Symantec Managed PKI: BYOD Apple iOS device connecting to Wi-Fi access point...
Symantec Managed PKI: BYOD Apple iOS device connecting to Wi-Fi access point using EAP-TLS authentication protocol (Job Aid in PDF format – download PDF to launch embedded video)Use-case Overview...
View ArticleSymantec Managed PKI: Windows PC VPN auto-configuration using PKI Clien
Symantec Managed PKI: Windows PC VPN auto-configuration using PKI Client auto-enrollment with post-processing (Job Aid in PDF format – download PDF to launch embedded video)Use-case Overview Enable a...
View ArticleSelf-Serve Provisioning Cheatsheet
Use the attachment below to walk through the provisioning process, or any time you need to add a domain.If you want to watch a video demonstration of the tool, please click...
View ArticleImplement Load Balancing for DCS Manager
The communication between the DCS agent and the DCS manager is based on TCP connections. The DCS agent makes a TCP connection to the DCS manager and sends data and gets a response. The DCS agent then...
View ArticleDelver of the Arcane Archives
IntroductionThis is lucky number thirteen in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of...
View ArticleConfigure DCS UMC to LiveUpdate from an Internal LUA
The DCS UMC check and download updates from Symantec public LiveUpdate server (http://liveupdate.symantecliveupdate.com) by default. But, you can configure the UMC to download from a internal LUA in a...
View ArticleSymantec Protection Engine for NAS Installation Steps v7.5
Symantec™ Protection Engine 7.5 for Network Attached Storage Installation Steps ( Windows Server 2008 ) About Symantec Protection Engine for NASSymantec Protection Engine is a carrier-class content...
View ArticleSymantec Data Loss Prevention Upgrade Guide V14.0.1 to 14.0.2
Symantec Data Loss Prevention Upgrade Guide V14.0.1 to 14.0.2 Symantec Data Loss Prevention Upgrade Phases Phases Action DescriptionPhase 1 Upgrade Database to...
View ArticleSymantec DLP Endpoint Deployment & Challenges
Note: These slides were presented at the June 16 meeting of the Las Vegas DLP User Group. This information is the experience of a customer, so the procedures used were his and are not those of...
View ArticleImplementing HKEY_USERS check in CCS “CIS Microsoft Windows Server 2012 V...
As of SCU2016-1 there is only “CIS Microsoft Windows Server 2012 V 1.0.0” standard in Predefined folder which is currently few years old and lagging behind latest CIS benchmarks:CIS Microsoft Windows...
View ArticleBest practices to follow prior to performing Symantec Disk Encryption
Symantec Endpoint Encryption v11.0.1 [ Knowledge Base ] Best practices to follow prior to performing Symantec Disk Encryption The following best practices are recommended for preparing to encrypt your...
View ArticleCreating a Windows PE (WinPE) Bootable Recovery Disk/USB for Symantec...
Creating a Windows PE (WinPE) Image for SEE Recovery1. Open Deployment and Imaging Tools Environment (Run As Administrator)If you don’t have to obtain and install from the following linkDownload WinPE:...
View ArticleSymantec Endpoint Encryption v11.0.1 Recovery Procedure from an Unexpected...
Symantec Endpoint Encryption v11.0.1 Recovery Procedure from an UnExpected corruption of OS. Important Note: Do & Don’ts for Symantec Endpoint Encryption=> Never format “C” drive or System Boot...
View ArticleUpgrade Symantec Messaging Gateway Locally
We can upgrade Symantec Messaging Gateway (SMG) without Internet access.Since version 10, we can upgrade SMG locally.Here are the steps:Preparation:1. Install IIS on a Windows OS which located on the...
View ArticleThe union of LinkedIn & Microsoft Office Federation: A pain no less than...
The heading itself is appealing enough, for most of us to immediately agree and even guess what I am about to write next. The cloud brokers, CASB and changing demographics overall are going to make...
View ArticleSequence Makes Sense
IntroductionThis is the fourteenth in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleRisk-assessment solution design study
We are looking for CISOs and Information Security Managers to participate to one-on-one design feedback sessions for a new cloud-based risk assessment solution.Details:Sessions are 1:1 over WebEx and...
View ArticleCommon Console User Research
We are conducting user research to inform the on-going development of our common cloud console. As we migrate several product lines onto a new common platform, we want to better understand the users...
View ArticleSymantec EP Security (Endpoint Security Antivirus)
Symantec Endpoint Protection defends businesses from both malware and targeted attacks—protecting against new and unknown threats.Symantec Endpoint Protection uses Symantec’s Insight platform to...
View ArticleSymantec Security Insights Monthly Newsletter | July 2016
Please click here to view the current Symantec Security Insights newsletter.Thank you!Abstract blue squares
View Article