active Directory Import and how to create, configure and run a network discovery task. It describes how resources can be grouped in organizational views and groups and also in resource filters. It discusses how to use the Quick apply option and the drag-and-drop method to apply policies to resource targets.
  • CMS 7.5 SP1: Deploying the Symantec Management Agent (5 of 18)
    This module discusses how to: push the Symantec Management Agent to computers; install the Symantec Management Agent on a computer by browsing to a web page; give additional functionality to the Symantec Management Agent; and use the Symantec Management Agent GUI on Windows computers and agent tools on UNIX, Linux and Mac computers.
  • CMS 7.5 SP1: Gathering Inventory from Managed Computers (6 of 18)
    This module presents the process of collecting inventory information on managed computers. It discusses how to create and configure inventory policies and how to create and configure inventory tasks. It presents other inventory capabilities including custom, baseline and stand-alone inventories. It discusses how to use inventory reports.
  • CMS 7.5 SP1: Managing the Software Catalog (7 of 18)
    This module presents how to configure the Software Library, perform other Software Catalog housekeeping items and craft a strategy for managing the Software Catalog. It discusses how to populate the Software Catalog and how to configure software components. It presents how to classify software components as managed to create and configure software products.
  • CMS 7.5 SP1: Delivering Software to Managed Computers (8 of 18)
    This module discusses how to: choose a method of delivering software; locate and create software items in the ITMS Management Views; quickly deliver software using a task; create and configure a managed software delivery policy; and find and use software reports.
  • CMS 7.5 SP1: Managing Software with Application Metering (9 of 18)
    This module discusses how Application Metering tracks, monitors and meters software usage. It presents how to: enable software usage tracking and review software usage information; create and configure Application Metering policies; and find and use Application Metering reports.
  • CMS 7.5 SP1: Managing Organizational Views and Groups (10 of 18)
    This module describes the structure, security and location of organizational views and groups. It presents how to create custom organizational views and groups and assign resources to an organizational group. It discusses how to manage organizational views and groups by removing and deleting resources, assigning management rights, reviewing reports and configuring resource membership updates.
  • CMS 7.5 SP1: Managing Resource Filters and Resource Targets (11 of 18)
    This module discusses in detail what resource filters and resource targets are and how to use them. It also presents how to create and modify resource filters and resource targets.
  • CMS 7.5 SP1: Managing Software Updates on Windows Computers (12 of 18)
    This module discusses how Patch Management Solution inventories computers, downloads software update bulletin information, creates installation packages and creates policies to install the updates. It presents the steps to prepare your Patch Management environment, how to distribute software updates and how to use Patch Management reports.
  • CMS 7.5 SP1: Managing Virtualized Software (13 of 18)
    This module discusses what Symantec Workspace Virtualization is and how it works. It presents how to install the Symantec Workspace Virtualization agent and how to capture virtual software and deliver it to CMS managed computers.
  • CMS 7.5 SP1: Remotely Managing Computers (14 of 18)
    This module describes the pcAnywhere components and how to use them to manage computers remotely. It discusses how Real-Time System Manager uses network protocols to perform its management operations. It presents how to use remote management reports.
  • CMS 7.5 SP1: Managing Policies (15 of 18)
    This module describes the purpose and types of policies and how to configure common policy settings. It presents user based policies, maintenance windows policies and automation policies. IT discusses how to create and modify shared schedules.
  • CMS 7.5 SP1: Managing Jobs and Tasks (16 of 18)
    This module defines task management and how to create and manage client and server tasks and jobs.
  • CMS 7.5 SP1: Overview of Deployment Solution (17 of 18)
    This module discusses Understand the management tasks that can be performed by Deployment Solution and PC Transplant. It presents how to configure Deployment Solution to use automation folders and network boot services. It discusses the many deployment task types and supporting platform task types. It Understand what a computer image is and the types of images that can be created and deployed.
  • CMS 7.5 SP1: Reporting (18 of 18)
    This module describes the source of the information found in reports and identifies the two major families of reports. It presents the location of standard reports and report features how to create custom reports. It presents how to configure and use IT Analytics solution reports.
Client Management Suite 7.1
  • CMS 7.1 Administration - Course Introduction
    In this module, you learn the course objectives, intended audience, and contents of the course.
  • CMS 7.1 Administration: Lesson 1 - Understanding Client Management Suite
    In this module, you learn the benefits of Client Management Suite, which solutions and components comprise Client Management Suite, how it can automate and streamline business processes in an organization, and how it can integrate with other products.
  • CMS 7.1 Administration: Lesson 2 - Installing Client Management Suite
    In this module, you learn about installation prerequisites and then learn the three-fold installation process: installing Symantec Installation Manager (SIM), installing Client Management Suite with Symantec Installation Manager.
  • CMS 7.1 Administration: Lesson 2 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 3 - Symantec Management Console
    In this module, you learn how to access the console, become familiar with the different views of the console, navigating the console to locate computers, policies, tasks and software, and view detailed information in each view.
