cancel
Showing results for 
Search instead for 
Did you mean: 
Articles
Insights Knowledge Base Articles
cancel
Showing results for 
Search instead for 
Did you mean: 

Knowledge Base Articles

Symantec Enterprise Vault View Only Administration

Merhaba Kurumsal firmalarda kullanılan ürünler( SCVMM, SCOM, SCCM, Exchange Server, Enterprise Vault, SIEM ürünleri vs.) test ortamından üretim ortamına alınacağında “Role Based Access” gündeme gelir. Uygulamalar kurulurken ve yapılandırılırken kulla...

Baris_A by Level 4
Partner
  • 609 Views
  • 2 comments
  • 0 kudos

Email Journaling vs. Email Mailbox Collection

Email Journaling vs. Email Mailbox Collection Many questions have appeared over the last few months regarding the differences between Mailbox collection and Journaling.. So What are the differences and how can we use them in our presentations?   We s...

Darryl_R by Level 3
Employee Accredited
  • 1801 Views
  • 0 comments
  • 4 kudos

Corporate Regulation and Email Retention

Corporate Regulation and Email Retention   I was reading a document (http://www.umiacs.umd.edu/~oard/teaching/708x/spring09/t1.pdf) That can really assist in our infinite quest for knowledge about “How Long Email Should Be Saved?” This document ...

Darryl_R by Level 3
Employee Accredited
  • 1135 Views
  • 2 comments
  • 6 kudos

Scheduling everything with Enterprise Vault and Mailbox Archiving

One of the challenges that Enterprise Vault Administrators have in their environment is trying to schedule everything that takes place or needs to take place with Enterprise Vault and it's associated touch points on things like Exchange, Active Direc...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1637 Views
  • 0 comments
  • 0 kudos

Replicating Enterprise Vault Data

There are a few products on the market that deal with software based replication of data, ones that spring to mind are: DoubletakeNetApp SnapMirror There is at least one other, as we'll see.  In this article though I want to step back a little bit an...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1639 Views
  • 0 comments
  • 1 kudos

Spreading the load of Enterprise Vault

There are many different ways to load balance Enterprise Vault as the usage of it grows, and the amount of data it starts to accumulate also grows. In this article I will present to you several different ways that this can be achieved. Remember that ...

MichelZ by Level 6
Partner Accredited Certified
  • 670 Views
  • 0 comments
  • 3 kudos

Agent versus Agent-Less PST Migrations

One of the topics that is often discussed in relation to PST migration is whether it is better to have an agent or agent-less technology to assist with the migration. In this article I'll describe some of the ways in which you can decide which is bes...

MichelZ by Level 6
Partner Accredited Certified
  • 656 Views
  • 0 comments
  • 1 kudos

Planning an Archive Migration - User Selection

When you are involved in a PST Migration or an Archive migration one of the  most tricky things to produce is a plan of which users to migrate and when to perform the migration for those user-groups. There are many different variables that should be ...

MichelZ by Level 6
Partner Accredited Certified
  • 536 Views
  • 0 comments
  • 1 kudos

How to plan an archive migration - smoothing the rough edges

In this article I would like to share some tips with you about how to plan for an archive migration. This could be a migration from PST into Enterprise Vault or Exchange, it could be archives from Enterprise Vault to a new Enterprise Vault system or ...

MichelZ by Level 6
Partner Accredited Certified
  • 517 Views
  • 0 comments
  • 0 kudos

How to secure Enterprise Vault

In this article I will describe some of the general principles that you might employ when it comes to securing an Enterprise Vault environment. I personally don't think it's necessary to do everything in this article, it is more to give you an idea o...

MichelZ by Level 6
Partner Accredited Certified
  • 948 Views
  • 0 comments
  • 1 kudos

How to monitor Enterprise Vault

There are many different helpful articles and documents on the Symantec web site and some in the documentation which talk about how to monitor Enterprise Vault. In this article though, I'd like to present a different approach. I'd like to talk about ...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1914 Views
  • 0 comments
  • 3 kudos

Searching for information in an archive, the fast way

In this article I'd like to present to you what I think is the ultimate fastest way to find any email. Of course it's not quite as empirical as the title sounds, because I'm referring solely to email, in mailboxes, that comes under the umbrella of ar...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1004 Views
  • 0 comments
  • 1 kudos

5 reasons to eliminate PST files

In this article I'll give you five reasons you should eliminate PST files from your environment. These aren't the only five, and some might not be applicable to your usage of PST files. However the list should stir the murky waters of your mind and g...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1944 Views
  • 3 comments
  • 2 kudos

Locating PST files everywhere

Something that comes up in every PST Migration is the issue of ensuring that PST files are located everywhere that users might be using them. In this article I'll describe some different techniques which can be used to find PST files across the whole...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1215 Views
  • 2 comments
  • 5 kudos

Planning PST Migration - Getting User Buy-in

One of the most important aspects of changing things for end-users of technology in a corporate environment is involving users in the process.  In this article I'll explore some of the ways that users can be involved in a PST Migration, not that you ...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 485 Views
  • 0 comments
  • 1 kudos

Two Ways to Deduplicate PST Data for Enterprise Vault

When you're doing a PST migration one of the things that you must take in to consideration is the duplication of data.  A large percentage of users are likely to have copies of PST files with just small deltas between them. For example let's say we ...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1198 Views
  • 0 comments
  • 2 kudos

Archiving Terminated Users and Automation

Something so simple like employees leaving a company can sometimes cause nightmarish problems with software like EnterpriseVault. In fact it isn't just Enterprise Vault, it is many business related pieces of software, and it is the whole decommission...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 719 Views
  • 0 comments
  • 1 kudos

Sizing your PST Migration

Being involved in a PST Migration is something that messaging administrators are getting involved in more and more often. The migration is not always to Enterprise Vault, but there is always a seemingly endless list of things that need to be consider...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 535 Views
  • 0 comments
  • 1 kudos

Rebalancing mailbox archives with Archive Shuttle

Once an organisation has been using Enterprise Vault for several years there might come a time through company acquisitions or general growth that the current Enterprise Vault environment needs to be expanded outwards.  The Enterprise Vault organisat...

MichelZ by Level 6
Partner Accredited Certified
  • 443 Views
  • 0 comments
  • 0 kudos

Can you go entirely iPad and use Enterprise Vault?

There has been a surge or interest in the last few years to utilise tablet based or even just small form factor computers or devices. It started back when Netbooks became popular, but exploded in to the mainstream with the Apple iPad. In the last few...

MichelZ by Level 6
Partner Accredited Certified
  • 1424 Views
  • 0 comments
  • 1 kudos