cancel
Showing results for 
Search instead for 
Did you mean: 
Articles
Insights Knowledge Base Articles
cancel
Showing results for 
Search instead for 
Did you mean: 

Knowledge Base Articles

The Case for Large Mailboxes

Many organisations for years and years have been promised infinite mailboxes. These are mailboxes with no predefined limits; mailboxes can grow and grow and grow "forever".  Of course, sensible IT teams have always put in place some kind of limit, e...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1518 Views
  • 0 comments
  • 1 kudos

New Feature Briefing for Symantec eDiscovery Platform 7.1.5

All, I'm pleased to announce a new Feature Briefing for the Symantec eDiscovery Platform 7.1.5 which is due to be released shortly. Many customers leverage Microsoft Rights Management Services (RMS) to encrypt emails and files to ensure secure commun...

Liam_Finn1 by Level 6
Employee Accredited Certified
  • 420 Views
  • 0 comments
  • 0 kudos

Symantec Enterprise Vault View Only Administration

Merhaba Kurumsal firmalarda kullanılan ürünler( SCVMM, SCOM, SCCM, Exchange Server, Enterprise Vault, SIEM ürünleri vs.) test ortamından üretim ortamına alınacağında “Role Based Access” gündeme gelir. Uygulamalar kurulurken ve yapılandırılırken kulla...

Baris_A by Level 4
Partner
  • 609 Views
  • 2 comments
  • 0 kudos

Email Journaling vs. Email Mailbox Collection

Email Journaling vs. Email Mailbox Collection Many questions have appeared over the last few months regarding the differences between Mailbox collection and Journaling.. So What are the differences and how can we use them in our presentations?   We s...

Darryl_R by Level 3
Employee Accredited
  • 1801 Views
  • 0 comments
  • 4 kudos

Corporate Regulation and Email Retention

Corporate Regulation and Email Retention   I was reading a document (http://www.umiacs.umd.edu/~oard/teaching/708x/spring09/t1.pdf) That can really assist in our infinite quest for knowledge about “How Long Email Should Be Saved?” This document ...

Darryl_R by Level 3
Employee Accredited
  • 1135 Views
  • 2 comments
  • 6 kudos

Symantec eDIscovery Platform - Security Outline

All,   I'm pleased to announce a new Symantec eDiscovery Platform Security outline paper that is designed to be viewed by any corporate Security Officer who needs to understand the security apstect of the product.   I hope you find this usefull and i...

Liam_Finn1 by Level 6
Employee Accredited Certified
  • 749 Views
  • 1 comments
  • 1 kudos

Scheduling everything with Enterprise Vault and Mailbox Archiving

One of the challenges that Enterprise Vault Administrators have in their environment is trying to schedule everything that takes place or needs to take place with Enterprise Vault and it's associated touch points on things like Exchange, Active Direc...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1637 Views
  • 0 comments
  • 0 kudos

Replicating Enterprise Vault Data

There are a few products on the market that deal with software based replication of data, ones that spring to mind are: DoubletakeNetApp SnapMirror There is at least one other, as we'll see.  In this article though I want to step back a little bit an...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1639 Views
  • 0 comments
  • 1 kudos

Spreading the load of Enterprise Vault

There are many different ways to load balance Enterprise Vault as the usage of it grows, and the amount of data it starts to accumulate also grows. In this article I will present to you several different ways that this can be achieved. Remember that ...

MichelZ by Level 6
Partner Accredited Certified
  • 670 Views
  • 0 comments
  • 3 kudos

Agent versus Agent-Less PST Migrations

One of the topics that is often discussed in relation to PST migration is whether it is better to have an agent or agent-less technology to assist with the migration. In this article I'll describe some of the ways in which you can decide which is bes...

MichelZ by Level 6
Partner Accredited Certified
  • 656 Views
  • 0 comments
  • 1 kudos

Planning an Archive Migration - User Selection

When you are involved in a PST Migration or an Archive migration one of the  most tricky things to produce is a plan of which users to migrate and when to perform the migration for those user-groups. There are many different variables that should be ...

MichelZ by Level 6
Partner Accredited Certified
  • 536 Views
  • 0 comments
  • 1 kudos

How to plan an archive migration - smoothing the rough edges

In this article I would like to share some tips with you about how to plan for an archive migration. This could be a migration from PST into Enterprise Vault or Exchange, it could be archives from Enterprise Vault to a new Enterprise Vault system or ...

MichelZ by Level 6
Partner Accredited Certified
  • 517 Views
  • 0 comments
  • 0 kudos

How to secure Enterprise Vault

In this article I will describe some of the general principles that you might employ when it comes to securing an Enterprise Vault environment. I personally don't think it's necessary to do everything in this article, it is more to give you an idea o...

MichelZ by Level 6
Partner Accredited Certified
  • 948 Views
  • 0 comments
  • 1 kudos

How to monitor Enterprise Vault

There are many different helpful articles and documents on the Symantec web site and some in the documentation which talk about how to monitor Enterprise Vault. In this article though, I'd like to present a different approach. I'd like to talk about ...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1914 Views
  • 0 comments
  • 3 kudos

Searching for information in an archive, the fast way

In this article I'd like to present to you what I think is the ultimate fastest way to find any email. Of course it's not quite as empirical as the title sounds, because I'm referring solely to email, in mailboxes, that comes under the umbrella of ar...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1004 Views
  • 0 comments
  • 1 kudos

5 reasons to eliminate PST files

In this article I'll give you five reasons you should eliminate PST files from your environment. These aren't the only five, and some might not be applicable to your usage of PST files. However the list should stir the murky waters of your mind and g...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1945 Views
  • 3 comments
  • 2 kudos