  • CMS 7.1 Administration: Lesson 3 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 4 - Software Management Framework
    In this module, you learn how Client Management Suite leverages the Symantec Management Platform’s Software Management Framework to ensure that the correct software gets installed, how the Software Management Framework was designed to promote integration between solutions by providing a common way to identify, organize, and detect software, and what components make up the Software Management Framework.
  • CMS 7.1 Administration: Lesson 4 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 5 - Overview of Inventory Solution
    In this module, you learn about the different methods to gather inventory using Inventory Solution, and how to install and configure the necessary plug-ins needed to gather inventory.
  • CMS 7.1 Administration: Lesson 5 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 6 - Managing Inventory with Tasks and Policies
    In this module, you are introduced to the Inventory Portal. In addition, you learn how to create an Inventory Task and Policy to collect detailed and targeted inventory from managed computers.
  • CMS 7.1 Administration: Lesson 6 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 7 - Custom Inventory
    In this module, you learn how to create custom inventory data classes, tasks, scripts, and policies to view and report custom inventory. You also learn that custom inventory scripts use application programming interface objects and routines to create NSE files to pass information to the agent.
  • CMS 7.1 Administration: Lesson 7 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 8 - Using Baselines to Manage Computers
    In this module, you learn how to create and configure file and registry baseline tasks, use the Configuration Editor and Snapshot Editor, and view baseline inventory in the Resource Manager.
  • CMS 7.1 Administration: Lesson 8 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 9 - Software Delivery
    In this module, you learn the about the different methods to deliver software, how managed delivery is a policy-based delivery method that can be used to deliver multiple software resources with different tasks. You also learn the benefits of Quick Delivery and when to use it.
  • CMS 7.1 Administration: Lesson 9 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 10 - Managing and Delivering Software with other Tasks
    In this module, you learn how to update Windows Installer source paths and perform repairs. You also learn how to install applications into virtual layers with a managed software delivery policy and manage the layers with a task.
  • CMS 7.1 Administration: Lesson 10 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 11 - Using Application Metering to Manage Computers
    In this module, you learn how to create Application Metering policies and view and report Application Metering data. You also learn that Application Metering policies define the actions to perform when an application is started, and add applications to the Blacklisted Applications policy.
  • CMS 7.1 Administration: Lesson 11 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 12 - Software Portal
    In this module, you learn the benefits of the Software Portal for user self-service, how to request software using the software Portal and manage those requests. You also learn how to publish software to the portal and process user requests.
  • CMS 7.1 Administration: Lesson 12 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 13 - Patch Management
    In this module, you learn about Patch Management and how it works (Patch Management Workflow), and how to configure Patch Management Solution. You also learn install and manage the Software Update Agent.
  • CMS 7.1 Administration: Lesson 13 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 14 - Software Bulletins and Updates
    In this module, you learn about the importance of the Patch Remediation Center and its main functions, how to create and deploy updates using the Software Update policies, and what the responsibilities of the Software Update agent are and how to access this from the Symantec Management Agent.
  • CMS 7.1 Administration: Lesson 14 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 15 - Deployment Solution 7.1 SP1 Overview
    In this module, you become familiar with the purpose of Deployment Solution, how to configure Deployment Solution, and how to install the Deployment Solution Plug-in and automation folders.
  • CMS 7.1 Administration: Lesson 15 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 16 - Remote Assistance
    In this module, you learn how to install the Symantec pcAnywhere Solution and the plug-in on managed computers, the different methods to initiate a pcAnywhere session, and how pcAnywhere interacts with a remote computer. You also learn about Out of Bound Management and Real-Time System Manager to help manage computers.
  • CMS 7.1 Administration: Lesson 16 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • CMS 7.1 Administration: Lesson 17 - Reporting and Basic Troubleshooting
    In this module, you learn how to access reports, how to configure IT Analytics to view reports, create a custom report, and identify common reports. You also learn basic troubleshooting of Client Management Suite using common tools such as Event Viewer, the Log Viewer, and the log file.
  • CMS 7.1 Administration: Lesson 17 - Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
Client Management Suite 7.0
  • Client Management Suite 7.0: Core Administration - Overview of Client Management Suite 7
    This module provides an overview of Client Management Suite 7, including the benefits, system requirements, installation requirements and how CMS can provide IT services to end users.
  • Client Management Suite 7.0: Core Administration - Software Management Framework
    This module discusses how the Software Management Framework promotes integration between solutions by providing a common way to identify, organize, and detect software and how it works within the Symantec Management Platform.
  • Client Management Suite 7.0: Core Administration - Installing and Configuring Software Management Solution
    This module describes the components of Software Management and the process to install and configure Software Management, its agents and plug-ins.
  • Client Management Suite 7.0: Core Administration - Managed Delivery
    This module will discuss the different methods to deliver software.
  • Client Management Suite 7.0: Core Administration - Quick Delivery
    This module covers Quick Delivery features including several delivery methods for deploying software packages to workstations.
  • Client Management Suite 7.0: Core Administration - Managing Software with Other Tasks
    This module will discuss managing software with other tasks including Quick Delivery and how to update Windows Installer source paths and perform repairs on Windows Installer applications. It also covers Installing applications into virtual layers with a managed software delivery policy and managing layers with tasks.
