Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 805 articles
Browse latest View live
↧

A graphical overview of using Sym Help tool

If you want to have pre installtion check,Health checkup, recommendations and collect logs for support. Then please go through the document so that you can learn how to run a Sym help toolSym Help...

View Article


Image may be NSFW.
Clik here to view.

About the new SymHelp tool for SEP 12.1RU2

I. The ToolSymhelp is a new version of the troubleshooting tool that replaces the legacy Symantec Support Tool.You will find the tool on the SEP 12.1 RU2 Installation CD – the included here version is...

View Article


Image may be NSFW.
Clik here to view.

Block Software By Fingerprint

How to block applications in SEP using MD5 1.       Firstly we need to obtain the file Checksum.exe . The file is located on the root folder of the SEP client (%programfiles%\Symantec\Symantec Endpoint...

View Article

Image may be NSFW.
Clik here to view.

The Most Detailed Way To Block UltraSurf

Here is the step by step process to disable Ultra Surf from being accessed by your clients. To start with, Ultra Surf leaves a finger print that shall be needed by the admin as a constant value. It is...

View Article

Image may be NSFW.
Clik here to view.

SEPM 11.x to SEPM 12.1 Upgrade process graphical overview with SQL database

This article will demonstrate upgrade process from the SEPM 11 RU7 MP2 to SEPM 12.1 RU4 MP1a version.Download the latest software from...

View Article


Image may be NSFW.
Clik here to view.

How to block clients connection to the specific group

#Updated on 3rd June'14 Hello Everyone,Today we will see how we can block the clients connection to the specified group which they were assigned in the client installation package.We can set up client...

View Article

Image may be NSFW.
Clik here to view.

Recovering Ransomlocked Files Using Built-In Windows Tools

IntroductionThis is the second of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article

What Protection Does Symantec DLP Provide? A Note for Beginners

What Protection Does Symantec DLP Provide?In this article, I would try to provide some basics about DLP. This article is for beginner who wants to understand the following about DLP:Where does DLP...

View Article


Feature comparison between SEP 12.1 SBE and EE

Updated on 27th Dec'12Hi,This slide provides a summary of major features and compare the SEP  12.1 Small business Edition and SEP 12.1 Enterprise Edition. FeatureSmall business EditionEnterprise...

View Article


Image may be NSFW.
Clik here to view.

What Variables can be used within Response Rules

Whether you setup a response rule for email notification or send a notification to a syslog server, you can set up response action variables to pass incident specific data. The response action...

View Article

Image may be NSFW.
Clik here to view.

Symantec Endpoint Protection: Custom Scanning by Drive Letter

Overview:When it comes to creating and configuring administrator-defined scans in the Symantec Endpoint Protection Manager, sometimes there isn't quite enough granularity. For example, let's say that...

View Article

Application Monitoring

Application monitoring lets you monitor third-party applications for IM, email, or HTTP/S clients. By default, Symantec Data Loss Prevention only monitors first-party applications such as AIM,...

View Article

Image may be NSFW.
Clik here to view.

Symantec Endpoint Protection: Modifying the XML-based Policies for Increased...

Overview:  While you may not realize it, any .dat policy exported from the Symantec Endpoint Protection Manager is simply a compressed XML file. By changing the extension from .dat to .zip, you gain...

View Article


The Remote EDM Indexer

The Remote EDM Indexer is a utility that converts a comma-separated value, or tab-delimited, data file to an Exact Data Matching index. The utility is similar to the local EDM Indexer used by the...

View Article

Pre-install check list for Symantec Mail Security for Microsoft Exchange

If you want to install Symantec Mail Security for Microsoft Exchange, you need to do and check these before the installation:Make sure that the server, or servers, on which you plan to install the...

View Article


Introduction to the Log Types of Symantec Messaging Gateway

Symantec Messaging Gateway logs let you monitor events for your Scanners, the Control Center, Directory Data Service, and Spam Quarantine.Be familiar with these log file will be great help to...

View Article

Image may be NSFW.
Clik here to view.

Symantec Insider Tip: Successful Submissions!

IntroductionThis is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article


Whitepaper-Virtual Desktop Infrastructure for Citrix SEP

Hello Everyone,This whitepaper focuses strictly on providing guidance on how to successfully deploy the Symantec Endpoint Protection 12.1 protection stack components to a Citrix VDI Environment. This...

View Article

Image may be NSFW.
Clik here to view.

SEPM 11.x to SEPM 12.1 Upgrade process graphical overview with SQL database

This article will demonstrate the upgrade process from the SEPM 11 RU7 MP2 to SEPM 12.1 RU4 MP1a version.Download the latest software from...

View Article

The sslkeytool utility and server certificates

Symantec Data Loss Prevention uses Secure Socket Layer/Transport Layer Security (SSL/TLS) to encrypt all data that is transmitted between servers. Symantec Data Loss Prevention also uses the SSL/TLS...

View Article
Browsing all 805 articles
Browse latest View live