Symantec e-Campus for Technical Product Training is free for all!
Functional IT professionals value technical training. Whether you are new to the industry and looking to start from the basics, someone who has experience in a competing solution and switching to Symantec solution or someone trying to evaluate a solution that is best suited for company business needs, a technical architect is comfortable to make an informed decision if he/she can actually get technical information easily. He/she may not be interested in a sales pitch; the appetite there is really for the true technical capabilities and operations. Unlike some vendors in the market who hide even product documentation unless you have already bought the product, Symantec had always made it available online. There is nothing to hide from the public when most products are already leaders in the market. Now, Symantec is taking this approach to the next level. How about making some of the technical training online? Better yet, how about making it free for all? If you didn’t know about this yet, take a moment to visit Symantec e-Campus As we are in Netting out NetBackup blog, let me give you some samples of what is in store for NetBackup 7.6 ▪New in NBU 7.6: Intro to NBU 7.6 (1 of 30) ▪New in NBU 7.6: Virtualization: Accelerator for VMware (2 of 30) ▪New in NBU 7.6: Virtualization: Instant Recovery for VMware (3 of 30) ▪New in NBU 7.6: Virtualization: vCloud Director Integration (4 of 30) ▪New in NBU 7.6: Virtualization: NBU Plug-in for vCenter (5 of 30) ▪New in NBU 7.6: Virtualization: BMR Physical-to-Virtual Conversion (6 of 30) ▪New in NBU 7.6: Virtualization: Miscellaneous VMware-related Enhancements (7 of 30) ▪New in NBU 7.6: Virtualization: Support for Hyper-V 2012 (8 of 30) ▪New in NBU 7.6: Replication Director: RD for VMware (9 of 30) ▪New in NBU 7.6: Replication Director: RD for VMWare – MS-Exchange (10 of 30) ▪New in NBU 7.6: Replication Director: RD for VMWare – MS-SQL Server (11 of 30) ▪New in NBU 7.6: Replication Director: RD VSS Changes and SAN Support (12 of 30) ▪New in NBU 7.6: Replication Director: RD Support for Oracle (13 of 30) ▪New in NBU 7.6: Policies and SLPs: Oracle Policy Improvements (14 of 30) ▪New in NBU 7.6: Policies and SLPs: SLP Windows and Other Enhancements (15 of 30) ▪New in NBU 7.6: Policies and SLPs: SLP Parameters (16 of 30) ▪New in NBU 7.6: Policies and SLPs: Targeted Auto Image Replication (17 of 30) ▪New in NBU 7.6: OpsCenter: Improved User Experience (18 of 30) ▪New in NBU 7.6: OpsCenter: Embedded Authentication Broker (19 of 30) ▪New in NBU 7.6: OpsCenter: Integrated Active Director Groups (20 of 30) ▪New in NBU 7.6: OpsCenter: Enhanced NBU and Appliance Awareness (21 of 30) ▪New in NBU 7.6: Deduplication: Media Server Deduplication Enhancements (22 of 30) ▪New in NBU 7.6: Supportability: Logging Assistant and Support Utility Enhancements (23 of 30) ▪New in NBU 7.6: Miscellaneous: Legal Search and Hold Enhancements (24 of 30) ▪New in NBU 7.6: Miscellaneous: NBU Catalog Improvements (25 of 30) ▪New in NBU 7.6: Miscellaneous: NDMP Wildcard Support (26 of 30) ▪New in NBU 7.6: Miscellaneous: Client-Direct Restores (27 of 30) ▪New in NBU 7.6: Platforms: MS-SQL 2012 Server Support (28 of 30) ▪New in NBU 7.6: Platforms: Windows 8 and Windows 2012 Server Support (29 of 30) ▪New in NBU 7.6: Platforms: Solaris 11 Support Enhancements (30 of 30) ▪Upgrading to NBU 7.6: Upgrading to NBU 7.6 – an Introduction (1 of 4) ▪Upgrading to NBU 7.6: Upgrading to NBU 7.6 (2 of 4) ▪Upgrading to NBU 7.6: Upgrading OpsCenter (3 of 4) ▪Upgrading to NBU 7.6: Upgrading NBU Search (4 of 4) Also there are blue prints available to assist you with everyday tasks ▪NBU 7.6 Blueprint for VMware (Job Aid in PDF format) ▪NBU 7.6 Blueprint for Accelerator for VMware (Job Aid in PDF format) ▪NBU 7.6 Blueprint for VMware Instant Recovery (IRV) (Job Aid in PDF format) ▪NBU 7.6 Blueprint for Accelerator (Job Aid in PDF format) ▪NBU 7.6 Blueprint for AIR (Job Aid in PDF format) ▪NBU 7.6 Blueprint for Hyper-V (Job Aid in PDF format) ▪NBU 7.6 Blueprint for Decommissioning NetBackup Appliance (Job Aid in PDF format) ▪NBU 7.6 Blueprint for Oracle (Job Aid in PDF format) ▪NBU 7.6 Blueprint for Replication Director (Job Aid in PDF format) ▪NBU 7.6 Blueprint for Exchange (Job Aid in PDF format) ▪NBU 7.6 Blueprint for SharePoint (Job Aid in PDF format) ▪NBU 7.6 Blueprint for SQL (Job Aid in PDF format) ▪NBU 7.6 Blueprint for configuring Appliance (Job Aid in PDF format) ▪NBU 7.6 Blueprint for SAN Client (Job Aid in PDF format) Enjoy! Don’t forget, the eCampus have training for many Symantec products and solutions.972Views4likes4CommentsProtect Dedupe device against failure and recover it Easy if it fails.