  • Client Management Suite 7.0: Core Administration - User Requests and Reports
    This module discusses user requests, reports and the steps to request and manage software using the Software Portal.
  • Client Management Suite 7.0: Core Administration - Installing and Configuring Inventory Solution
    This module covers installing and configuring Inventory Solution including components, activities, collection methods and data classes.
  • Client Management Suite 7.0: Core Administration - Managing and Using Inventory Tasks and Policies
    This module will discuss managing and using Inventory Tasks and Policies and covers key parts of the Inventory Portal that are used to gather a basic inventory. It also covers how to run detailed file Inventories, targeted software inventory policies and stand-alone inventory packages.
  • Client Management Suite 7.0: Core Administration - Managing Computers with Custom Inventory
    This module covers Custom Inventory and how to create and modify the custom inventory data classes used to store data. It also shows how to create and run a custom inventory task and how to set advanced options.
  • Client Management Suite 7.0: Core Administration - Using Baselines to Manage Computers
    This module describes Baseline Inventory and two strategies used in performing baseline inventories. It also covers how to create, configure and file baseline tasks using the File Baseline Configuration Editor and the File and Registration Baseline Snapshot Editors.
  • Client Management Suite 7.0: Core Administration - Using Application Metering to Manage Computers
    This module discusses how Application Policies are used to monitor and deny application. It also covers the types of data sent by Application Metering, how to view the data in the Resource Manager, and how to run Application Metering reports.
  • Client Management Suite 7.0: Core Administration - Patch Management Overview
    This module covers the main functions of Patch Management Solution. It also lists the prerequisites for upgrading or performing a new install and describes the flow of data Patch Management Solution uses.
  • Client Management Suite 7.0: Core Administration - Patch Management Configuration
    This module discusses Patch Management Configuration for the core, Microsoft Server Tasks, and the Software Update Agent. It also shows how to configure replication between multiple Notification Servers for Patch Management Solution.
  • Client Management Suite 7.0: Core Administration - Software Bulletins and Updates
    This module covers the Patch Remediation Center and the Software Update Wizard used to deploy Microsoft bulletins. It also shows how to create a Software Update Policy and how to access plug-ins using the Altiris Agent.
  • Client Management Suite 7.0: Core Administration - Reporting
    This module covers reports including the Patch Management for Windows compliance reports.
Deployment Solution
Deployment Solution 7.1
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 6.9 Basics
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • DS 7.1 Administration: Deployment Solution Overview (1 of 9)
    In this module, you become familiar with the software and services offered by Symantec. You also learn what the overall purpose and functions of Deployment Solution are.
  • DS 7.1 Administration: Installing Deployment Solution (2 of 9)
    In this module, you learn about installation prerequisites and then learn the three-fold installation process: installing Symantec Installation Manager (SIM), installing Deployment Solution with (SIM), and installing the Deployment Solution plug-n on managed clients. You also learn about Symantec Boot Services and how to configure these after the installation.
  • DS 7.1 Administration: Configuring Deployment Solution (3 of 9)
    In this module, you learn about the many parts of Deployment Solution, such as configuring Sysprep image, configuring PXE Server, and adding operating system licenses, that are needed to create and deploy images.
  • DS 7.1 Administration: Symantec Management Console Fundamentals (4 of 9)
    In this module, you learn how to access the console, become familiar with the different views of the console, navigating the console to locate computers, policies, tasks and software, and view detailed information in each view. You also learn how to create manage jobs and tasks using the console.
  • DS 7.1 Administration: Creating Images & Deploying Software (5 of 9)
    In this module, you learn about the different types of computer images and how to create and deploy these images. In addition, you learn how to import predefined computers into Deployment Solution and use tasks to install software on the managed computers.
  • DS 7.1 Administration: PC Transplant with Deployment Solution (6 of 9)
    In this module, you are introduced to PC Transplant. In PC Transplant, you learn how to create template files that collect specific information regarding applications and user settings. In addition, you learn how to deploy tasks that create personality packages. Finally, you learn about the A2i Builder and how to edit personality packages.
  • DS 7.1 Administration: Computer Migrations and Deploying Operating Systems (7 of 9)
    In this module, you learn about computer migrations and deploying computer images with unicast and multicast methods. You also learn about Initial Deployment imaging, how to change a computer’s system configuration, and how to perform a scripted OS installation.
  • DS 7.1 Administration: Installing Deployment Site Servers (8 of 9)
    In this module, you learn about Deployment Site Server Components and how to install the components. You also learn how site servers affect imaging and PC Transplant.
  • DS 7.1 Administration: Remote control with pcAnywhere Solution (9 of 9)
    In this module, you learn about pcAnywhere and how to install pcAnywhere Solution and the plug-in. You then learn how to configure settings for making a remote connection, start a remote session, and manage a session.
