Creating a Maintenance Plan for SEP database - SQL server 2008
This document describes the creation of a maintenance plan for system and SEP (Sem5) databases of SQL Server 2008. This plan is made of simple tasks that do not impact the operation of the databases....
View ArticleThe Use Case of CSP - File Watch
Symante Critical System Protection (CSP) provides policy-based behavior control and detection for server and desktop computers. Symantec Critical System Protection provides a flexible computer security...
View ArticleConfiguring LDAP Lookup Plugins
The LDAP Lookup Plugin pulls data from a live LDAP system (such as Microsoft Active Directory, Novell LDAP, Oracle LDAP (formerly Sun ONE), or IBM LDAP). It then uses that data to populate custom...
View ArticleCreating Dashboard Reports - DLP
Creating dashboard reports : You can create custom dashboards and reports.If you are logged on as a user other than the administrator, Symantec Data Loss Prevention lets you choose whether to share...
View ArticleRemediating Mobile incidents
Use Mobile Prevent incident reports to monitor and respond to Mobile Prevent incidents. You can save, send, export, or schedule Symantec Data Loss Prevention reports.In the Enforce Server...
View ArticleExport web archive
Use this screen to save an incident list report as an archive of HTML pages. An archive allows personnel without direct access to Symantec Data Loss Prevention to study incident data, drilling down...
View ArticleUse EDM to Create DLP Group Policy
From the previous article:https://www-secure.symantec.com/connect/articles/create-dlp-policy-special-user-groupWe introduced the method and steps to use AD to create DLP group policy.By using AD...
View ArticleIntegration of DLP 12.0.1 with RSA Envision 4.1
Symantec DLP 12.0.1 can also be integrated with RSA Envision 4.1 SP1.RSA Envision integration is also supported by previous Symantec DLP version 11.5, 11, and 12.I would like to share a document, where...
View ArticleUse AD to Enroll Symantec Encryption Desktop (previously PGP Desktop)
There are two method to enroll the Symantec Encryption Desktop: by Email, or by AD.In this article, we will provide the graphic step-by-step guide for AD enrollment.1. We need to enable Directory...
View ArticleEnabling and encrypting script credentials
If your script is connecting to an external system that requires credentials, you can enable credentials for your script. If you enable credentials through the user interface option, you must encrypt...
View ArticleMobile Prevent for Web Server - Basic configuration & Configuring the Mobile...
A] Mobile Prevent for Web Server - Basic configuration B] Configuring the Mobile Prevent for Web ServerA] Mobile Prevent for Web Server - Basic configuration : Detection servers are configured from...
View ArticleConfiguring Network Prevent Server for reflecting or forwarding mode
Use the following instructions to configure Network Prevent Server to operate either in reflecting or forwarding mode.To configure the Network Prevent Server : Procedure Step 1 : Log on to the Enforce...
View ArticleCreate Remote IDM Using Copy of RDX Files
In some enterprise environment, the sensitive documents that needs to be protected by IDM, are locate in some kind of restricted area. The DLP Enforce cannot access these files logically/physically, or...
View ArticleHow Symantec Data Loss Prevention for Mobile works & How to Implement
Symantec Data Loss Prevention for Mobile connects to your corporate network through Wi-Fi access or through cellular 3G connectivity. Network traffic for Webmail, third-party applications such as...
View ArticleUsing Symantec Help (SymHelp) Tool, how do we Collect the Suspicious Files...
Hello,In case if you are running the Legacy SEP Support Tool, please follow the Instructions provided in the...
View ArticleUsing SymHelp, how do we collect the Load Point Analysis Logs and Submit the...
Hello,SymHelp is a cross-product diagnostic utility designed for troubleshooting and identifying common issues that customers encounter.SymHelp is designed to support the Symantec Endpoint Protection...
View ArticleSubmitting information about detections to Symantec Security Response
Submitting information about detections to Symantec Security Response We can configure your computer to automatically submit information about detections to Symantec Security Response for analysis....
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 4
This article is a continuation of my three previous articles:How to utilize SEP 12.1 for Incident Response - PART 1How to utilize SEP 12.1 for Incident Response - PART 2How to utilize SEP 12.1 for...
View ArticleFirst Response to: Cryptolocker \ Ransomcrypt\ Encryptor
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail...
View ArticleHow to find Suspected Threats on your computer.
There are two most powerful tools from Sysinternals that can help us lot in our search for suspected threats on our systems. 1. Autoruns for Windows 2. ProcexpAUTORUNS : You can download Autoruns for...
View Article