We Often Loose Data. If we, there is a failure and the recovery of the dedupe becomes tedious. To protect and recover dedupe in case of failure, below information would be helpfull Protecting Dedupe: 1. Dedupe device Can be backed up as it is Using backup exec Using the Shadow Copy ComponentsUpgrading? Get trained on the latest version of Veritas Cluster Server 5.1.
Upgrading? Get trained on the latest version of Veritas Cluster Server 5.1 to help speed up your implementation. This hands-on class covers how to install, configure and use Veritas Cluster Server to manage applications in a high availability environment. After gaining the fundamental skills that are needed to manage a highly available application in a cluster, you will223Views0likes0CommentsFile System Archiving: Instructor led training now available
We have had a hole in our Enterprise Vault training catalogue to date by not having a dedicated File System Archiving course. FSA is touched on in the standard Exchange course but it does not give you the knowledge you need to know to install, configure, manage and troubleshoot.552Views2likes4CommentsRecent Hydraq cyberattack - What you need to know
A zero-day vulnerability recently identified in Microsoft Internet Explorer was used as an entry point for a coordinated set of cyber attacks that has been carried out on dozens of large enterprises. Please be advised that Symantec is working to keep our partners and customers informed of these cyberattacks known as Hydraq (also known as Aurora, Google Attacks, and the Microsoft IE Vulnerability (advisory number 979352)). The malware behind most of these attacks, "Trojan.Hydraq" appears to have been part of a sophisticated attack pattern designed to steal large amounts of intellectual property. Your customers may have become aware of this event from the heavy media coverage about the attacks on Google. The underlying vulnerabilities used in this attack are now widely known and likely to be exploited by other cybercriminals even though the Command and Control infrastructure behind this coordinated attack has been taken down. It is important that all computer users take action to prevent themselves from future attacks. Symantec partners and their customers with current antivirus definitions and IPS signatures are already protected. Symantec partners are encouraged to visit our Hydraq Threat Outbreak page <http://www.symantec.com/outbreak/index.jsp?id=trojan-hydraq&tabId=3> and the Symantec Security Response blog <http://www.symantec.com/business/security_response/weblog/index.jsp> . These are the best resources for you and your customers. Security Blog: The Trojan.Hydraq Incident <http://www.symantec.com/connect/blogs/trojanhydraq-incident> Security Blog: Protect Yourself Against Exploit Targeting New IE Zero-Day Vulnerability <http://www.symantec.com/connect/blogs/protect-yourself-against-exploit-targeting-new-ie-zero-day-vulnerability> Security Response Report: Trojan.Hydraq <http://www.symantec.com/security_response/writeup.jsp?docid=2010-011114-1830-99&tabid=2> To stay abreast of the latest security threats and receive timely information on risks, vulnerabilities and virus definitions, we encourage our partners to follow the Symantec Channel account on Twitter <http://www.twitter.com/symantecchannel> , as well as sign up for threat alerts via RSS feeds <https://partnernet.symantec.com/Partnercontent/News/ThreatAlerts.jsp> . We encourage you to reach out to your customers and reassure them that these threats are currently under control and continue to monitor the Hydraq Threat Outbreak page <http://www.symantec.com/outbreak/index.jsp?id=trojan-hydraq&tabId=3> for