430Protecting your media and data About backup set

w

w

4In the window that appears, click Reset Defaults.

5 Click Save.

Deleting previously backed up files

You can delete the files that you backed up previously from your backup location. You can also delete the files if the files are no longer useful for you and you have a limited space on your backup location. You can also delete backed up files if you changed the file category for a backup set. You may want to delete previously backed up files before you run a backup.

You can delete the previously backed up files from the following locations:

1Summary tab

1Where tab

When the backed up files are deleted, the backup details of the files that belong to the backup set that you delete also changes. For example, the icon overlays and the Backup tab in the file properties of the file no longer appear.

You cannot delete a backup set if only one backup set is available.

You can also uncheck the backup category if you no longer want to back up the files that you deleted.

Deleting previously backed up files is particularly helpful if you want to free some space on your Secure Online Storage.

To delete files from your online backup, you must configure the MeteredBroadbandMode option in the My Network window to No Limit. The My Network option is available in the Settings window.

To delete previously backed up files from the Summary tab

1In the Norton 360 main window, click Backup, and then click Manage Backup Sets.

Page 430
Image 430
Symantec 11022527 manual Deleting previously backed up files, Summary tab Where tab

11022527 specifications

Symantec 11022527 is a robust and versatile security solution designed to protect enterprises from a variety of cyber threats. As part of the broader Symantec Endpoint Protection (SEP) family, this product is engineered to deliver comprehensive security features tailored for organizations of all sizes.

One of the primary features of Symantec 11022527 is its advanced threat detection capabilities. Leveraging a combination of signature-based and behavior-based detection methods, the solution effectively identifies known and unknown threats, including malware, ransomware, and phishing attempts. This dual approach allows for enhanced protection in an ever-evolving threat landscape, ensuring that organizations can stay one step ahead of cybercriminals.

Another salient characteristic of Symantec 11022527 is its integrated firewall. The firewall functions to monitor incoming and outgoing network traffic, establishing a barrier between trusted internal networks and untrusted external networks. This is particularly crucial for preventing unauthorized access to sensitive corporate data, safeguarding intellectual property, and reducing the risk of data breaches.

In addition to these features, Symantec 11022527 incorporates machine learning and artificial intelligence technologies. These capabilities enable the solution to analyze vast amounts of data to identify anomalous behaviors and potential threats in real time. By automating the detection process, organizations can respond more rapidly to incidents, minimizing potential damage and downtime.

The solution also boasts a user-friendly management console, which streamlines deployment and management across multiple endpoints. This console allows administrators to push updates, manage security policies, and run reports with ease, promoting efficiency within IT teams. The centralized control helps ensure that security measures are consistently applied across the enterprise, thereby enhancing the overall security posture.

Moreover, Symantec 11022527 supports cloud-based deployment, which offers flexibility and scalability for businesses. This allows organizations to extend their security coverage without requiring extensive on-premises infrastructure, making it ideal for hybrid and remote work environments.

In summary, Symantec 11022527 stands out due to its advanced threat detection, integrated firewall, machine learning capabilities, user-friendly management console, and cloud-based deployment options. These features make it a powerful tool for organizations seeking to enhance their cybersecurity defenses and protect against the dynamic threats that characterize today’s digital landscape.