Create Remote IDM Using Copy of RDX Files
In some enterprise environment, the sensitive documents that needs to be protected by IDM, are locate in some kind of restricted area. The DLP Enforce cannot access these files logically/physically, or...
View ArticleHow Symantec Data Loss Prevention for Mobile works & How to Implement
Symantec Data Loss Prevention for Mobile connects to your corporate network through Wi-Fi access or through cellular 3G connectivity. Network traffic for Webmail, third-party applications such as...
View ArticleUsing Symantec Help (SymHelp) Tool, how do we Collect the Suspicious Files...
Hello,In case if you are running the Legacy SEP Support Tool, please follow the Instructions provided in the...
View ArticleUsing SymHelp, how do we collect the Load Point Analysis Logs and Submit the...
Hello,SymHelp is a cross-product diagnostic utility designed for troubleshooting and identifying common issues that customers encounter.SymHelp is designed to support the Symantec Endpoint Protection...
View ArticleSubmitting information about detections to Symantec Security Response
Submitting information about detections to Symantec Security Response We can configure your computer to automatically submit information about detections to Symantec Security Response for analysis....
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 4
This article is a continuation of my three previous articles:How to utilize SEP 12.1 for Incident Response - PART 1How to utilize SEP 12.1 for Incident Response - PART 2How to utilize SEP 12.1 for...
View ArticleFirst Response to: Cryptolocker \ Ransomcrypt\ Encryptor
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail...
View ArticleHow to find Suspected Threats on your computer.
There are two most powerful tools from Sysinternals that can help us lot in our search for suspected threats on our systems. 1. Autoruns for Windows 2. ProcexpAUTORUNS : You can download Autoruns for...
View ArticleWhat are the Symantec Endpoint Protection (SEP) versions released officially?
This document contains all the versions of SEP and SEPM (Symantec Endpoint Protection Manager) which were released since the first version of SEP in autumn 2007.It contains the Enterprise Editions (EE)...
View ArticleSymantec Insider Tip: Successful Submissions!
IntroductionThis is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleHow To Save Time Entering Multiple Explicit Group Update Providers (GUPs)
This is the standard interface to enter Explicit Group Update Providers in SEP 12.2.x: This interface is servicable enough with a small number of entries, but when you are entering in hundreds of...
View ArticleSEP Firewall "Did You Know...?" - How To Monitor Web Traffic
Did you know that it IS possible to monitor web traffic using the SEP firewall? In this article, I will show you how to monitor web traffic using the SEP firewall.Before we get started there are a...
View ArticleHow to manage SEPM 12.1 database.
Hi,Backing up the embedded database: On-demandHere we can see how we can back up the database on demand. From the Admin page we've got the Back Up Database Now option and from the Start Menu > SEPM...
View ArticleThe Day After: Necessary Steps after a Virus Outbreak
IntroductionThis is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleDLP Agent in a Failover Environment
DLP Agent supports to be installed in a Failover environment. Think about two endpoint servers, the first one is the Primary Endpoint Server and the other one is the Secondary Endpoint Server. The DLP...
View ArticleSymantec DLP- Policy- A Note for Beginners
At the core of Symantec DLP, lies the policy of it, which determines the successful or not so successful implementation of Symantec DLP at organizations. Since DLP is not the perimeter security or the...
View ArticleWhitepaper-Virtual Desktop Infrastructure for Citrix SEP
Hello Everyone,This whitepaper focuses strictly on providing guidance on how to successfully deploy the Symantec Endpoint Protection 12.1 protection stack components to a Citrix VDI Environment. This...
View ArticleSymantec Endpoint Protection Small Business Edition 12.0 Frequently Asked...
Symantec Endpoint Protection Small Business Edition 12.0 Frequently Asked Questions What are the new features in Symantec Endpoint Protection Small Business Edition 12.0 ? Uses Apache as the...
View ArticleHow to Deploy Endpoint FlexResponse
Follow the below procedure steps provided here to deploy Endpoint FlexResponse plug-ins.Procedure Step 1 : Obtain (or create) an Endpoint FlexResponse plug-in zip file.Contact a Symantec partner or...
View ArticleSymantec Help (SymHelp) - Quick and easy help with your installation,...
Brief Description about Symhelp:Symantec Help (SymHelp) is a diagnostic utility designed for Symantec Endpoint Protection used in identifying common issues and providing quick solutions to common...
View Article