{"id":1739,"date":"2014-03-30T22:07:13","date_gmt":"2014-03-30T13:07:13","guid":{"rendered":"https:\/\/www.xenos.jp\/~zen\/blog2\/?p=1739"},"modified":"2019-02-17T22:12:22","modified_gmt":"2019-02-17T13:12:22","slug":"post-1739","status":"publish","type":"post","link":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/2014\/03\/30\/post-1739\/","title":{"rendered":"Symantec Endpoint Security\u30b5\u30fc\u30d0\u306e\u7a7a\u304d\u5bb9\u91cf\u304c\u5c11\u306a\u304f\u306a\u308b\u554f\u984c"},"content":{"rendered":"\n<p>Symantec Endpoint Security\u306e\u30b5\u30fc\u30d0\u304b\u3089\u3001\u7a81\u7136\u300c\u30b5\u30fc\u30d0\u5065\u5168\u6027\u8b66\u544a\u300d\u306a\u308b\u30e1\u30fc\u30eb\u304c\u9001\u3089\u308c\u3066\u304d\u305f\u3002\u4e2d\u8eab\u3092\u898b\u3066\u307f\u308b\u3068\u3001\u30b5\u30fc\u30d0\u306e\u7a7a\u304d\u5bb9\u91cf\u304c\u4e0d\u8db3\u3057\u3066\u3044\u308b\u3068\u306e\u3053\u3068\u3002<\/p>\n\n\n\n<p>\u25a0\u30e1\u30fc\u30eb\u306e\u4e2d\u8eab\u3088\u308a\u629c\u7c8b<\/p>\n\n\n\n<pre>\n \u30b5\u30fc\u30d0\u30fc (\u30db\u30b9\u30c8\u540d) \u5065\u5168\u6027\u306e\u72b6\u614b: \u4e0d\u826f\u3002 \n \u7406\u7531: Symantec Endpoint Protection \u30b5\u30fc\u30d0\u30fc\u306e\u5bb9\u91cf\u304c\u4e0d\u8db3\u3057\u3066\u3044\u307e\u3059\u3002\n \u72b6\u614b\u306e\u5831\u544a\u65e5\u306f 2014\/XX\/XX HH:MM:SS\u3002\n<\/pre>\n\n\n\n<p>\u30a6\u30a3\u30eb\u30b9\u30c1\u30a7\u30c3\u30af\u306e\u30db\u30b9\u30c8\u30b5\u30fc\u30d0\u3067\u5bb9\u91cf\u4e0d\u8db3\u304c\u305d\u3093\u306a\u306b\u7c21\u5358\u306b\u8d77\u304d\u308b\u306f\u305a\u3082\u306a\u3044\u306e\u3067\u3001\u3068\u308a\u3042\u3048\u305a\u3001\u3069\u306e\u30d5\u30a9\u30eb\u30c0\u304cHDD\u3092\u5927\u91cf\u6d88\u8cbb\u3057\u3066\u3044\u308b\u306e\u304b\u8abf\u3079\u3066\u307f\u305f\u3002\u30d5\u30a9\u30eb\u30c0\u3092\u8abf\u3079\u305f\u3068\u3053\u308d\u3001\u3044\u3089\u306a\u305d\u3046\u3067\u5927\u91cf\u306b\u6d88\u8cbb\u3057\u3066\u3044\u305f\u306e\u306f\u4e0b\u8a18\u306e\u30d5\u30a9\u30eb\u30c0\u3002<\/p>\n\n\n\n<pre>\nC:\\Program Files\\Symantec\\Symantec Endpoint Protection Manager\\data\\outbox\\Importpackge\n<\/pre>\n\n\n\n<p>\u3053\u306e\u30d5\u30a9\u30eb\u30c0\u3060\u3051\u306710GB\u7a0b\u5ea6\u3092\u6d88\u8cbb\u3057\u3066\u3044\u305f\u3002\u3053\u306e\u30d5\u30a9\u30eb\u30c0\u306b\u3064\u3044\u3066\u8abf\u3079\u305f\u3068\u3053\u308d\u3001Symantec\u306e\u30d0\u30fc\u30b8\u30e7\u30f311.x \u304b\u3089 12.x \u3078\u306e\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9\u306b\u5207\u308a\u6368\u3066\u3089\u308c\u305f\u30d5\u30a1\u30a4\u30eb\u3067\u3042\u308b\u3068\u306e\u3053\u3068\u3002\u3064\u307e\u308a\u3001\u3044\u3089\u306a\u3044\u30d5\u30a1\u30a4\u30eb\u306a\u306e\u3067\u3001\u524a\u9664\u3057\u3066\u3082\u3044\u3044\u3068\u3044\u3046\u3053\u3068\u3002Symantec\u306e\u30da\u30fc\u30b8\u3067\u898b\u3064\u3051\u305f\u51e6\u7406\u306b\u5f93\u3044\u3001\u524a\u9664\u3067\u3068\u308a\u3042\u3048\u305a\u7a7a\u304d\u5bb9\u91cf\u306f\u78ba\u4fdd\u3002<\/p>\n\n\n\n<p>\u25a0\u624b\u9806\uff08\u305d\u306e\u307e\u3093\u307e\u6a5f\u68b0\u7ffb\u8a33\u3057\u3066\u307f\u305f\uff09<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u306e\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u3092\u53d6\u308b\u304b\u300112.1\u306e\u305f\u3081\u306e\u30c7\u30a3\u30b6\u30b9\u30bf\u30ea\u30ab\u30d0\u30ea\u624b\u9806\u306b\u5f93\u3063\u3066\u304f\u3060\u3055\u3044\u3002<\/li><li>\u30b7\u30de\u30f3\u30c6\u30c3\u30af\u7d44\u8fbc\u307f\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3068services.msc\u3068\u304b\u3089Symantec