Quantcast
Channel: Symantec Connect - Security - Articles
Browsing all 397 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

User Authentication Product Family

WHAT IS USER AUTHENTICATION?Protect access to your networks and websites with strong user authentication by combining multiple identification factors together for enhanced security. Choose from a range...

View Article


Image may be NSFW.
Clik here to view.

How to uninstall Symantec Endpoint Protection client for Linux

Hi,This article will demonstrate how to uninstall Symantec Endpoint Protection on Red Hat Linux machine..You must have superuser privileges to uninstall the Symantec Endpoint Protection client on the...

View Article


UK Government Identity Assurance

GOV.UK: Verify is the UK govenment replacement to the current government gateway ID solution. The GDS (Government Digital Services) as due to release the framework 2 at the end of November 2014 for...

View Article

Image may be NSFW.
Clik here to view.

IT Analytics for Data Loss Prevention - Custom Attribute Utility

IT Analytics DLP pack offers several predefined cubes out-of-the-box.  As part of the DLP pack, the custom attribute name and custom attribute value dimension are included.  These two dimensions...

View Article

GOV.UK: Verify - Market Engagement Event

Slide deck from the GOV.UK: verify market enagement event in October 2014Market_Engagement_Day_30_October_2014_FINAL__2_.pdf

View Article


Image may be NSFW.
Clik here to view.

How to set up a Serverless (Standalone) installation of Symantec Endpoint...

Before we begin, I would like to let the reader know that the product for standalone drive encryption installations is Symantec Encryption Desktop.  This guide is intended for managed environments...

View Article

Image may be NSFW.
Clik here to view.

How to test SEP 12.1 components for functionality

Often times we deploy SEP 12.1 to clients and assume the components are functioning correctly. While the majority of the time this is true, it never hurts to spot check clients to ensure they're...

View Article

Image may be NSFW.
Clik here to view.

How to Configure Scan Exclusions in SEP for Linux

With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). However, some folder exclusions still have to be configured via the...

View Article


How to cleanup excessive disk usage on SEPM and SEP client 12.1.xxx

A. Take a Backup of Database OR Follow the Disaster Recovery Steps for 12.1 http://www.symantec.com/docs/TECH160736  B. Symantec Endpoint Protection – How to cleanup excessive disk usage  This document...

View Article


How to move SEPM 12.1.xxx from C drive to x drive:

How to move SEPM from C drive to x drive:  The best course of action in this situation would be to run a disaster recovery on the SEPM, and reinstall SEPM directly on another drive. Here are the steps...

View Article

Image may be NSFW.
Clik here to view.

How to utilize SEP 12.1 for Incident Response - PART 6

This article is the sixth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous five are below:How to utilize SEP 12.1 for Incident...

View Article

Symantec Messaging Gateway and TLS in a post-POODLE Internet

SSL has long been the foundation of secure Internet communications. At the tail end of 2014, several vulnerability postings battered and bruised the SSL protocol and a POODLE was a primary wagger of...

View Article

Image may be NSFW.
Clik here to view.

If you are using Symantec DLP, you should be using IT Analytics

Overview of IT AnalyticsIT Analytics provides cube based reporting (pivot tables), additional reports, and Key Peformance Indicators (KPIs) for various Symantec products:Symantec IT Management Suite...

View Article


SEPM Day to Day Administration work (v12.1.5)

You’ve installed & set up the SEPM console. You’ve also deployed the SEP clients to PCs across the network. The job is done… or so you thought. While it can ‘run’ itself most of the time, there are...

View Article

HOWTO: Submitting suspect file/virus to Symantec to receive Rapid Release...

Note: This is based on SEPM v12.1.5 console.Your SEPM installation is running smoothly. There are no alerts going off from the Home page of the SEPM console. You sit back, feeling very pleased about...

View Article


Important Information re: SEP 11 EOSL and Discontinuation of SEP 11 Virus...

Partners,Your customers may be experiencing issues pertaining to one or both of the following: SEP 11 End of Service Life Discontinuation of SEP 11 Virus DefinitionsThe below tools are available to...

View Article

Image may be NSFW.
Clik here to view.

How to utilize SEP 12.1 for Incident Response - PART 7

This article is the seventh installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous six are below:How to utilize SEP 12.1 for Incident...

View Article


Image may be NSFW.
Clik here to view.

Symantec Endpoint Protection interactions with network drives

FAQScanning of network drivesQ. Does an Administrator-Defined Scan scan the mapped network drives?A. No, it does not. However, if a file located on the network drive is run locally on the client...

View Article

The importance of orchestrated “cloud” security

The importance of orchestrated “cloud” securityIn today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could...

View Article

Image may be NSFW.
Clik here to view.

All About Grayware

IntroductionThis is the seventh of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article
Browsing all 397 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>