Global support purchased on a regional business hours or 24 hours a day, 7days a week basis
Upgrade assurance that delivers software upgrades Telephone and/or Web-based support that provides rapid response andup-to-the-minute information Symantecs support offerings include the following:Ī range of support options that give you the flexibility to select the rightamount of service for any size organization For example, theTechnical Support groupworkswithProductEngineeringand Symantec Security Response to provide alerting services and virus definitionupdates. The Technical Support group works collaboratively with theother functional areas within Symantec to answer your questions in a timelyfashion. TheTechnical Support group also creates content for our onlineKnowledge Base. TechnicalSupports primary role is to respond to specific queries about product featuresand functionality. Technical SupportSymantec Technical Support maintains support centers globally. Symantec Corporation350 Ellis StreetMountain View, CA 94043 Any use, modification, reproduction release,performance, display or disclosure of the Licensed Software andDocumentation by theU.S.Government shall be solely in accordance with the terms of this Agreement.
The Licensed Software andDocumentation are deemed to be commercial computer softwareas defined in FAR12.212 and subject to restricted rights as defined in FARSection 52.227-19"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights inCommercial Computer Software or Commercial Computer Software Documentation", asapplicable, and any successor regulations. THE INFORMATION CONTAINEDIN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. THEDOCUMENTATIONISPROVIDED"ASIS"ANDALLEXPRESSORIMPLIEDCONDITIONS,REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OFMERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TOBELEGALLYINVALID.SYMANTECCORPORATIONSHALLNOTBELIABLEFORINCIDENTALOR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,PERFORMANCE, OR USE OF THIS DOCUMENTATION. No part of this documentmay be reproduced in any form by any means without prior written authorization ofSymantec Corporation and its licensors, if any. The product described in this document is distributed under licenses restricting its use,copying, distribution, and decompilation/reverse engineering. Please see theThird Party LegalNoticeAppendixto this Documentation or TPIP ReadMe File accompanying this Symantec product for moreinformation on the Third Party Programs.
The LicenseAgreementaccompanying the Software does not alter any rights or obligations you may have underthose open source or free software licenses. Some of the Third PartyPrograms are available under open source or free software licenses. This Symantec product may contain third party software for which Symantec is requiredto provide attribution to the third party (Third Party Programs).
Other names may betrademarks of their respective owners. Symantec, the Symantec Logo, Bloodhound, Confidence Online, Digital Immune System,LiveUpdate, Norton, Sygate, and TruScan are trademarks or registered trademarks ofSymantec Corporation or its affiliates in the U.S.
Legal NoticeCopyright 2012 Symantec Corporation.
The software described in this book is furnished under a license agreement andmay be usedonly in accordance with the terms of the agreement. Symantec Endpoint Protection Manager DatabaseSchema Reference Symantec EndpointProtection ManagerDatabase Schema Referenceįor Symantec Endpoint Protection andSymantec Network Access Control