Introduction to various Symantec and Norton Security Products
What is this about?In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family...
View ArticleSecurity 1:1 - Part 5 - Online gaming fraud, scam and phishing attempts
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 SeriesOnline gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the...
View ArticleHow to prevent unauthorized users from removing the Symantec DLP Agent from...
To prevent unauthorized users from removing the Symantec DLP Agent from an endpoint computer you just need to Add uninstallation passwords to agents.Uninstallation passwords prevent unauthorized users...
View ArticleCommands to check the Linux Version, Release name & Kernel version.
In order to install #SAVFL on your #Linux Machine you need to check your verify your OS details. Commands to check the Linux Version, Release name & Kernel version.uname -a (Print all Information)...
View ArticleThe Day After: Necessary Steps after a Virus Outbreak
IntroductionThis is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleHow Symantec Data Loss Prevention for Mobile works & How to Implement
Symantec Data Loss Prevention for Mobile connects to your corporate network through Wi-Fi access or through cellular 3G connectivity. Network traffic for Webmail, third-party applications such as...
View ArticleData Loss Prevention Install- Single Tier
This topic covers the installation of DLP Enforcer and Detection Server version 12.0 in grpahic representation for a Single Tier Architecture. Oracle is already installed on the server. The...
View ArticleConfigure DLP to Send Email Notification to Employee's Manager
Some customers want to know whether the DLP can send an Email notification to the manager if an employee trigger an incident. The answer is Yes.This is some kind of workflow in DLP that can help the...
View ArticleFirst Response to: Cryptolocker \ Ransomcrypt\ Encryptor
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 4
This article is a continuation of my three previous articles:How to utilize SEP 12.1 for Incident Response - PART 1How to utilize SEP 12.1 for Incident Response - PART 2How to utilize SEP 12.1 for...
View ArticleMicrosoft Exchange ActiveSync
Microsoft Exchange ActiveSync is a way that you can send corporate emails from a mobile device. ActiveSync can send email either to recipients internal to the corporate network or outside of the...
View ArticleComplete Process of Deploying and Enabling of Endpoint FlexResponse plug-in
Symantec Data Loss Prevention provides a set of response rule actions that you can specify to remediate an incident. These provided actions include logging, sending an email, blocking an end-user...
View ArticleThe Graphical Guide of The Failover Installation in SCSP
According to this article:https://www-secure.symantec.com/connect/articles/u...and the KB:http://www.symantec.com/business/support/index?pag...we can understand the load balance and failover in...
View ArticleConfiguring and running SharePoint server scans & How to set up Scans of...
Scans of SharePoint Servers : The Network Discover Server locates a wide range of exposed confidential data on SharePoint servers. It communicates with the Enforce Server to obtain information about...
View ArticleNetwork Monitor Implementation
Network Monitor :Network Monitor accurately detects confidential information across configured network protocols and content types before it leaves the network. Real-time monitoring and reporting...
View ArticleCollect Agent Information from SCSP Management Console
On SCSP agent, there is a script named getagentinfo.bat under the installation folder. The end-user can use this script to collect the information that needed by support to troubleshoot SCSP agent...
View ArticleKilling Conficker: How to Eradicate W32.Downadup for Good
IntroductionThis is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleEnforce Server integration with Symantec Protection Center (SPC) & How to...
Symantec Protection Center (SPC) is a common user interface which lets you centralize data and management of Symantec and third-party security products on one web console. This consolidation provides...
View ArticleKnowledgebase Articles for Symantec Protection Engine (SPE)
The following document may be an introduction to Symantec Protection Engine for NAS (SPE for NAS) and Symantec Protection Engine for Cloud Services. The most current version of this product available...
View ArticleSymantec Endpoint Protection 12.1 のサイジングと拡張性に関するベストプラクティス
Symantec Endpoint Protection はあらゆる規模の企業に対して最善のエンドポイントセキュリティを提供します。このホワイトペーパーでは、Symantec Endpoint Protection 環境を正しくサイジングして配備し、最適な保護と有用性を実現するためのベストプラクティスを説明します。 SizingSizabilityBestPractices_SEP12.1_ja.pdf
View Article