cancel
Showing results for 
Search instead for 
Did you mean: 
Articles
Insights Knowledge Base Articles
cancel
Showing results for 
Search instead for 
Did you mean: 

Knowledge Base Articles

The Case for Large Mailboxes

Many organisations for years and years have been promised infinite mailboxes. These are mailboxes with no predefined limits; mailboxes can grow and grow and grow "forever".  Of course, sensible IT teams have always put in place some kind of limit, e...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1511 Views
  • 0 comments
  • 1 kudos

Symantec Enterprise Vault View Only Administration

Merhaba Kurumsal firmalarda kullanılan ürünler( SCVMM, SCOM, SCCM, Exchange Server, Enterprise Vault, SIEM ürünleri vs.) test ortamından üretim ortamına alınacağında “Role Based Access” gündeme gelir. Uygulamalar kurulurken ve yapılandırılırken kulla...

Baris_A by Level 4
Partner
  • 599 Views
  • 2 comments
  • 0 kudos

Email Journaling vs. Email Mailbox Collection

Email Journaling vs. Email Mailbox Collection Many questions have appeared over the last few months regarding the differences between Mailbox collection and Journaling.. So What are the differences and how can we use them in our presentations?   We s...

Darryl_R by Level 3
Employee Accredited
  • 1792 Views
  • 0 comments
  • 4 kudos

Corporate Regulation and Email Retention

Corporate Regulation and Email Retention   I was reading a document (http://www.umiacs.umd.edu/~oard/teaching/708x/spring09/t1.pdf) That can really assist in our infinite quest for knowledge about “How Long Email Should Be Saved?” This document ...

Darryl_R by Level 3
Employee Accredited
  • 1107 Views
  • 2 comments
  • 6 kudos

Scheduling everything with Enterprise Vault and Mailbox Archiving

One of the challenges that Enterprise Vault Administrators have in their environment is trying to schedule everything that takes place or needs to take place with Enterprise Vault and it's associated touch points on things like Exchange, Active Direc...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1624 Views
  • 0 comments
  • 0 kudos

Replicating Enterprise Vault Data

There are a few products on the market that deal with software based replication of data, ones that spring to mind are: DoubletakeNetApp SnapMirror There is at least one other, as we'll see.  In this article though I want to step back a little bit an...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1632 Views
  • 0 comments
  • 1 kudos

Spreading the load of Enterprise Vault

There are many different ways to load balance Enterprise Vault as the usage of it grows, and the amount of data it starts to accumulate also grows. In this article I will present to you several different ways that this can be achieved. Remember that ...

MichelZ by Level 6
Partner Accredited Certified
  • 661 Views
  • 0 comments
  • 3 kudos

Agent versus Agent-Less PST Migrations

One of the topics that is often discussed in relation to PST migration is whether it is better to have an agent or agent-less technology to assist with the migration. In this article I'll describe some of the ways in which you can decide which is bes...

MichelZ by Level 6
Partner Accredited Certified
  • 651 Views
  • 0 comments
  • 1 kudos

Planning an Archive Migration - User Selection

When you are involved in a PST Migration or an Archive migration one of the  most tricky things to produce is a plan of which users to migrate and when to perform the migration for those user-groups. There are many different variables that should be ...

MichelZ by Level 6
Partner Accredited Certified
  • 525 Views
  • 0 comments
  • 1 kudos

How to plan an archive migration - smoothing the rough edges

In this article I would like to share some tips with you about how to plan for an archive migration. This could be a migration from PST into Enterprise Vault or Exchange, it could be archives from Enterprise Vault to a new Enterprise Vault system or ...

MichelZ by Level 6
Partner Accredited Certified
  • 513 Views
  • 0 comments
  • 0 kudos

How to secure Enterprise Vault

In this article I will describe some of the general principles that you might employ when it comes to securing an Enterprise Vault environment. I personally don't think it's necessary to do everything in this article, it is more to give you an idea o...

MichelZ by Level 6
Partner Accredited Certified
  • 938 Views
  • 0 comments
  • 1 kudos

How to monitor Enterprise Vault

There are many different helpful articles and documents on the Symantec web site and some in the documentation which talk about how to monitor Enterprise Vault. In this article though, I'd like to present a different approach. I'd like to talk about ...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1903 Views
  • 0 comments
  • 3 kudos

Searching for information in an archive, the fast way

In this article I'd like to present to you what I think is the ultimate fastest way to find any email. Of course it's not quite as empirical as the title sounds, because I'm referring solely to email, in mailboxes, that comes under the umbrella of ar...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 996 Views
  • 0 comments
  • 1 kudos

Locating PST files everywhere

Something that comes up in every PST Migration is the issue of ensuring that PST files are located everywhere that users might be using them. In this article I'll describe some different techniques which can be used to find PST files across the whole...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1200 Views
  • 2 comments
  • 5 kudos

Planning PST Migration - Getting User Buy-in

One of the most important aspects of changing things for end-users of technology in a corporate environment is involving users in the process.  In this article I'll explore some of the ways that users can be involved in a PST Migration, not that you ...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 479 Views
  • 0 comments
  • 1 kudos

Two Ways to Deduplicate PST Data for Enterprise Vault

When you're doing a PST migration one of the things that you must take in to consideration is the duplication of data.  A large percentage of users are likely to have copies of PST files with just small deltas between them. For example let's say we ...

Wayne_Humphrey by Level 6
Partner Accredited Certified
  • 1191 Views
  • 0 comments
  • 2 kudos