User Authentication Product Family
WHAT IS USER AUTHENTICATION?Protect access to your networks and websites with strong user authentication by combining multiple identification factors together for enhanced security. Choose from a range...
View ArticleHow to uninstall Symantec Endpoint Protection client for Linux
Hi,This article will demonstrate how to uninstall Symantec Endpoint Protection on Red Hat Linux machine..You must have superuser privileges to uninstall the Symantec Endpoint Protection client on the...
View ArticleUK Government Identity Assurance
GOV.UK: Verify is the UK govenment replacement to the current government gateway ID solution. The GDS (Government Digital Services) as due to release the framework 2 at the end of November 2014 for...
View ArticleIT Analytics for Data Loss Prevention - Custom Attribute Utility
IT Analytics DLP pack offers several predefined cubes out-of-the-box. As part of the DLP pack, the custom attribute name and custom attribute value dimension are included. These two dimensions...
View ArticleGOV.UK: Verify - Market Engagement Event
Slide deck from the GOV.UK: verify market enagement event in October 2014Market_Engagement_Day_30_October_2014_FINAL__2_.pdf
View ArticleHow to set up a Serverless (Standalone) installation of Symantec Endpoint...
Before we begin, I would like to let the reader know that the product for standalone drive encryption installations is Symantec Encryption Desktop. This guide is intended for managed environments...
View ArticleHow to test SEP 12.1 components for functionality
Often times we deploy SEP 12.1 to clients and assume the components are functioning correctly. While the majority of the time this is true, it never hurts to spot check clients to ensure they're...
View ArticleHow to Configure Scan Exclusions in SEP for Linux
With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). However, some folder exclusions still have to be configured via the...
View ArticleHow to cleanup excessive disk usage on SEPM and SEP client 12.1.xxx
A. Take a Backup of Database OR Follow the Disaster Recovery Steps for 12.1 http://www.symantec.com/docs/TECH160736 B. Symantec Endpoint Protection – How to cleanup excessive disk usage This document...
View ArticleHow to move SEPM 12.1.xxx from C drive to x drive:
How to move SEPM from C drive to x drive: The best course of action in this situation would be to run a disaster recovery on the SEPM, and reinstall SEPM directly on another drive. Here are the steps...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 6
This article is the sixth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous five are below:How to utilize SEP 12.1 for Incident...
View ArticleSymantec Messaging Gateway and TLS in a post-POODLE Internet
SSL has long been the foundation of secure Internet communications. At the tail end of 2014, several vulnerability postings battered and bruised the SSL protocol and a POODLE was a primary wagger of...
View ArticleIf you are using Symantec DLP, you should be using IT Analytics
Overview of IT AnalyticsIT Analytics provides cube based reporting (pivot tables), additional reports, and Key Peformance Indicators (KPIs) for various Symantec products:Symantec IT Management Suite...
View ArticleSEPM Day to Day Administration work (v12.1.5)
You’ve installed & set up the SEPM console. You’ve also deployed the SEP clients to PCs across the network. The job is done… or so you thought. While it can ‘run’ itself most of the time, there are...
View ArticleHOWTO: Submitting suspect file/virus to Symantec to receive Rapid Release...
Note: This is based on SEPM v12.1.5 console.Your SEPM installation is running smoothly. There are no alerts going off from the Home page of the SEPM console. You sit back, feeling very pleased about...
View ArticleImportant Information re: SEP 11 EOSL and Discontinuation of SEP 11 Virus...
Partners,Your customers may be experiencing issues pertaining to one or both of the following: SEP 11 End of Service Life Discontinuation of SEP 11 Virus DefinitionsThe below tools are available to...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 7
This article is the seventh installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous six are below:How to utilize SEP 12.1 for Incident...
View ArticleSymantec Endpoint Protection interactions with network drives
FAQScanning of network drivesQ. Does an Administrator-Defined Scan scan the mapped network drives?A. No, it does not. However, if a file located on the network drive is run locally on the client...
View ArticleThe importance of orchestrated “cloud” security
The importance of orchestrated “cloud” securityIn today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could...
View ArticleAll About Grayware
IntroductionThis is the seventh of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View Article