How to utilize SEP 12.1 for Incident Response - PART 6
This article is the sixth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous five are below:How to utilize SEP 12.1 for Incident...
View ArticleSymantec Messaging Gateway and TLS in a post-POODLE Internet
SSL has long been the foundation of secure Internet communications. At the tail end of 2014, several vulnerability postings battered and bruised the SSL protocol and a POODLE was a primary wagger of...
View ArticleIf you are using Symantec DLP, you should be using IT Analytics
Overview of IT AnalyticsIT Analytics provides cube based reporting (pivot tables), additional reports, and Key Peformance Indicators (KPIs) for various Symantec products:Symantec IT Management Suite...
View ArticleSEPM Day to Day Administration work (v12.1.5)
You’ve installed & set up the SEPM console. You’ve also deployed the SEP clients to PCs across the network. The job is done… or so you thought. While it can ‘run’ itself most of the time, there are...
View ArticleHOWTO: Submitting suspect file/virus to Symantec to receive Rapid Release...
Note: This is based on SEPM v12.1.5 console.Your SEPM installation is running smoothly. There are no alerts going off from the Home page of the SEPM console. You sit back, feeling very pleased about...
View ArticleImportant Information re: SEP 11 EOSL and Discontinuation of SEP 11 Virus...
Partners,Your customers may be experiencing issues pertaining to one or both of the following: SEP 11 End of Service Life Discontinuation of SEP 11 Virus DefinitionsThe below tools are available to...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 7
This article is the seventh installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous six are below:How to utilize SEP 12.1 for Incident...
View ArticleSymantec Endpoint Protection interactions with network drives
FAQScanning of network drivesQ. Does an Administrator-Defined Scan scan the mapped network drives?A. No, it does not. However, if a file located on the network drive is run locally on the client...
View ArticleThe importance of orchestrated “cloud” security
The importance of orchestrated “cloud” securityIn today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could...
View ArticleAll About Grayware
IntroductionThis is the seventh of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleHow to use Metro to connect to VIP Products
AboutThis article offers some guidelines and pointers on how to use Metro Web Services library to connect to VIP Products. Please don't deploy the source code in this page as it is in your production...
View ArticleHow-To: Add PGP WDE Drivers to MDT & SCCM WinPE Boot Media
Symantec has a lot of great documentation for creating WinPE boot media with the PGP drivers baked in for one-off situations. Unfortunately those instructions don't speak to organizations with MDT...
View ArticleSymantec Endpoint Encryption 11.0.1 Initial Server Configuration
For this demonstration, I will be preparing a Windows Server 2012 R2 Datacenter, 64-bit system for hosting Symantec Endpoint Encryption Management Server 11.0.1.This demonstration also assumes that you...
View ArticleSymantec Endpoint Encryption 11.0.1 Management Server Installation
For this demonstration, I will be using Symantec Endpoint Encryption 11.0.1 on Windows Server 2012 R2 Datacenter, 64-bit.This demonstration assumes that you have a compatible database already created...
View ArticleCreation of Certificate for SEE RME to encrypt new file(Encryption Method)
Creation of Certificate for SEE RME to encrypt new file(Encryption Method)From the CA Machine Open the hyper link http://localhost/cersrvSelect Request a CertificateClick “Submit an Advanced...
View ArticleSEP Times in the City: A Helpful Symantec Endpoint Protection Analogy
IntroductionThis is the eighth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleSymantec releases Symantec Endpoint Protection 12.1.6168.6000 (12.1 RU6)
Hello Everyone,SEP 12.1 RU6 (12.1.6168.6000) has been released and now available on Flexnet to download. For Non english languages it may take few more days.Note: Symantec Endpoint Protection 12.1 RU6...
View ArticleHow to install the Microsoft SQL Server Native Client (bcp.exe)
The Symantec Endpoint Protection Manager (SEPM) requires the Microsoft SQL Server Native Client (bcp.exe & SQLCMD) to communicate with the SQL database. Thus before installing SEPM, it is required...
View ArticleDCS Application Whitelisting Guide
PDF attachment contains the full size, full resolution guide. DCS Whitelisting Guide.pdf
View ArticleSEPM Apache Reverse Proxy 설정방법
아래 기술문서는 RU4와 RU5 버전의 SEPM을 기준으로 작성되었습니다.RU6는 적용되지 않으니 참고하시기 바랍니다.Apache Reverse Proxt를 사용하면 LUA 도입없이 기존 SEPM을 활용하여 내부 라이브업데이트 서버를 구현 할 수 있습니다.SEPM은 바이러스패턴을 다운로드하여 보관하는 방식이아닌 캐시서버역할을 하게됩니다.설정방법:챕터1....
View Article