Feature comparison between SEP 12.1 SBE and EE
Updated on 27th Dec'12Hi,This slide provides a summary of major features and compare the SEP 12.1 Small business Edition and SEP 12.1 Enterprise Edition. FeatureSmall business EditionEnterprise...
View ArticleWhat Variables can be used within Response Rules
Whether you setup a response rule for email notification or send a notification to a syslog server, you can set up response action variables to pass incident specific data. The response action...
View ArticleSymantec Endpoint Protection: Custom Scanning by Drive Letter
Overview:When it comes to creating and configuring administrator-defined scans in the Symantec Endpoint Protection Manager, sometimes there isn't quite enough granularity. For example, let's say that...
View ArticleApplication Monitoring
Application monitoring lets you monitor third-party applications for IM, email, or HTTP/S clients. By default, Symantec Data Loss Prevention only monitors first-party applications such as AIM,...
View ArticleSymantec Endpoint Protection: Modifying the XML-based Policies for Increased...
Overview: While you may not realize it, any .dat policy exported from the Symantec Endpoint Protection Manager is simply a compressed XML file. By changing the extension from .dat to .zip, you gain...
View ArticleThe Remote EDM Indexer
The Remote EDM Indexer is a utility that converts a comma-separated value, or tab-delimited, data file to an Exact Data Matching index. The utility is similar to the local EDM Indexer used by the...
View ArticlePre-install check list for Symantec Mail Security for Microsoft Exchange
If you want to install Symantec Mail Security for Microsoft Exchange, you need to do and check these before the installation:Make sure that the server, or servers, on which you plan to install the...
View ArticleIntroduction to the Log Types of Symantec Messaging Gateway
Symantec Messaging Gateway logs let you monitor events for your Scanners, the Control Center, Directory Data Service, and Spam Quarantine.Be familiar with these log file will be great help to...
View ArticleSymantec Insider Tip: Successful Submissions!
IntroductionThis is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleWhitepaper-Virtual Desktop Infrastructure for Citrix SEP
Hello Everyone,This whitepaper focuses strictly on providing guidance on how to successfully deploy the Symantec Endpoint Protection 12.1 protection stack components to a Citrix VDI Environment. This...
View ArticleSEPM 11.x to SEPM 12.1 Upgrade process graphical overview with SQL database
This article will demonstrate the upgrade process from the SEPM 11 RU7 MP2 to SEPM 12.1 RU4 MP1a version.Download the latest software from...
View ArticleThe sslkeytool utility and server certificates
Symantec Data Loss Prevention uses Secure Socket Layer/Transport Layer Security (SSL/TLS) to encrypt all data that is transmitted between servers. Symantec Data Loss Prevention also uses the SSL/TLS...
View ArticleDisaster Recovery for Symantec Endpoint Protection Manager 12.1.x with...
IssueThe SEPM server needs to be reinstalled and reconnected to its existing SQL Database.SolutionNote: Only the screen shots for the most important steps are shown.1. Save the recovery file from the...
View ArticleThe SQL Preindexer
This article describes how to use the SQL Preindexer. The SQL Preindexer utility is always used with the Remote EDM Indexer utility. It is installed in the \Vontu\Protect\bin directory during...
View ArticlePolicy Violation Data Headers
A message might violate more than one policy. You can add special headers to the outgoing messages that report the number and severity of policies the message violates. Three different kinds of...
View ArticleThe CSV Lookup Plugin
The CSV Lookup Plugin extracts data from a comma-separated values (CSV) file stored on the Enforce Server. The plugin uses data from the CSV file to populate custom attributes for an incident at the...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 5
This article is the fifth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous four are below:How to utilize SEP 12.1 for Incident...
View ArticleIntroduction to SMG Components and Add SMG Scanner into Control Center
Symantec Messaging Gateway software consists of the following subcomponents:ScannerControl CenterScanners do the following tasks:Process the inbound messages and outbound messages and route messages...
View ArticleSymantec Endpoint Protection Manager's executable batch files
Hello,If not able to start any of the following wizard through navigation path, alternately can attempt to start by executing batch files directly.Database Backup & Restore Wizard Migration...
View ArticleDeploy the Data Loss Prevention 12.5 (DLP) Agent using Software Management...
The challenge with SMP 7.5 is that the DLP agent is no longer an integrated agent component or plug-in to the Symantec Management Agent (refer to the KB article HOWTO92275:...
View Article