Protection Suite Product Family
What is Protection Suite?Powered by Symantec Insight, Protection Suite protects with the industry's fastest, most-effective endpoint security, combined with industry-leading messaging protection and...
View ArticleSSL Certificates Product Family
WHAT ARE SSL CERTIFICATES?Symantec Website Security Solutions has an extensive SSL certificate product offering. Whether you need 1 certificate or 15,000 and enterprise management, we’ve got a product...
View ArticleSymantec .cloud Product Family
What is Symantec.cloud?Symantec.cloud services provide essential protection while virtually eliminating the need to manage hardware and software on site.SECURITYEmail Security.cloudSymantec ISO...
View ArticleUser Authentication Product Family
WHAT IS USER AUTHENTICATION?Protect access to your networks and websites with strong user authentication by combining multiple identification factors together for enhanced security. Choose from a range...
View ArticleUK Government Identity Assurance
GOV.UK: Verify is the UK govenment replacement to the current government gateway ID solution. The GDS (Government Digital Services) as due to release the framework 2 at the end of November 2014 for...
View ArticleIT Analytics for Data Loss Prevention - Custom Attribute Utility
IT Analytics DLP pack offers several predefined cubes out-of-the-box. As part of the DLP pack, the custom attribute name and custom attribute value dimension are included. These two dimensions...
View ArticleGOV.UK: Verify - Market Engagement Event
Slide deck from the GOV.UK: verify market enagement event in October 2014Market_Engagement_Day_30_October_2014_FINAL__2_.pdf
View ArticleHow to set up a Serverless (Standalone) installation of Symantec Endpoint...
Before we begin, I would like to let the reader know that the preferred product for standalone installations is Symantec Encryption Desktop. This guide is intended for managed environments already...
View ArticleHow to test SEP 12.1 components for functionality
Often times we deploy SEP 12.1 to clients and assume the components are functioning correctly. While the majority of the time this is true, it never hurts to spot check clients to ensure they're...
View ArticleHow to Configure Scan Exclusions in SEP for Linux
With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). However, some folder exclusions still have to be configured via the...
View ArticleHow to cleanup excessive disk usage on SEPM and SEP client 12.1.xxx
A. Take a Backup of Database OR Follow the Disaster Recovery Steps for 12.1 http://www.symantec.com/docs/TECH160736 B. Symantec Endpoint Protection – How to cleanup excessive disk usage This document...
View ArticleHow to move SEPM 12.1.xxx from C drive to x drive:
How to move SEPM from C drive to x drive: The best course of action in this situation would be to run a disaster recovery on the SEPM, and reinstall SEPM directly on another drive. Here are the steps...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 6
This article is the sixth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous five are below:How to utilize SEP 12.1 for Incident...
View ArticleSymantec Messaging Gateway and TLS in a post-POODLE Internet
SSL has long been the foundation of secure Internet communications. At the tail end of 2014, several vulnerability postings battered and bruised the SSL protocol and a POODLE was a primary wagger of...
View ArticleIf you are using Symantec DLP, you should be using IT Analytics
Overview of IT AnalyticsIT Analytics provides cube based reporting (pivot tables), additional reports, and Key Peformance Indicators (KPIs) for various Symantec products:Symantec IT Management Suite...
View ArticleSEPM Day to Day Administration work (v12.1.5)
You’ve installed & set up the SEPM console. You’ve also deployed the SEP clients to PCs across the network. The job is done… or so you thought. While it can ‘run’ itself most of the time, there are...
View ArticleHOWTO: Submitting suspect file/virus to Symantec to receive Rapid Release...
Note: This is based on SEPM v12.1.5 console.Your SEPM installation is running smoothly. There are no alerts going off from the Home page of the SEPM console. You sit back, feeling very pleased about...
View ArticleImportant Information re: SEP 11 EOSL and Discontinuation of SEP 11 Virus...
Partners,Your customers may be experiencing issues pertaining to one or both of the following: SEP 11 End of Service Life Discontinuation of SEP 11 Virus DefinitionsThe below tools are available to...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 7
This article is the seventh installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous six are below:How to utilize SEP 12.1 for Incident...
View ArticleSymantec Endpoint Protection interactions with network drives
FAQScanning of network drivesQ. Does an Administrator-Defined Scan scan the mapped network drives?A. No, it does not. However, if a file located on the network drive is run locally on the client...
View Article