Deployment Solution 7.0
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution Product Overview
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Installation
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution Agents
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - PXE and Automation
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Managing Images
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Managing Software Virtualization Solution
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - PC Transplant
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 7.0 for Client
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
  • Client Management Suite 7.0: Deployment and Imaging - Deployment Solution 6.9 SP1
    This course focuses on the daily tasks students perform to manage computers using Deployment Solution 7.0 for Clients and will demonstrate how to use core processes including collecting inventory and delivering software.
Deployment Solution 6.9
  • Deployment Solution 6.9 - Agents
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - DS Basics
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - Installation
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - Managing Images
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 – Managing SVS
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - Overview
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 – PC Transplant
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Deployment Solution 6.9 - PXE & Automation
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Install and Configure DAgent for Vista
    This course demonstrates how powerful Deployment Solution is in managing the computers in your network. You will learn about the different Deployment Solution components and how they work together to create a Deployment System.
  • Imaging with Ghost and ImageX
    Deployment Solution version 6.8 SP2 or higher, supports many different imaging engines, letting you select the imaging tool that best meets the needs of your company and environment. However, the only imaging engine that ships with Deployment Solution is RapiDeploy. In this course you will learn how to configure Deployment Solution to support the additional “Symantec Ghost” and “Microsoft ImageX” imaging engines.
  • Vista Migration with Deployment Solution
    The difficult task of migrating a computer from a previous version of Windows to Vista, is simplified through the power of Deployment Solution. In this course, you will learn how to use Deployment Solution to migrate a computer from XP to Vista. To get the most out of this course, you must have a working knowledge of Deployment Solution, including how to create Deployment jobs and a basic understanding of PC Transplant. If needed, please view the other Deployment Solution courses first.
IT Management Suite
  • Managing Software Licenses with Symantec IT Management Suite-Overview and Strategy (1 of 5)
    This module presents an overview of the components of ITMS that can be synergized to manage software licensing. It also provides a set of steps that can be used to manage software license compliance.
  • Managing Software Licenses with Symantec IT Management Suite-Configuring Inventory Solution to Gather Software Information (2 of 5)
    This module provides an understanding of how Inventory Solution policies support the strategy of managing software licenses and gives detailed instructions on creating and configuring Inventory Solution policies.
  • Managing Software Licenses with Symantec IT Management Suite-Creating and Associating Software Products to Software Components (3 of 5)
    This module presents the steps to create software products from software components and if needed, associate other software components to these software products.
  • Managing Software Licenses with Symantec IT Management Suite-Configuring Application Metering to Gather Software Usage Information (4 of 5)
    This module presents the steps to configure software products to collect software usage on managed computers.
  • Managing Software Licenses with Symantec IT Management Suite-Creating and Managing Software License and Software Purchase Resources (5 of 5)
    This module presents the steps to create and configure software license and software purchase resources from both the Software License Portal and the Software Blade. IT also reviews the reports that display software compliance and software usage.
Management Platform
Management Platform 7.1
  • SMP 7.1 Administration: Course Introduction
    In this module, you learn the course objectives, intended audience, and contents of the course.
  • SMP 7.1 Administration: Lesson 01 Understanding the Symantec Management Platform
    In this module you receive an introduction to the Symantec Management Platform (SMP), and learn about the SMP components, components, and how SMP works.
  • SMP 7.1 Administration: Lesson 02 Installing Symantec Management Platform
    In this module, you learn about architecture considerations, installation requirements, and using Symantec Installation Manager to install Symantec Management Platform. You also learn how to access the Symantec Management Console and configure settings after installation.
  • SMP 7.1 Administration: Lesson 02 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 03 Symantec Management Console
    In this module, you learn how to navigate the Symantec Management Console and use the enhanced console views.
  • SMP 7.1 Administration: Lesson 03 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 04 Discovering Resources
    In this module, you learn how to import computers and users using Active Directory, perform network discovery, and discover computers using domain membership.
  • SMP 7.1 Administration: Lesson 04 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 05 Resource Manager
    In this module, you learn about resources and using the Resource Manager.
  • SMP 7.1 Administration: Lesson 05 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 06 Installing and Setting Up the Symantec Management Agent
    In this module, you learn how to install the Symantec Management Agent, and then verify it installed properly. You also set the Symantec Management Agent installation options.
  • SMP 7.1 Administration: Lesson 06 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 07 Configuring Symantec Management Agent
    In this module, you learn how to configure the Symantec Management Agent settings and determine when to use unicast and multicast. You also learn how to install and view Symantec Management Agent plug-ins.
  • SMP 7.1 Administration: Lesson 07 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 08 Agent Communication with Notification Server
    In this module, you learn how the Symantec Management Agent and Notification Server communicate, and how data flows between them.
  • SMP 7.1 Administration: Lesson 08 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 09 Creating and Managing Organizational Views and Groups
    In this module, you learn how to create and manage organizational views and groups.
  • SMP 7.1 Administration: Lesson 09 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 10 Creating and Managing Filters
    In this module, you learn how to work with existing filters and create new filters using the Query Builder.