Endpoint Protection Manager\u306e\u30b5\u30fc\u30d3\u30b9\u3092\u505c\u6b62\u3057\u307e\u3059\u3002<\/li><li>C:\\Program Files\\Symantec\\Symantec Endpoint Protection Manager\\data\\outbox\\ImportPackage \u306b\u79fb\u52d5\u3057\u307e\u3059\u3002<\/li><li>\u30a4\u30f3\u30dd\u30fc\u30c8\u30d1\u30c3\u30b1\u30fc\u30b8\u304b\u3089\u30d5\u30a1\u30a4\u30eb\u3092\u524a\u9664\u3057\u3001\u305d\u308c\u3092\u76e3\u8996\u3057\u307e\u3059\u3002<\/li><\/ol>\n\n\n\n<p>\u306a\u304a\u3001HDD\u306e\u7a7a\u304d\u5bb9\u91cf\u304c\u306a\u304f\u306a\u308b\u3068\u3001Symantec\u306e\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u304c\u6b62\u307e\u3063\u3066\u3057\u307e\u3046\uff08\u4f11\u6b62\u4e2d\uff09\u3068\u306e\u3053\u3068\u3002\u6b63\u5e38\u306b\u4f7f\u3046\u305f\u3081\u306b\u3082\u3001\u7a7a\u304d\u5bb9\u91cf\u306e\u78ba\u4fdd\u306f\u5fc5\u8981\u3002<\/p>\n\n\n\n<p>\u25a0\u53c2\u8003<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/www.symantec.com\/connect\/articles\/high-disk-space-being-consumed-cprogram-filessymantecsymantec-endpoint-protection-managerda\">http:\/\/www.symantec.com\/connect\/articles\/high-disk-space-being-consumed-cprogram-filessymantecsymantec-endpoint-protection-managerda<\/a><\/li><li><a href=\"http:\/\/blog.livedoor.jp\/stock_value\/archives\/51440596.html\">http:\/\/blog.livedoor.jp\/stock_value\/archives\/51440596.html<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Symantec Endpoint Security\u306e\u30b5\u30fc\u30d0\u304b\u3089\u3001\u7a81\u7136\u300c\u30b5\u30fc\u30d0\u5065\u5168\u6027\u8b66\u544a\u300d\u306a\u308b\u30e1\u30fc\u30eb\u304c\u9001\u3089\u308c\u3066\u304d\u305f\u3002\u4e2d\u8eab\u3092\u898b\u3066\u307f\u308b\u3068\u3001\u30b5\u30fc\u30d0\u306e\u7a7a\u304d\u5bb9\u91cf\u304c\u4e0d\u8db3\u3057\u3066\u3044\u308b\u3068\u306e\u3053\u3068\u3002 \u25a0\u30e1\u30fc\u30eb\u306e\u4e2d\u8eab\u3088\u308a\u629c\u7c8b \u30b5\u30fc\u30d0\u30fc (\u30db\u30b9\u30c8\u540d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1739","post","type-post","status-publish","format-standard","hentry","category-diary"],"_links":{"self":[{"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/posts\/1739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/comments?post=1739"}],"version-history":[{"count":1,"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/posts\/1739\/revisions"}],"predecessor-version":[{"id":1740,"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/posts\/1739\/revisions\/1740"}],"wp:attachment":[{"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/media?parent=1739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/categories?post=1739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.xenos.jp\/~zen\/blog2\/index.php\/wp-json\/wp\/v2\/tags?post=1739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}