Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 818 articles
Browse latest View live

Creating a Maintenance Plan for SEP database - SQL server 2008

This document describes the creation of a maintenance plan for system and SEP (Sem5) databases of SQL Server 2008. This plan is made of simple tasks that do not impact the operation of the databases....

View Article


Image may be NSFW.
Clik here to view.

The Use Case of CSP - File Watch

Symante Critical System Protection (CSP) provides policy-based behavior control and detection for server and desktop computers. Symantec Critical System Protection provides a flexible computer security...

View Article


Configuring LDAP Lookup Plugins

The LDAP Lookup Plugin pulls data from a live LDAP system (such as Microsoft Active Directory, Novell LDAP, Oracle LDAP (formerly Sun ONE), or IBM LDAP). It then uses that data to populate custom...

View Article

Creating Dashboard Reports - DLP

Creating dashboard reports : You can create custom dashboards and reports.If you are logged on as a user other than the administrator, Symantec Data Loss Prevention lets you choose whether to share...

View Article

Image may be NSFW.
Clik here to view.

Remediating Mobile incidents

Use Mobile Prevent incident reports to monitor and respond to Mobile Prevent incidents. You can save, send, export, or schedule Symantec Data Loss Prevention reports.In the Enforce Server...

View Article


Export web archive

Use this screen to save an incident list report as an archive of HTML pages. An archive allows personnel without direct access to Symantec Data Loss Prevention to study incident data, drilling down...

View Article

Image may be NSFW.
Clik here to view.

Use EDM to Create DLP Group Policy

From the previous article:https://www-secure.symantec.com/connect/articles/create-dlp-policy-special-user-groupWe introduced the method and steps to use AD to create DLP group policy.By using AD...

View Article

Integration of DLP 12.0.1 with RSA Envision 4.1

Symantec DLP 12.0.1 can also be integrated with RSA Envision 4.1 SP1.RSA Envision integration is also supported by previous Symantec DLP version 11.5, 11, and 12.I would like to share a document, where...

View Article


Image may be NSFW.
Clik here to view.

Use AD to Enroll Symantec Encryption Desktop (previously PGP Desktop)

There are two method to enroll the Symantec Encryption Desktop: by Email, or by AD.In this article, we will provide the graphic step-by-step guide for AD enrollment.1. We need to enable Directory...

View Article


Enabling and encrypting script credentials

If your script is connecting to an external system that requires credentials, you can enable credentials for your script. If you enable credentials through the user interface option, you must encrypt...

View Article

Mobile Prevent for Web Server - Basic configuration & Configuring the Mobile...

A] Mobile Prevent for Web Server - Basic configuration B] Configuring the Mobile Prevent for Web ServerA] Mobile Prevent for Web Server - Basic configuration : Detection servers are configured from...

View Article

Configuring Network Prevent Server for reflecting or forwarding mode

Use the following instructions to configure Network Prevent Server to operate either in reflecting or forwarding mode.To configure the Network Prevent Server : Procedure Step 1 :  Log on to the Enforce...

View Article

Image may be NSFW.
Clik here to view.

Create Remote IDM Using Copy of RDX Files

In some enterprise environment, the sensitive documents that needs to be protected by IDM, are locate in some kind of restricted area. The DLP Enforce cannot access these files logically/physically, or...

View Article


Image may be NSFW.
Clik here to view.

How Symantec Data Loss Prevention for Mobile works & How to Implement

 Symantec Data Loss Prevention for Mobile connects to your corporate network through Wi-Fi access or through cellular 3G connectivity. Network traffic for Webmail, third-party applications such as...

View Article

Image may be NSFW.
Clik here to view.

Using Symantec Help (SymHelp) Tool, how do we Collect the Suspicious Files...

Hello,In case if you are running the Legacy SEP Support Tool, please follow the Instructions provided in the...

View Article


Image may be NSFW.
Clik here to view.

Using SymHelp, how do we collect the Load Point Analysis Logs and Submit the...

Hello,SymHelp is a cross-product diagnostic utility designed for troubleshooting and identifying common issues that customers encounter.SymHelp is designed to support the Symantec Endpoint Protection...

View Article

Submitting information about detections to Symantec Security Response

Submitting information about detections to Symantec Security Response We can configure your computer to automatically submit information about detections to Symantec Security Response for analysis....

View Article


Image may be NSFW.
Clik here to view.

How to utilize SEP 12.1 for Incident Response - PART 4

This article is a continuation of my three previous articles:How to utilize SEP 12.1 for Incident Response - PART 1How to utilize SEP 12.1 for Incident Response - PART 2How to utilize SEP 12.1 for...

View Article

First Response to: Cryptolocker \ Ransomcrypt\ Encryptor

Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail...

View Article

How to find Suspected Threats on your computer.

There are two most powerful tools from Sysinternals that can help us lot in our search for suspected threats on our systems. 1. Autoruns for Windows 2. ProcexpAUTORUNS : You can download Autoruns for...

View Article
Browsing all 818 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>