the latest information. FAQ’s Q. Are Symantec customers protected? A. Symantec customers with current antivirus definitions and IPS signatures are already protected against attacks that leverage this vulnerability. In particular, Symantec endpoint products provide the following protection: IPS Protection: For the Client Intrusion Prevention System (IPS) capability within Symantec Endpoint Protection and Symantec Client Security, Symantec has released the following signatures: · To block the IE zero-day exploit HTTP MSIE Memory Corruption Code Exec (23599) <http://www.symantec.com/business/security_response/attacksignatures/detail.jsp?asid=23599> – January 16, 2010 · To block the Adobe Acrobat, Reader and Flash vulnerability HTTP Acrobat PDF Suspicious File Download 4 <http://www.symantec.com/business/security_response/attacksignatures/detail.jsp?asid=23412> - July 17, 2009 Antivirus Protection: For all in-field antivirus products, Symantec has released or updated the following AV signatures associated with the malware known to have played a role in this attack: · Trojan.Pidief.G <http://www.symantec.com/security_response/writeup.jsp?docid=2009-072209-2512-99> - July 2, 2009 Trojan Horse <http://www.symantec.com/security_response/writeup.jsp?docid=2004-021914-2822-99> - July 13, 2009 Bloodhound.Exploit.266 <http://www.symantec.com/security_response/writeup.jsp?docid=2009-080301-5619-99> - August 2, 2009 Trojan Horse <http://www.symantec.com/security_response/writeup.jsp?docid=2004-021914-2822-99> - July 13, 2009 Trojan.Hydraq <http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-011114-1830-99> - January 11, 2010 Trojan.Hydraq!gen1 <http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-011411-3125-99> - January 14, 2010 Q. Are customers who use Internet Explorer 6 still vulnerable? A. Our data shows that many corporate customers are still using versions of IE 6. Customers who are still using IE6 are vulnerable to the newly disclosed Microsoft IE vulnerability and will continue to be vulnerable until they take the following actions: · Follow the Microsoft recommended actions to increase their security posture · Patch their IE with the soon-to-be released patch from Microsoft (Microsoft announced it will release an out-of-band patch on Jan. 21) · Have an IPS deployed and active in their environment Q. Why is using an Intrusion Prevention System (IPS) important? A. If your customer is not using a Symantec IPS product, they may continue to be vulnerable to the IE exploit unless they have taken explicit remedial measures as recommended by Microsoft. Although they will have antivirus protection against the known pieces of malware in this attack, they are likely still vulnerably to future attacks. This should be an opportunity to explain to your customer the value of having a Symantec IPS product deployed on their endpoint machines. An IPS will protect them against all future attempts to exploit the known vulnerabilities. Q. Which other Symantec products are relevant in the defense against these targeted attacks? · Symantec Protection Suite · Symantec Security Information Manager · DeepSight Early Warning Services · Symantec Managed Security Services · Symantec Critical Systems Protection · Altiris Total Management Suite · Symantec Hosted Services · Symantec Data Loss Prevention For more information on these products and how they protect customers, please visit the Hydraq Threat Outbreak page <http://www.symantec.com/outbreak/index.jsp?id=trojan-hydraq&tabId=3> . Q. My customer wants a lot more information about this. What do I do? A. We are producing collateral and events for detailed briefings on these matters. We will soon deliver a PowerPoint presentation deck for one-on-one overviews with affected and/or vulnerable enterprises. Also, we are planning a larger event around Hydraq to give customers focused attention on this critical matter. Please stay tuned. Q. My customer believes they have been targeted as part of this attack. What do I do? As you would with any other incident or outbreak at a customer, please engage Symantec Support to help any customers who have been impacte519Views0likes0Comments