Quantcast
Browsing all 805 articles
Browse latest View live

IT Analytics for Symantec Data Loss Prevention - Glossary of Terms

IT Analytics introduces powerful ad-hoc reporting and business intelligence tools, and along with it a few terms that may be new to you. To alleviate any confusion, this article describes a few key...

View Article


Difference between Symantec Endpoint Protection 12.1, Symantec Endpoint...

Hello,Symantec offers a range of fast, effective, and affordable antivirus and malware protection products designed for small and medium-sized businesses. This product comparison guide is designed to...

View Article


Image may be NSFW.
Clik here to view.

Recovering Ransomlocked Files Using Built-In Windows Tools

IntroductionThis is the second of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article

Image may be NSFW.
Clik here to view.

Moving SEP clients from an Independent SEPM to another Independent SEPM

I have come across customers who are on Symantec Endpoint Protection Manager 11 and are gearing to migrate / upgrade to Symantec Endpoint Protection Manager 12.The Challenge / dilemma they face is...

View Article

Knowledgebase Articles for Symantec Endpoint Protection 12.1.4(RU4)

Here are the Knowledgebase Articles available for Symantec Endpoint Protection 12.1.4013 (RU4) which would assist you to prepare for this Latest Release.NOTE: This Article would be updated as and when...

View Article


Image may be NSFW.
Clik here to view.

Small Business Edition 12.1.4013.4013 (SEP SBE 12.1RU4) Released

Hello,Symantec Endpoint Protection 12.1.RU4 Small Business Edition has been released on 28th October 2013.Previous release details are available here:...

View Article

Image may be NSFW.
Clik here to view.

Import MAC legacy package (11.x) into SEPM 12.1

Hi,Logon to the SEPM console Admin --> Install Pacakge --> Client Install Package --> Add a Client Install PackageBrowse to the SEP 12.1 RU4 Part-1 setup files, Go to the Additional Packages...

View Article

Image may be NSFW.
Clik here to view.

Two Reasons why IPS is a "Must Have" for your Network

IntroductionThis is the third of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article


Image may be NSFW.
Clik here to view.

SEPM 12.1 - Advanced Settings filter options for Client Activity logs

Trying to wade through Client Activity logs can become a tedious task, especially when you have thousands of clients. I would like to show you some advanced filtering that you can do to get the Client...

View Article


Image may be NSFW.
Clik here to view.

How to sign up for alerts and notifications on the BCS notification system

IssueThis document explains the process of configuring the Symantec Alerting Services for BCS customers, which includes editing and confirming your recipient information, alerts and notifications and...

View Article

Image may be NSFW.
Clik here to view.

Modifying IT Analytics Reports to Decrease Load Times

For IT Analytics reports hosted by SQL Server Reporting Services (which include out-of-the-box reports and dashbaords) some users may experience extended wait times before the report is able to render,...

View Article

Image may be NSFW.
Clik here to view.

Preventing IT Analytics Reports from Running Automatically

By default, reports and dashboards in IT Analytics (hosted by SQL Server Reporting Services) will run automatically when selected. This behavior can sometimes be problematic for environments with...

View Article

The Log Files Location and Description of Symantec DLP Server

Symantec Data Loss Prevention provides many operational log files that can be used to interpret how the system is running.The default locations put the log files during installation for the Enforce...

View Article


Image may be NSFW.
Clik here to view.

SEP Firewall "Did You Know...?" - How To Monitor Web Traffic

Did you know that it IS possible to monitor web traffic using the SEP firewall? In this article, I will show you how to monitor web traffic using the SEP firewall.Before we get started there are a...

View Article

Image may be NSFW.
Clik here to view.

Installing SCCM agent via SEP / SNAC

Most of the organizations use SCCM to deploy Third party software, OS patches etc to endpoints.It’s a very tedious process for the SCCM admin to verify if all the endpoints are 100% compliant.I would...

View Article


How to avoid or minimize data loss when using Symantec Encryption solution?

Disclaimer: this may not be an exaustive description of the solution and is intended to be used as a guideline. All information is available in the product documentation, including the Administrator's...

View Article

Image may be NSFW.
Clik here to view.

Latest Symantec Endpoint Protection Release - SEP 11 RU7 MP4 (11.0.7400.1398)

Hello All,Symantec Endpoint Protection 11 RU7 MP4 (11.0.7400.1398) is Released.This build's version is: 11.0.7400.1398SEP all version release details are available here: http://bit.ly/m0vOJpNote: If in...

View Article


Image may be NSFW.
Clik here to view.

Security 1:1 - Part 1 - Viruses and Worms

Welcome to the Security 1:1 series of articlesIn Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used...

View Article

Image may be NSFW.
Clik here to view.

Security 1:1 - Part 2 - Trojans and other security threats

Welcome to the Security 1:1 - Part 2In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack...

View Article

Image may be NSFW.
Clik here to view.

Security 1:1 - Part 3 - Various types of network attacks

Welcome to the Security 1:1 - Part 3In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user...

View Article
Browsing all 805 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>