  • SMP 7.1 Administration: Lesson 10 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 11 Creating and Managing Targets
    In this module, you learn how to create and manage targets. You also learn how to apply resource scoping to filters and targets. In this module you learn to work with targets and apply resource scoping to filters and targets.
  • SMP 7.1 Administration: Lesson 11 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 12 Creating and Managing Policies
    In this module, you learn about user-based policies, maintenance policies, and automation policies. You also learn how the Symantec Management Agent receives policies and how to manage shared schedules.
  • SMP 7.1 Administration: Lesson 12 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 13 Creating and Managing Tasks
    In this module, you learn about task management, including task management communication and processing. You also learn how to create and schedule tasks, create jobs, and use a workflow.
  • SMP 7.1 Administration: Lesson 13 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 14 Security
    In this module, you learn about security and resource scoping. You also learn how to manage user accounts, roles, privileges, and permissions.
  • SMP 7.1 Administration: Lesson 14 Demo
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • SMP 7.1 Administration: Lesson 15 Reporting
    In this module, you learn about reporting and IT Analytics Solution. You also learn how to create a custom report and work with the report results.
  • SMP 7.1 Administration: Lesson 16 Site Management
    In this module, you learn how to manage sites, site servers and subnets. You will also learn how to work with task service and package service.
  • SMP 7.1 Administration: Lesson 17 Replication
    In this module, you learn how to set up, configure, and run replication.
  • SMP 7.1 Administration: Lesson 18 Hierarchy
    In this module, you receive an overview of hierarchy, and then learn how to set up a Notification Server hierarchy, configure hierarchy replication, and change the hierarchy topology.
  • SMP 7.1 Administration: Lesson 19 Troubleshooting
    In this module, you learn what Symantec Management Platform troubleshooting tools tools are available and how to use them. You also learn how to use NSConfigurator and Remote Altiris Agent Diagnosticis. Finally, you learn how to troubleshoot the Symantec Management Agent and Event inboxes.
  • SMP 7.1 Administration: Lesson 20 Backing up the Server and Database
    In this module, you learn which Symantec Management Platform components are needed for recovery. You also learn how to backup the IIS default Web Site Virtual Directories and the Configuration Management Database.
  • SMP 7.1 Administration: Lesson 21 Migrating Versions of Symantec Management Platform
    In this module, you learn how to migrate Symantec Management Platform from version 6.x to 7.0, and from version 7.0 to 7.1.
Management Platform 7.0
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Understanding the Symantec Management Platform (1 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy-Planning and Designing the Symantec Management Platform (2 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Installing Symantec Management Platform (3 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Symantec Management Console (4 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Installing and Setting Up the Altiris Agent (5 of 8)
    Management Platform 7.0 with Notification Server: Installing and Setting Up the Altiris Agent.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Configuring the Altiris Agent Settings and Tabs (6 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Resource Management (7 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Install, Configure, & Deploy - Site Management (8 of 8)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Organizational Views and Groups (1 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Filters (2 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Creating and Managing Targets (3 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Managing Policies (4 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Managing Tasks (5 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Resource Scoping and Security (6 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Reporting and the Report Wizard (7 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Replication between Notification Servers (8 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Hierarchy Design and Configuration (9 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Migrating from Notification Server 6 (10 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - SQL Basics and Resource Partitioning (11 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Management Platform 7.0 with Notification Server: Manage and Administer - Symantec Management Platform Troubleshooting (12 of 12)
    This course covers how to install and configure Symantec Notification Server and the Altiris agents, and how to create and configure key items in the Symantec Management Console such as targets and filters. Interactive simulations throughout the course will help to reinforce what you have learned.
  • Notification System Foundation 6
    The Notification Systems Foundation course focuses on the daily tasks you perform with your Altiris Solutions. In this class, you will learn the essential setup and configuration options available with Notification Server™ 6.0 as well as best practices for network design, package server configuration, and Web report generation.
  • Philips SmartManage 4.0
    Learn to remotely manage Philips monitors as part of your corporate asset management environment through the Symantec Notification Server.
Server Management Suite
Server Management Suite 7.0
  • Server Management Suite 7.0 Administration - Overview of Monitor Solution
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Overview of Server Management Suite 7
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Software Management Framework
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Inventory Solution and Inventory for Network Devices
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Managing and Using Inventory Tasks and Policies
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Network Discovery
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Patch Management Overview
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Patch Management Configuration
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Software Bulletins and Updates
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
  • Server Management Suite 7.0 Administration - Managing Monitor Solution
    Learn to use the many features and functions of Server Management Suite 7.0 including how to identify the health of your environment, analyzing trends, isolate recurring issues, and locate problems, determine their cause, and take automated actions to resolve them. You will also learn how to effectively manage, configure and report software, patches and inventory data through interactive simulations.
ServiceDesk
ServiceDesk 7.5
  • Symantec ServiceDesk 7.5: Administration--Introducing ServiceDesk (1 of 12)
    This module describes ServiceDesk 7.5, the Process Manager Portal, and the Incident, Problem, Change, and Knowledge Base modules.
