Oracle Definition, Functions, Advantages and Disadvantages
Happy evening community is approaching another day full of challenges and I want to take this article to talk a little about what Oracle is in the previous article talk about the comparison between...
View ArticlePowershell Script to Automate Server JRE and Detection Server Installation –...
The ContextWhen performing a DLP installation, there is a point in which two (or more, depending on installation tiers) .msi files must be executed to install the server JRE and Detection Server. This...
View ArticleData Loss Prevention (DLP) - Migrator.exe Automation Script
Hello,In this article I have created an automation script allowing users to automate either the EnforceMigrator.exe or the SingleTierMigrator.exe process following an upgrade from 14.6 to 15.1.As part...
View ArticleData Loss Prevention (DLP) - Migration Rollback Automation Script
Hello,In this guide I've written a basic script which will allow a basic rollback of DLP following issues migrating from 14.6 to 15.1, it should be noted that this article is only relevant if the...
View ArticleMicrosoft Access definition, functions, advantages and disadvantages
Greetings Community Happy Tuesday to all of you today has been a very productive day and with much to do I hope you are in the same and fulfilling the daily goals, in my last 3 articles I talked...
View ArticleSpam mail, type of email Spam, Virus, Ransomware and Malware in email Spam
Good night community today concludes another day full of success and high productivity in each activity designated by the areas of our work, I recently talked about an article related to Microsoft...
View ArticleHow do I add the Policy ID (x-bluecoat-reference-id) Field to a 10.3.x...
SituationBy default, neither Reporter nor the ProxySG appliance report on the Policy ID. With the standard log file, the ProxySG does not log the Policy ID. Because the default access log does not...
View ArticleHow to check System Status of Reporter v10.x
SituationHow to check the System Status/Health Monitoring of Reporter?SolutionSystem Status on Reporter 10.1.xreporter>enableEnable Password :reporter#show ststusSystem Status on Reporter...
View ArticleIndependent tests prove effectiveness of Symantec's Email Security
Email is widely recognized as the most popular method for attackers to spread malware and breach organizations. Our 2019 Internet Security Threat Report shows that employees of small organizations...
View ArticleSCWP- AWS: Deny Shutdown Workload Action from CWP.
Hello,In this guide I'm going to highlight how to set deny permissions within AWS to prevent CWP users being able to remotely shutdown AWS workloads. The business reasoning for this can vary from...
View ArticleEmail Security.cloud, goes from strength to strength
On 29 March 2019 we further extended the capabilities of Symantec Email Security.cloud. This is part of our ongoing, and continual investment in protecting our customers from the multiple email-based...
View ArticleGeneral Availability Release of ICDx Now Available to Symantec Customers
Please review instructions in the support article below.https://support.symantec.com/en_US/article.TECH253299.html
View ArticleSecurity Analytics: Risk and Visibility Report
The Risk and Visibility Report in Security Analytics is a powerful way to provide non-analysts, executives, and other members of your organization with a general overview of the latest threats that...
View ArticleCloudSOC CASB Users/Admin role - Incident Investigation
My team just finished creating a whitepaper on How to build a Cloud Center of Excellence. We were sitting back and contemplating follow-on papers representing deeper dives into each of the topics...
View ArticleSEP v15 Cloud vs SEP v14.2 RU1 - A Follow Up
A follow up to my previous article - "SEP 15 is Cloud based - what's your views" - Symantec has published a new article, where they explained the differences between Symantec Endpoint Protection 14.2...
View ArticleSecurity Analytics Support Tips - May 2019
Tips from the Security Analytics Support DeskHere are a few tips from the Security Analytics Support Team they thought would be helpful for customers to get the most out of their Security Analytics...
View ArticleWSS + SEP Mobile builds a strong line of defense for mobile users
The integration of Web Security Service (WSS) and SEP Mobile brings advanced web security to the mobile devices. WSS protects web and cloud app traffic, users, and devices via cloud-delivered security...
View ArticleEndpoint Detection and response procedures for blocking and attacks against...
Advanced threat protection levels represent a fundamental role in securing the volume of information in companies in such a competitive market businesses are constantly looking to improve security...
View ArticleIn the UK? Register for our Endpoint protection user group in London May 30th!
Using SEP, come join us at the SEP user group in London May 30thProduct Management will be in attendance to give the latest roadmap, hear from other customers about their SEP implementation, and our...
View Article"Couldn't connect to the SMTP server using the specified settings. Please...
Hi,Recently, I implemented Symantec Data Loss Prevention 15.5 MP1 and encountered an issue on configuring the Exchange Server section for mail notifications. The issue notification I received was:...
View Article