A graphical overview of using Sym Help tool
If you want to have pre installtion check,Health checkup, recommendations and collect logs for support. Then please go through the document so that you can learn how to run a Sym help toolSym Help...
View ArticleAbout the new SymHelp tool for SEP 12.1RU2
I. The ToolSymhelp is a new version of the troubleshooting tool that replaces the legacy Symantec Support Tool.You will find the tool on the SEP 12.1 RU2 Installation CD – the included here version is...
View ArticleBlock Software By Fingerprint
How to block applications in SEP using MD5 1.      Firstly we need to obtain the file Checksum.exe . The file is located on the root folder of the SEP client (%programfiles%\Symantec\Symantec Endpoint...
View ArticleThe Most Detailed Way To Block UltraSurf
Here is the step by step process to disable Ultra Surf from being accessed by your clients. To start with, Ultra Surf leaves a finger print that shall be needed by the admin as a constant value. It is...
View ArticleSEPM 11.x to SEPM 12.1 Upgrade process graphical overview with SQL database
This article will demonstrate upgrade process from the SEPM 11 RU7 MP2 to SEPM 12.1 RU4 MP1a version.Download the latest software from...
View ArticleHow to block clients connection to the specific group
#Updated on 3rd June'14 Hello Everyone,Today we will see how we can block the clients connection to the specified group which they were assigned in the client installation package.We can set up client...
View ArticleRecovering Ransomlocked Files Using Built-In Windows Tools
IntroductionThis is the second of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleWhat Protection Does Symantec DLP Provide? A Note for Beginners
What Protection Does Symantec DLP Provide?In this article, I would try to provide some basics about DLP. This article is for beginner who wants to understand the following about DLP:Where does DLP...
View ArticleFeature comparison between SEP 12.1 SBE and EE
Updated on 27th Dec'12Hi,This slide provides a summary of major features and compare the SEP 12.1 Small business Edition and SEP 12.1 Enterprise Edition. FeatureSmall business EditionEnterprise...
View ArticleWhat Variables can be used within Response Rules
Whether you setup a response rule for email notification or send a notification to a syslog server, you can set up response action variables to pass incident specific data. The response action...
View ArticleSymantec Endpoint Protection: Custom Scanning by Drive Letter
Overview:When it comes to creating and configuring administrator-defined scans in the Symantec Endpoint Protection Manager, sometimes there isn't quite enough granularity. For example, let's say that...
View ArticleApplication Monitoring
Application monitoring lets you monitor third-party applications for IM, email, or HTTP/S clients. By default, Symantec Data Loss Prevention only monitors first-party applications such as AIM,...
View ArticleSymantec Endpoint Protection: Modifying the XML-based Policies for Increased...
Overview: While you may not realize it, any .dat policy exported from the Symantec Endpoint Protection Manager is simply a compressed XML file. By changing the extension from .dat to .zip, you gain...
View ArticleThe Remote EDM Indexer
The Remote EDM Indexer is a utility that converts a comma-separated value, or tab-delimited, data file to an Exact Data Matching index. The utility is similar to the local EDM Indexer used by the...
View ArticlePre-install check list for Symantec Mail Security for Microsoft Exchange
If you want to install Symantec Mail Security for Microsoft Exchange, you need to do and check these before the installation:Make sure that the server, or servers, on which you plan to install the...
View ArticleIntroduction to the Log Types of Symantec Messaging Gateway
Symantec Messaging Gateway logs let you monitor events for your Scanners, the Control Center, Directory Data Service, and Spam Quarantine.Be familiar with these log file will be great help to...
View ArticleSymantec Insider Tip: Successful Submissions!
IntroductionThis is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleWhitepaper-Virtual Desktop Infrastructure for Citrix SEP
Hello Everyone,This whitepaper focuses strictly on providing guidance on how to successfully deploy the Symantec Endpoint Protection 12.1 protection stack components to a Citrix VDI Environment. This...
View ArticleSEPM 11.x to SEPM 12.1 Upgrade process graphical overview with SQL database
This article will demonstrate the upgrade process from the SEPM 11 RU7 MP2 to SEPM 12.1 RU4 MP1a version.Download the latest software from...
View ArticleThe sslkeytool utility and server certificates
Symantec Data Loss Prevention uses Secure Socket Layer/Transport Layer Security (SSL/TLS) to encrypt all data that is transmitted between servers. Symantec Data Loss Prevention also uses the SSL/TLS...
View Article