  • Symantec ServiceDesk 7.5: Administration--Installing ServiceDesk (2 of 12)
    This module describes installation prerequisites and how to ensure a successful ServiceDesk 7.5 installation. This module also shows you how to install the Symantec Workflow platform, ServiceDesk modules, and Screen Capture Utility.
  • Symantec ServiceDesk 7.5: Administration--Managing Groups and Users (3 of 12)
    This module shows you how to log on and navigate the Process Manager Portal, manage Active Directory connections, and add Active Directory users. The module also shows you how to manage groups and permissions and add users to ServiceDesk.
  • Symantec ServiceDesk 7.5: Administration--Configuring Incident Management (4 of 12)
    This module introduces Incident Management rulesets and how to configure Incident Management, create data mapping routing tables, and manage email templates.
  • Symantec ServiceDesk 7.5: Administration--Using Incident Management (5 of 12)
    This module describes how to submit incidents from a user and support technicians’ perspective. The module also describes how users can download the Screen Capture Utility.
  • Symantec ServiceDesk 7.5: Administration--Using Incident Management (continued) (6 of 12)
    This module is a continuation of using Incident Management. This module describes how to use email to submit an incident and resolve and escalate incidents. This module also describes how to use and customize the Customer Service Survey form.
  • Symantec ServiceDesk 7.5: Administration--Using Problem Management (7 of 12)
    This module provides an overview of Problem Management, shows you how to create, review, and request a change from a problem ticket.
  • Symantec ServiceDesk 7.5: Administration--Configuring Change Management (8 of 12)
    This module provides an overview of Change Management, change requests sources and states, and how to configure Change Management. The module also describes Change Management rulesets.
  • Symantec ServiceDesk 7.5: Administration--Using Change Management (9 of 12)
    This module shows you how to work with change templates and how to request a change. The module also describes the process of reviewing and implementing a change.
  • Symantec ServiceDesk 7.5: Administration--Managing the Service Catalog and Quick Services Links (10 of 12)
    In this module, you learn how to configure administrator-defined scans, protection technology settings and scans, e-mail scans, and advanced scanning options for Windows and Mac clients.
  • Symantec ServiceDesk 7.5: Administration--Working with Reports (11 of 12)
    This module provides an overview of ServiceDesk reporting including IT Analytics and how to schedule and view reports.
  • Symantec ServiceDesk 7.5: Administration--Using the Knowledge Base and Document Management (12 of 12)
    This module provides an overview of the Knowledge Base, how to submit, accept, or reject knowledge base articles and how to add documents to the ServiceDesk Document Management System.
ServiceDesk 7.1
  • SD 7.1 Administration - Overview of Symantec ServiceDesk 7.1 (1 of 18)
    In this module, you learn what you can do with ServiceDesk, how ServiceDesk is a process-driven paradigm, and how it differs from products that are data-driven. You also learn how ServiceDesk uses ITIL Service processes, how ServiceDesk integrates with other Symantec products, and how ServiceDesk can be customized in your environment.
  • SD 7.1: Administration - Installing ServiceDesk 7.1 (2 of 18)
    In this module, you learn about the ServiceDesk prerequisite components, how to install ServiceDesk 7.1 on the ServiceDesk server, and how to perform the post-installation configuration steps that are required before launching the ServiceDesk application for the first time.
  • SD 7.1: Administration - Migrating from Helpdesk 6.5 (3 of 18)
    In this module, you learn how to migrate Helpdesk 6.5 incidents, categories, and Knowledge Base articles to ServiceDesk, and how to work migrated incidents from the ServiceDesk portal.
  • SD 7.1: Administration - Introduction to Workflow (4 of 18)
    In this module, you learn about Workflow Solution, learn how Workflow Solution works with ServiceDesk, and identify what you can do with the Workflow Designer. You also learn about the basic Workflow components that ServiceDesk uses and how to customize and publish Workflow changes to ServiceDesk.
  • SD 7.1: Administration - Working in the ServiceDesk Portal (5 of 18)
    In this module, you learn how to navigate the ServiceDesk portal and define portal pages, sub-portal pages, and Web parts. You also learn how to set up users, groups, and permissions in ServiceDesk. Other topics include how to modify the ServiceDesk Portal master settings and how to use the process view.
  • SD 7.1: Administration - Using Incident Management (6 of 18)
    In this module, you learn about the workflow process commonly used in business to manage incident creation and resolution, and how to create and submit a ServiceDesk incident from the user and technician perspectives. You also learn how to use ServiceDesk to monitor an e-mail inbox, how to escalate incidents, and the Customer Service Survey process.
  • SD 7.1: Administration - Incident Management Settings and Rules (7 of 18)
    In this module, you learn about ServiceDesk's Incident Management process and the various software packages associated with the process. You also set up categories, data hierarchy, incident templates, and customize the rules ServiceDesk uses to determine how incidents are assigned to support queues. In addition, you learn about Automation Rules.
  • SD 7.1: Administration - Customizing Incident Management (8 of 18)
    In this module, you learn how to customize default incident impact and urgency values in ServiceDesk, extend data types, and add input items to the user Submit Incident form.
