Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 805 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Introduction to various Symantec and Norton Security Products

What is this about?In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family...

View Article


Image may be NSFW.
Clik here to view.

Security 1:1 - Part 5 - Online gaming fraud, scam and phishing attempts

Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 SeriesOnline gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the...

View Article


How to prevent unauthorized users from removing the Symantec DLP Agent from...

To prevent unauthorized users from removing the Symantec DLP Agent from an endpoint computer you just need to Add uninstallation passwords to agents.Uninstallation passwords prevent unauthorized users...

View Article

Image may be NSFW.
Clik here to view.

Commands to check the Linux Version, Release name & Kernel version.

In order to install #SAVFL on your #Linux Machine you need to check your verify your OS details. Commands to check the Linux Version, Release name & Kernel version.uname -a (Print all Information)...

View Article

Image may be NSFW.
Clik here to view.

The Day After: Necessary Steps after a Virus Outbreak

IntroductionThis is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article


Image may be NSFW.
Clik here to view.

How Symantec Data Loss Prevention for Mobile works & How to Implement

 Symantec Data Loss Prevention for Mobile connects to your corporate network through Wi-Fi access or through cellular 3G connectivity. Network traffic for Webmail, third-party applications such as...

View Article

Image may be NSFW.
Clik here to view.

Data Loss Prevention Install- Single Tier

This topic covers the installation of DLP Enforcer and Detection Server version 12.0 in grpahic representation for a Single Tier Architecture. Oracle is already installed on the server. The...

View Article

Image may be NSFW.
Clik here to view.

Configure DLP to Send Email Notification to Employee's Manager

Some customers want to know whether the DLP can send an Email notification to the manager if an employee trigger an incident. The answer is Yes.This is some kind of workflow in DLP that can help the...

View Article


First Response to: Cryptolocker \ Ransomcrypt\ Encryptor

Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail...

View Article


Image may be NSFW.
Clik here to view.

How to utilize SEP 12.1 for Incident Response - PART 4

This article is a continuation of my three previous articles:How to utilize SEP 12.1 for Incident Response - PART 1How to utilize SEP 12.1 for Incident Response - PART 2How to utilize SEP 12.1 for...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Exchange ActiveSync

Microsoft Exchange ActiveSync is a way that you can send corporate emails from a mobile device. ActiveSync can send email either to recipients internal to the corporate network or outside of the...

View Article

Image may be NSFW.
Clik here to view.

Complete Process of Deploying and Enabling of Endpoint FlexResponse plug-in

Symantec Data Loss Prevention provides a set of response rule actions that you can specify to remediate an incident. These provided actions include logging, sending an email, blocking an end-user...

View Article

Image may be NSFW.
Clik here to view.

The Graphical Guide of The Failover Installation in SCSP

According to this article:https://www-secure.symantec.com/connect/articles/u...and the KB:http://www.symantec.com/business/support/index?pag...we can understand the load balance and failover in...

View Article


Image may be NSFW.
Clik here to view.

Configuring and running SharePoint server scans & How to set up Scans of...

Scans of SharePoint Servers : The Network Discover Server locates a wide range of exposed confidential data on SharePoint servers. It communicates with the Enforce Server to obtain information about...

View Article

Image may be NSFW.
Clik here to view.

Network Monitor Implementation

Network Monitor :Network Monitor accurately detects confidential information across configured network protocols and content types before it leaves the network. Real-time monitoring and reporting...

View Article


Image may be NSFW.
Clik here to view.

Collect Agent Information from SCSP Management Console

On SCSP agent, there is a script named getagentinfo.bat under the installation folder. The end-user can use this script to collect the information that needed by support to troubleshoot SCSP agent...

View Article

Killing Conficker: How to Eradicate W32.Downadup for Good

IntroductionThis is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article


Enforce Server integration with Symantec Protection Center (SPC) & How to...

Symantec Protection Center (SPC) is a common user interface which lets you centralize data and management of Symantec and third-party security products on one web console. This consolidation provides...

View Article

Image may be NSFW.
Clik here to view.

Knowledgebase Articles for Symantec Protection Engine (SPE)

The following document may be an introduction to Symantec Protection Engine for NAS (SPE for NAS) and Symantec Protection Engine for Cloud Services. The most current version of this product available...

View Article

Symantec Endpoint Protection 12.1 のサイジングと拡張性に関するベストプラクティス

Symantec Endpoint Protection はあらゆる規模の企業に対して最善のエンドポイントセキュリティを提供します。このホワイトペーパーでは、Symantec Endpoint Protection 環境を正しくサイジングして配備し、最適な保護と有用性を実現するためのベストプラクティスを説明します。 SizingSizabilityBestPractices_SEP12.1_ja.pdf

View Article
Browsing all 805 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>