Symantec DLP Endpoint Deployment & Challenges
Note: These slides were presented at the June 16 meeting of the Las Vegas DLP User Group. This information is the experience of a customer, so the procedures used were his and are not those of...
View ArticleImplementing HKEY_USERS check in CCS “CIS Microsoft Windows Server 2012 V...
As of SCU2016-1 there is only “CIS Microsoft Windows Server 2012 V 1.0.0” standard in Predefined folder which is currently few years old and lagging behind latest CIS benchmarks:CIS Microsoft Windows...
View ArticleBest practices to follow prior to performing Symantec Disk Encryption
Symantec Endpoint Encryption v11.0.1 [ Knowledge Base ] Best practices to follow prior to performing Symantec Disk Encryption The following best practices are recommended for preparing to encrypt your...
View ArticleCreating a Windows PE (WinPE) Bootable Recovery Disk/USB for Symantec...
Creating a Windows PE (WinPE) Image for SEE Recovery1. Open Deployment and Imaging Tools Environment (Run As Administrator)If you don’t have to obtain and install from the following linkDownload WinPE:...
View ArticleSymantec Endpoint Encryption v11.0.1 Recovery Procedure from an Unexpected...
Symantec Endpoint Encryption v11.0.1 Recovery Procedure from an UnExpected corruption of OS. Important Note: Do & Don’ts for Symantec Endpoint Encryption=> Never format “C” drive or System Boot...
View ArticleUpgrade Symantec Messaging Gateway Locally
We can upgrade Symantec Messaging Gateway (SMG) without Internet access.Since version 10, we can upgrade SMG locally.Here are the steps:Preparation:1. Install IIS on a Windows OS which located on the...
View ArticleThe union of LinkedIn & Microsoft Office Federation: A pain no less than...
The heading itself is appealing enough, for most of us to immediately agree and even guess what I am about to write next. The cloud brokers, CASB and changing demographics overall are going to make...
View ArticleSequence Makes Sense
IntroductionThis is the fourteenth in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleRisk-assessment solution design study
We are looking for CISOs and Information Security Managers to participate to one-on-one design feedback sessions for a new cloud-based risk assessment solution.Details:Sessions are 1:1 over WebEx and...
View ArticleCommon Console User Research
We are conducting user research to inform the on-going development of our common cloud console. As we migrate several product lines onto a new common platform, we want to better understand the users...
View ArticleSymantec EP Security (Endpoint Security Antivirus)
Symantec Endpoint Protection defends businesses from both malware and targeted attacks—protecting against new and unknown threats.Symantec Endpoint Protection uses Symantec’s Insight platform to...
View ArticleSymantec Security Insights Monthly Newsletter | July 2016
Please click here to view the current Symantec Security Insights newsletter.Thank you!Abstract blue squares
View ArticleFind Out What Events Symantec is Attending!
Click here to visit the site on Symantec.com.go-into-the-light
View ArticleSymantec Launches Control Compliance Suite to Help Companies Move to Agile IT...
Customers Can Now Integrate Compliance Monitoring Into Their Evolving DevOps ProcessMOUNTAIN VIEW, Calif. – July 20, 2016 – Symantec Corp. (NASDAQ: SYMC), the global leader in cybersecurity, today...
View ArticleDLP and business activities with third party
The DLP is not, as some may imagine, blocking the release of all confidential data, because in a lot of companies, even the most sensitive information must be transferred to third parties for...
View ArticleDLP Policy tuning
The tuning of DLP policy is a mandatory task that will better protect your information assets and simplify the activity of those to assess DLP incidents.Unfortunately there are no magic rules or tools...
View ArticleSymantec Email Quarantine - How to setup
The attached document will give you an overview on how to setup the Symantec Email Quarantine.*NEW* Symantec Email Quarantine v1.5 - How to Setup the Email Quarantine (Step by Step)*NEW* Symantec Email...
View ArticleEnabling blocked files via custom script feature
Have you ever tried performing compliance check using CCS Agent against Unix password files – for example, to verify there are no passwords in /etc/passwd*, empty password field in /etc/shadow or just...
View ArticleSEPM 12.x to SEPM 14.0 Upgrade process graphical overview with Embedded database
Hi,This is SEPM 12.x (12.1 RU6 MP6) login screenStop the 12.x Symantec Endpoint Protection Manager Service before starting upgrade process.You can download Symantec Endpoint Protection from Symantec...
View ArticleMobile Forensics in a Corporate Environment
Presenation given by Laura Morgan at the October 2016 Las Vegas DLP User Group meetingMobile Forensics in a Corporate Environment2.pptx
View Article