Quantcast
Channel: Symantec Connect - Security - Articles
Browsing all 397 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Symantec Endpoint Encryption v11.0.1 Recovery Procedure from an Unexpected...

Symantec Endpoint Encryption v11.0.1 Recovery Procedure from an UnExpected corruption of OS. Important Note: Do & Don’ts for Symantec Endpoint Encryption=> Never format “C” drive or System Boot...

View Article


Image may be NSFW.
Clik here to view.

Upgrade Symantec Messaging Gateway Locally

We can upgrade Symantec Messaging Gateway (SMG) without Internet access.Since version 10, we can upgrade SMG locally.Here are the steps:Preparation:1. Install IIS on a Windows OS which located on the...

View Article


The union of LinkedIn & Microsoft Office Federation: A pain no less than...

The heading itself is appealing enough, for most of us to immediately agree and even guess what I am about to write next. The cloud brokers, CASB and changing demographics overall are going to make...

View Article

Image may be NSFW.
Clik here to view.

Sequence Makes Sense

IntroductionThis is the fourteenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

Risk-assessment solution design study

We are looking for CISOs and Information Security Managers to participate to one-on-one design feedback sessions for a new cloud-based risk assessment solution.Details:Sessions are 1:1 over WebEx and...

View Article


Common Console User Research

We are conducting user research to inform the on-going development of our common cloud console. As we migrate several product lines onto a new common platform, we want to better understand the users...

View Article

Symantec EP Security (Endpoint Security Antivirus)

Symantec Endpoint Protection defends businesses from both malware and targeted attacks—protecting against new and unknown threats.Symantec Endpoint Protection uses Symantec’s Insight platform to...

View Article

Image may be NSFW.
Clik here to view.

Symantec Security Insights Monthly Newsletter | July 2016

Please click here to view the current Symantec Security Insights newsletter.Thank you!Abstract blue squares

View Article


Image may be NSFW.
Clik here to view.

Find Out What Events Symantec is Attending!

Click here to visit the site on Symantec.com.go-into-the-light

View Article


Symantec Launches Control Compliance Suite to Help Companies Move to Agile IT...

Customers Can Now Integrate Compliance Monitoring Into Their Evolving DevOps ProcessMOUNTAIN VIEW, Calif. – July 20, 2016 – Symantec Corp. (NASDAQ: SYMC), the global leader in cybersecurity, today...

View Article

DLP and business activities with third party

The DLP is not, as some may imagine, blocking the release of all confidential data, because in a lot of companies, even the most sensitive information must be transferred to third parties for...

View Article

DLP Policy tuning

The tuning of DLP policy is a mandatory task that will better protect your information assets and simplify the activity of those to assess DLP incidents.Unfortunately there are no magic rules or tools...

View Article

Symantec Email Quarantine - How to setup

The attached document will give you an overview on how to setup the Symantec Email Quarantine.*NEW* Symantec Email Quarantine v1.5 - How to Setup the Email Quarantine (Step by Step)*NEW* Symantec Email...

View Article


Image may be NSFW.
Clik here to view.

Enabling blocked files via custom script feature

Have you ever tried performing compliance check using CCS Agent against Unix password files – for example, to verify there are no passwords in /etc/passwd*, empty password field in /etc/shadow or just...

View Article

Image may be NSFW.
Clik here to view.

SEPM 12.x to SEPM 14.0 Upgrade process graphical overview with Embedded database

Hi,This is SEPM 12.x (12.1 RU6 MP6) login screenStop the 12.x Symantec Endpoint Protection Manager Service before starting upgrade process.You can download Symantec Endpoint Protection from Symantec...

View Article


Mobile Forensics in a Corporate Environment

Presenation given by Laura Morgan at the October 2016 Las Vegas DLP User Group meetingMobile Forensics in a Corporate Environment2.pptx

View Article

Image may be NSFW.
Clik here to view.

DCS 6.5 agent not updating policy.

Ensure that the DCS IPS Driver is running and loaded (SISIPSService):If the service is running, the agent version is below "6.5.0.498", and is not receiving policy updates then the Hot Fix 9 agent...

View Article


Image may be NSFW.
Clik here to view.

SEPM 14.0 Fresh install with Embedded database - graphical overview

Hello Everyone,This article will demonstrate how to install SEP 14.0 (14.0.1904.0000) Enterprise Edition using Embedded database. Note: SEPM can be installed on 64 bit operating systems only. Let's see...

View Article

Image may be NSFW.
Clik here to view.

SEPM 14.0 Fresh install with SQL database - graphical overview

Hello Everyone,This article will demonstrate how to install SEP 14.0 (14.0.1904.0000) Enterprise Edition using Embedded database. Note: SEPM can be installed on 64 bit operating systems only. Let's see...

View Article

DLP and privacy

In many countries, privacy is not limited to your company borders. In order to implement DLP in these countries, it is necessary to be cautious on many aspect otherwise you will not be able to...

View Article
Browsing all 397 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>