  • SD 7.1: Administration - Using Problem Management (9 of 18)
    In this module, you learn about Problem Management as well as how to create a problem ticket from an incident and the service catalog. You also learn the process for reviewing and working problem tickets, adding an incident ticket to a problem ticket, and generating a request for change from a problem ticket.
  • SD 7.1: Administration - Customizing Problem Management (10 of 18)
    In this module, you learn the Problem Management process, how to customize problem management categories, and review the root cause of classification values in the portal. You also learn how to add a new group to perform the analysis step in Problem Management and how to add customized data fields to the submit problem form.
  • SD 7.1: Administration- Using Change Management (11 of 18)
    In this module, you learn about Change Management, the roles of Change Management, and the Change Management business model. You also learn about the default change templates, and the process for creating, reviewing, implementing, and verifying a change.
  • SD 7.1: Administration - Customizing Change Management (12 of 18)
    In this module, you learn about the different aspects of the Change Management process, how to establish the default Change Advisory Board, and how to create other Change Advisory Boards. You also learn how to customize change types, modify the change type form, and use the CAB approval process.
  • SD 7.1: Administration - Service Requests and Quick Services Links (13 of 18)
    In this module, you learn how to use the Reset Password and Request Access to Shared Folder Service Catalog items. You also learn how to configure and use the Quick Service links.
  • SD 7.1: Administration - Working with E-mail Notifications (14 of 18)
    This module describes how e-mail notifications work in ServiceDesk including how to add, edit, and disable notifications in Symantec Workflow Manager. You also learn how incoming e-mails are processed and understand where e-mail settings are stored after installation.
  • SD 7.1: Administration - Working with Reports (15 of 18)
    In this module, you learn about ServiceDesk's reporting capabilities as well as how to automatically populate reports on schedules, view reports in the ServiceDesk portal, set permissions on reports, and create and customize reports. You also learn how to monitor current and active licenses.
  • SD 7.1: Administration - Using the Knowledge Base and Document Management (16 of 18)
    In this module, you learn about the types of items you can create in the ServiceDesk Knowledge Base and how to use the ServiceDesk portal to submit Knowledge Base articles for the Knowledge Base editor to consider. You also learn how to set permissions for users, groups, and organizations to access the Knowledge Base.
  • SD 7.1: Administration - Creating Custom Web Parts (17 of 18)
    In this module, you learn how to create a custom Web part to use in the ServiceDesk Portal.
  • SD 7.1: Administration - Advanced Customization Using Workflow (18 of 18)
    In this module, you learn how to publish a Workflow process to the Service Catalog, maintain customizations by using versioning, and various ways to scale ServiceDesk. You also learn how to compare new Workflow processes to previous versions and ServiceDesk best practices.
ServiceDesk 7.0
  • ServiceDesk 7.0 Administration - Working with Reports
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Overview: Symantec ServiceDesk 7 (1 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Introduction to Workflow (2 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Installing ServiceDesk 7 (3 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Migrating from Helpdesk 6.5 (4 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Working in the ServiceDesk Portal (5 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Using Incident Management (6 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Using Problem Management (7 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • ServiceDesk 7.0 Administration - Using Change Mangement (8 of 8)
    Learn how to install, configure, and operate Symantec ServiceDesk 7; and learn how ServiceDesk implements the ITIL processes of incident management, problem management, and change management.
  • Helpdesk Solution 6
    Learn to use the many features, functions, and processes of Altiris Helpdesk Solution including how to create and integrate business rules that let you devise a consistent response to help desk incidents and establish and maintain help desk service levels. You will also learn how to effectively manage, report, and resolve help desk issues. This product is now known as ServiceDesk.
Workflow
Workflow 7.1
  • Lesson 01 - Introducing Symantec Workflow 7.1 Administration
    In this module, you learn about Workflow, how to analyze business processes, how Workflow integrates with other products, and how to access Workflow resources.
  • Lesson 02 - Installing and Configuring Workflow
    In this module, you learn about the installation requirements, how to install Workflow in the Symantec Management Platform (SMP) console, how to manage servers in SMP, and how to configure credentials.
  • Demo 02 - Installing and Configuring Workflow
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 03 - Getting Started in Workflow
    In this module, you learn about using Workflow Manager, how to navigate in Workflow Designer, and become familiar with Process Manager.
  • Lesson 04 - Creating a Simple Form Project
    In this module, you learn how to identify the stages of a project and how to determine which project type to use. You also learn how to work with components, how to create a project using component types, how to use demo components to start a project, and how to debug a project.
  • Demo 04 - Creating a Simple Form Project
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 05 - Saving and Deploying
    In this module, you learn how to package and publish a project.
  • Demo 05 - Saving and Deploying
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 06 - Building a Workflow Project
    In this module, you learn about models and how to add form components. You also learn how to configure processes in a Dialog Workflow component and how to debug the Workflow project type.
  • Demo 06 - Building a Workflow Project
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 07 - Enabling Process Reporting
    In this module, you learn about how to configure security for Process Manager and how to set up reporting in Workflow Designer. You also learn how to work with reporting components and how to look at component data in Process Manager.
