IT Analytics for Symantec Data Loss Prevention - Glossary of Terms
IT Analytics introduces powerful ad-hoc reporting and business intelligence tools, and along with it a few terms that may be new to you. To alleviate any confusion, this article describes a few key...
View ArticleDifference between Symantec Endpoint Protection 12.1, Symantec Endpoint...
Hello,Symantec offers a range of fast, effective, and affordable antivirus and malware protection products designed for small and medium-sized businesses. This product comparison guide is designed to...
View ArticleRecovering Ransomlocked Files Using Built-In Windows Tools
IntroductionThis is the second of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleMoving SEP clients from an Independent SEPM to another Independent SEPM
I have come across customers who are on Symantec Endpoint Protection Manager 11 and are gearing to migrate / upgrade to Symantec Endpoint Protection Manager 12.The Challenge / dilemma they face is...
View ArticleKnowledgebase Articles for Symantec Endpoint Protection 12.1.4(RU4)
Here are the Knowledgebase Articles available for Symantec Endpoint Protection 12.1.4013 (RU4) which would assist you to prepare for this Latest Release.NOTE: This Article would be updated as and when...
View ArticleSmall Business Edition 12.1.4013.4013 (SEP SBE 12.1RU4) Released
Hello,Symantec Endpoint Protection 12.1.RU4 Small Business Edition has been released on 28th October 2013.Previous release details are available here:...
View ArticleImport MAC legacy package (11.x) into SEPM 12.1
Hi,Logon to the SEPM console Admin --> Install Pacakge --> Client Install Package --> Add a Client Install PackageBrowse to the SEP 12.1 RU4 Part-1 setup files, Go to the Additional Packages...
View ArticleTwo Reasons why IPS is a "Must Have" for your Network
IntroductionThis is the third of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleSEPM 12.1 - Advanced Settings filter options for Client Activity logs
Trying to wade through Client Activity logs can become a tedious task, especially when you have thousands of clients. I would like to show you some advanced filtering that you can do to get the Client...
View ArticleHow to sign up for alerts and notifications on the BCS notification system
IssueThis document explains the process of configuring the Symantec Alerting Services for BCS customers, which includes editing and confirming your recipient information, alerts and notifications and...
View ArticleModifying IT Analytics Reports to Decrease Load Times
For IT Analytics reports hosted by SQL Server Reporting Services (which include out-of-the-box reports and dashbaords) some users may experience extended wait times before the report is able to render,...
View ArticlePreventing IT Analytics Reports from Running Automatically
By default, reports and dashboards in IT Analytics (hosted by SQL Server Reporting Services) will run automatically when selected. This behavior can sometimes be problematic for environments with...
View ArticleThe Log Files Location and Description of Symantec DLP Server
Symantec Data Loss Prevention provides many operational log files that can be used to interpret how the system is running.The default locations put the log files during installation for the Enforce...
View ArticleSEP Firewall "Did You Know...?" - How To Monitor Web Traffic
Did you know that it IS possible to monitor web traffic using the SEP firewall? In this article, I will show you how to monitor web traffic using the SEP firewall.Before we get started there are a...
View ArticleInstalling SCCM agent via SEP / SNAC
Most of the organizations use SCCM to deploy Third party software, OS patches etc to endpoints.It’s a very tedious process for the SCCM admin to verify if all the endpoints are 100% compliant.I would...
View ArticleHow to avoid or minimize data loss when using Symantec Encryption solution?
Disclaimer: this may not be an exaustive description of the solution and is intended to be used as a guideline. All information is available in the product documentation, including the Administrator's...
View ArticleLatest Symantec Endpoint Protection Release - SEP 11 RU7 MP4 (11.0.7400.1398)
Hello All,Symantec Endpoint Protection 11 RU7 MP4 (11.0.7400.1398) is Released.This build's version is: 11.0.7400.1398SEP all version release details are available here: http://bit.ly/m0vOJpNote: If in...
View ArticleSecurity 1:1 - Part 1 - Viruses and Worms
Welcome to the Security 1:1 series of articlesIn Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used...
View ArticleSecurity 1:1 - Part 2 - Trojans and other security threats
Welcome to the Security 1:1 - Part 2In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack...
View ArticleSecurity 1:1 - Part 3 - Various types of network attacks
Welcome to the Security 1:1 - Part 3In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user...
View Article