SEPM v14.0 - Management Console Installation - Remote Client (Windows)
This article guides one to install Management Console of Symantec Endpoint Protection Manager (SEPM) v14.0 on a remote client system (Windows).Pre-requisitesPre-requisites to install Symantec Endpoint...
View ArticleInventory Solution Symantec Endpoint Protection Integration
Introduction Starting in Inventory Solution 8.1 RU6, the features to monitor the health of Symantec Endpoint Protection (SEP), to Start Agent services via a Task, is now available. These features...
View ArticleCritical Vulnerability in Microsoft Malware Protection Engine
Critical Vulnerability in Microsoft Malware Protection EngineDescriptionA vulnerability was reported in Microsoft Windows Defender. A remote user can cause arbitrary code to be executed on the target...
View ArticleSoftware Portal platform detection introduced in ITMS 8.1 RU5
Software Portal platform detection introduced in ITMS 8.1 RU5The Software Portal provides users access to software that administrators grant rights to. This software can be selected and installed...
View ArticleSymantec WAF and Remote Code Execution in Drupal (CVE-2018-7600)
Written by:Shay Berkovich, Sr. Software Development EngineerMartin Vierula, Sr. Software Development EngineerSummaryDrupal is a very popular open source Content Management System installed on many...
View ArticleSetting up DLP in a 3 tier environment
Setting up of 3 Tier DLP**Please note that enforce is not supported on Centos and this was used for trial purposes. If you wish to use Centos in your live environment then this is at your own...
View ArticleHelp Us Improve Symantec.com
At Symantec we are always looking to improve. With that in mind, we have an opportunity for you to provide feedback on the Symantec.com site to help us improve the website browsing experience....
View ArticleServiceDesk - Process Automation - Rulesets - SD-SR-APPROVAL
Admin | Process Automation | [Choose Service] | Service DashboardManage RulesetsTo learn how to add/amend these Rules see the Rulesets Article.Software...
View ArticleServiceDesk - Process Automation - Rulesets - SD-SR-DELIVERY
Admin | Process Automation | [Choose Service] | Service DashboardManage RulesetsTo learn how to add/amend these Rules see the Rulesets Article.Software...
View ArticleServiceDesk - Process Automation - Rulesets - PROBLEM-MANAGEMENT
Admin | Process Automation | [Choose Service] | Service DashboardManage RulesetsTo learn how to add/amend these Rules see the Rulesets Article.PROBLEM-MANAGEMENT...
View ArticleServiceDesk - Process Automation - Rulesets - CHANGE-MGMT
Admin | Process Automation | [Choose Service] | Service DashboardManage RulesetsTo learn how to add/amend these Rules see the Rulesets Article.CHANGE-MGMT...
View ArticleServiceDesk - Process Automation - Rulesets - INCIDENT-MGMT
Admin | Process Automation | [Choose Service] | Service DashboardManage RulesetsTo learn how to add/amend these Rules see the Rulesets Article.INCIDENT-MGMT...
View ArticleWorkflow - Tools
Symantec Workflow comes with a number of tools.These are explained in the User GuidesSymantec™ Workflow 7.5 User Guide [DOC5941]Symantec™ Workflow 7.6 User Guide [DOC8047]Symantec™ Workflow 8.0 User...
View ArticleUse Symantec’s FIDO-Compliant VIP Security Keys to Authenticate Both On and...
FIDO stands for "Fast Identity Online"The Symantec VIP Security Key follows the U2F (Universal 2nd Factor) standard, a FIDO protocol that allows for a single security key to authenticate to all your...
View ArticleMinimum privileges to scan Oracle 12c
For scanning Oracle DB, CCS requires privileges to import and scan CCS Oracle asset. When requesting DBA to create a user for CCS, answering their question on what are the permissions required takes a...
View ArticleSetting up CCS-VM using a remote SQL Database
Setting up CCS-VM using a remote SQL DatabasePurposeThe purpose of this article is to help guide people who may get a little stuck on the setup of CCS-VM when using a remote Database.When setting up an...
View ArticleSteps after installing Data Centre Security 6.7 With DCS AD/sign in fix &...
Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix & Agent installer troubleshooterPurpose The purpose of this article is to help others who have installed DCS 6.7 troubleshoot...
View ArticleWorkflow - CCS - Components
Symantec Control Compliance Suitehttps://www.symantec.com/products/control-compliance-suiteAssess. Remediate. Comply. Identify security gaps and pinpoint vulnerabilities to prioritize remediation and...
View ArticleWorkflow - DeepSight - Components
DeepSight™ Intelligencehttps://www.symantec.com/services/cyber-security-services/deepsight-intelligenceDeepSight™ Intelligence Extend your teams with actionable cyber threat intelligence. Make sharper...
View ArticleWorkflow - DLP - Components
Symantec Data Loss Preventionhttps://www.symantec.com/products/dlpDLP Products Get visibility of sensitive data leaving your network Discover, monitor and protect your corporate data with the...
View Article