Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 805 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Create Remote IDM Using Copy of RDX Files

In some enterprise environment, the sensitive documents that needs to be protected by IDM, are locate in some kind of restricted area. The DLP Enforce cannot access these files logically/physically, or...

View Article


Image may be NSFW.
Clik here to view.

How Symantec Data Loss Prevention for Mobile works & How to Implement

 Symantec Data Loss Prevention for Mobile connects to your corporate network through Wi-Fi access or through cellular 3G connectivity. Network traffic for Webmail, third-party applications such as...

View Article


Image may be NSFW.
Clik here to view.

Using Symantec Help (SymHelp) Tool, how do we Collect the Suspicious Files...

Hello,In case if you are running the Legacy SEP Support Tool, please follow the Instructions provided in the...

View Article

Image may be NSFW.
Clik here to view.

Using SymHelp, how do we collect the Load Point Analysis Logs and Submit the...

Hello,SymHelp is a cross-product diagnostic utility designed for troubleshooting and identifying common issues that customers encounter.SymHelp is designed to support the Symantec Endpoint Protection...

View Article

Submitting information about detections to Symantec Security Response

Submitting information about detections to Symantec Security Response We can configure your computer to automatically submit information about detections to Symantec Security Response for analysis....

View Article


Image may be NSFW.
Clik here to view.

How to utilize SEP 12.1 for Incident Response - PART 4

This article is a continuation of my three previous articles:How to utilize SEP 12.1 for Incident Response - PART 1How to utilize SEP 12.1 for Incident Response - PART 2How to utilize SEP 12.1 for...

View Article

First Response to: Cryptolocker \ Ransomcrypt\ Encryptor

Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail...

View Article

How to find Suspected Threats on your computer.

There are two most powerful tools from Sysinternals that can help us lot in our search for suspected threats on our systems. 1. Autoruns for Windows 2. ProcexpAUTORUNS : You can download Autoruns for...

View Article


What are the Symantec Endpoint Protection (SEP) versions released officially?

This document contains all the versions of SEP and SEPM (Symantec Endpoint Protection Manager) which were released since the first version of SEP in autumn 2007.It contains the Enterprise Editions (EE)...

View Article


Image may be NSFW.
Clik here to view.

Symantec Insider Tip: Successful Submissions!

IntroductionThis is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article

Image may be NSFW.
Clik here to view.

How To Save Time Entering Multiple Explicit Group Update Providers (GUPs)

 This is the standard interface to enter Explicit Group Update Providers in SEP 12.2.x:  This interface is servicable enough with a small number of entries, but when you are entering in hundreds of...

View Article

Image may be NSFW.
Clik here to view.

SEP Firewall "Did You Know...?" - How To Monitor Web Traffic

Did you know that it IS possible to monitor web traffic using the SEP firewall? In this article, I will show you how to monitor web traffic using the SEP firewall.Before we get started there are a...

View Article

Image may be NSFW.
Clik here to view.

How to manage SEPM 12.1 database.

Hi,Backing up the embedded database: On-demandHere we can see how we can back up the database on demand. From the Admin page we've got the Back Up Database Now option and from the Start Menu > SEPM...

View Article


Image may be NSFW.
Clik here to view.

The Day After: Necessary Steps after a Virus Outbreak

IntroductionThis is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article

Image may be NSFW.
Clik here to view.

DLP Agent in a Failover Environment

DLP Agent supports to be installed in a Failover environment. Think about two endpoint servers, the first one is the Primary Endpoint Server and the other one is the Secondary Endpoint Server. The DLP...

View Article


Symantec DLP- Policy- A Note for Beginners

At the core of Symantec DLP, lies the policy of it, which determines the successful or not so successful implementation of Symantec DLP at organizations. Since DLP is not the perimeter security or the...

View Article

Whitepaper-Virtual Desktop Infrastructure for Citrix SEP

Hello Everyone,This whitepaper focuses strictly on providing guidance on how to successfully deploy the Symantec Endpoint Protection 12.1 protection stack components to a Citrix VDI Environment. This...

View Article


Image may be NSFW.
Clik here to view.

Symantec Endpoint Protection Small Business Edition 12.0 Frequently Asked...

  Symantec Endpoint Protection Small Business Edition 12.0 Frequently Asked Questions What are the new features in Symantec Endpoint Protection Small Business Edition 12.0 ?       Uses Apache as the...

View Article

How to Deploy Endpoint FlexResponse

Follow the below procedure steps provided here to deploy Endpoint FlexResponse plug-ins.Procedure Step 1 : Obtain (or create) an Endpoint FlexResponse plug-in zip file.Contact a Symantec partner or...

View Article

Symantec Help (SymHelp) - Quick and easy help with your installation,...

Brief Description about Symhelp:Symantec Help (SymHelp) is a diagnostic utility designed for Symantec Endpoint Protection used in identifying common issues and providing quick solutions to common...

View Article
Browsing all 805 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>