  • Demo 07 - Enabling Process Reporting
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 08 - Expanding a Project’s Functionality
    In this module, you learn how to add variables and property components, how to insert them in a project, and how to initialize the data. You also learn about looping and branching and how to view values while debugging.
  • Demo 08a - Expanding a Project’s Functionality (1)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Demo 08b - Expanding a Project’s Functionality (2)
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 09 - Creating a Secondary Model
    In this module, you learn about Secondary models and how to use them.
  • Demo 09 - Creating a Secondary Model
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 10 - Integration
    In this module, you learn about integrations, how to connect to data sources, how to work with custom data types, and how to add the integration to a project.
  • Demo 10 - Integration
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 11 - Mapping to Data Types
    In this module, you learn how to map to data types and how to map the Secondary model to the Primary model.
  • Demo 11 - Mapping to Data Types
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 12 - Applying Advanced Customizations to Forms
    In this module, you learn how to apply themes, how to format dialog boxes, and how to design acknowledgement forms.
  • Demo 12 - Applying Advanced Customizations to Forms
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 13 - Verifying User Input
    In this module, you learn about regular expressions and how to use the library with a project.
  • Demo 13 - Verifying User Input
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 14 - Escalation
    In this module, you learn how to create escalations and Timeouts.
  • Demo 14 - Escalation
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 15 - Exception Handling
    In this module, you learn how to prevent failures by using the Exception Trigger component and applying exception handling throughout the project.
  • Demo 15 - Exception Handling
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 16 - Versioning
    In this module, you learn about why it is important to use versioning, how to implement versioning, and how to compare projects.
  • Demo 16 - Versioning
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 17 - Publishing
    In this module, you learn how to prepare a project for publishing to production, how to publish, and which post-publishing steps must be completed.
  • Demo 17 - Publishing
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
  • Lesson 18 - Working in Process Manager
    In this module, you learn how to access process data in Process Manager, how to set application properties, how to enhance tasks in Process Manager, how to create a page for the project, and how to create reports in Process Manager.
  • Demo 18 - Working in Process Manager
    This demonstration steps through some of the key tasks learned in the corresponding lesson.
Workflow 7.0
  • Workflow 7.0 - Introducing Symantec Workflow 7.0
    In this module, you learn what Workflow Solution is, how it can automate and streamline business processes in an organization, and how it can integrate with other products. You also learn about useful Workflow resources.
  • Workflow 7.0 - Installing and Configuring Workflow
    In this module, you learn about installation prerequisites and then learn the three-fold installation process: installing Symantec Installation Manager (SIM), installing Workflow Solution with (SIM), and installing Workflow Solution in the Symantec Management Console. You also learn which credentials to configure after installation and how to configure them.
  • Workflow 7.0 - Getting Started in Workflow
    This module provides details on the parts of Workflow Designer and how to navigate in it. In this module, you also learn about the parts of Process Manager, what they do, and how to navigate among them.
  • Workflow 7.0 - Creating a Simple Form Project
    In this module, you learn about the stages of a project, various types of projects, components, and the Debugger. You then combine this information to create a simple project and use the Debugger to test the project.
  • Workflow 7.0 - Using Demo Components to Start a Project
    In this module, you learn about the types of demo components that are available and how to import the demo component library into a project. Then you use demo components to begin building a Vacation Request project. In succeeding modules, you add functionality and to the Vacation Request project to produce a comprehensive process that can be used in your organization.
  • Workflow 7.0 - Building a Workflow Project
    In this module you are introduced to models. In the Vacation Request project, you add Embedded and Embedded Rule models and add a Dialog Workflow component. You then learn how to use the Debugger to test each model.
  • Workflow 7.0 - Creating an Audit Trail
    In this module you learn about setting up security in Process Manager. You also learn how to set up reporting in Workflow Designer, how to add reporting components to the Vacation Request project, and how to process a task in Process Manager.
  • Workflow 7.0 - Expanding a Project’s Functionality
    In this module you learn about variables, properties, and data types, and how to add these development items to the Vacation Request project. You also learn how to initialize data and how to use looping and branching. Finally, you learn how to view values in the Debugger.
  • Workflow 7.0 - Creating a Secondary Model
    In this module you learn the advantages Secondary models have in a project. Then you create a Secondary model for the Vacation Request project and populate the model with components.
  • Workflow 7.0 - Integration
    In this module you learn the types of integrations that can be created in Workflow Designer. You also learn how to create a multiple container integration. Then you build custom components and data types and add these elements to the Vacation Request project.
  • Workflow 7.0 - Mapping to Data Types
    In this module you learn about mapping and components used to map data. You then apply this knowledge to the Vacation Request project, mapping to data types and mapping the Secondary model to the Primary model.
  • Workflow 7.0 - Applying Advanced Customizations to Forms
    In this module you enhance the appearance and functionality of forms in the Vacation Request project. You learn how to create and apply themes; how to add and format labels, check boxes, and grids; and how to add images to create a polished form.