Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 818 articles
Browse latest View live

Symantec DLP Endpoint Deployment & Challenges

Note: These slides were presented at the June 16 meeting of the Las Vegas DLP User Group. This information is the experience of a customer, so the procedures used were his and are not those of...

View Article


Implementing HKEY_USERS check in CCS “CIS Microsoft Windows Server 2012 V...

As of SCU2016-1 there is only “CIS Microsoft Windows Server 2012 V 1.0.0” standard in Predefined folder which is currently few years old and lagging behind latest CIS benchmarks:CIS Microsoft Windows...

View Article


Best practices to follow prior to performing Symantec Disk Encryption

Symantec Endpoint Encryption v11.0.1 [ Knowledge Base ] Best practices to follow prior to performing Symantec Disk Encryption  The following best practices are recommended for preparing to encrypt your...

View Article

Image may be NSFW.
Clik here to view.

Creating a Windows PE (WinPE) Bootable Recovery Disk/USB for Symantec...

Creating a Windows PE (WinPE) Image for SEE Recovery1. Open Deployment and Imaging Tools Environment (Run As Administrator)If you don’t have to obtain and install from the following linkDownload WinPE:...

View Article

Image may be NSFW.
Clik here to view.

Symantec Endpoint Encryption v11.0.1 Recovery Procedure from an Unexpected...

Symantec Endpoint Encryption v11.0.1 Recovery Procedure from an UnExpected corruption of OS. Important Note: Do & Don’ts for Symantec Endpoint Encryption=> Never format “C” drive or System Boot...

View Article


Image may be NSFW.
Clik here to view.

Upgrade Symantec Messaging Gateway Locally

We can upgrade Symantec Messaging Gateway (SMG) without Internet access.Since version 10, we can upgrade SMG locally.Here are the steps:Preparation:1. Install IIS on a Windows OS which located on the...

View Article

The union of LinkedIn & Microsoft Office Federation: A pain no less than...

The heading itself is appealing enough, for most of us to immediately agree and even guess what I am about to write next. The cloud brokers, CASB and changing demographics overall are going to make...

View Article

Image may be NSFW.
Clik here to view.

Sequence Makes Sense

IntroductionThis is the fourteenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article


Risk-assessment solution design study

We are looking for CISOs and Information Security Managers to participate to one-on-one design feedback sessions for a new cloud-based risk assessment solution.Details:Sessions are 1:1 over WebEx and...

View Article


Common Console User Research

We are conducting user research to inform the on-going development of our common cloud console. As we migrate several product lines onto a new common platform, we want to better understand the users...

View Article

Symantec EP Security (Endpoint Security Antivirus)

Symantec Endpoint Protection defends businesses from both malware and targeted attacks—protecting against new and unknown threats.Symantec Endpoint Protection uses Symantec’s Insight platform to...

View Article

Image may be NSFW.
Clik here to view.

Symantec Security Insights Monthly Newsletter | July 2016

Please click here to view the current Symantec Security Insights newsletter.Thank you!Abstract blue squares

View Article

Image may be NSFW.
Clik here to view.

Find Out What Events Symantec is Attending!

Click here to visit the site on Symantec.com.go-into-the-light

View Article


Symantec Launches Control Compliance Suite to Help Companies Move to Agile IT...

Customers Can Now Integrate Compliance Monitoring Into Their Evolving DevOps ProcessMOUNTAIN VIEW, Calif. – July 20, 2016 – Symantec Corp. (NASDAQ: SYMC), the global leader in cybersecurity, today...

View Article

DLP and business activities with third party

The DLP is not, as some may imagine, blocking the release of all confidential data, because in a lot of companies, even the most sensitive information must be transferred to third parties for...

View Article


DLP Policy tuning

The tuning of DLP policy is a mandatory task that will better protect your information assets and simplify the activity of those to assess DLP incidents.Unfortunately there are no magic rules or tools...

View Article

Symantec Email Quarantine - How to setup

The attached document will give you an overview on how to setup the Symantec Email Quarantine.*NEW* Symantec Email Quarantine v1.5 - How to Setup the Email Quarantine (Step by Step)*NEW* Symantec Email...

View Article


Image may be NSFW.
Clik here to view.

Enabling blocked files via custom script feature

Have you ever tried performing compliance check using CCS Agent against Unix password files – for example, to verify there are no passwords in /etc/passwd*, empty password field in /etc/shadow or just...

View Article

Image may be NSFW.
Clik here to view.

SEPM 12.x to SEPM 14.0 Upgrade process graphical overview with Embedded database

Hi,This is SEPM 12.x (12.1 RU6 MP6) login screenStop the 12.x Symantec Endpoint Protection Manager Service before starting upgrade process.You can download Symantec Endpoint Protection from Symantec...

View Article

Mobile Forensics in a Corporate Environment

Presenation given by Laura Morgan at the October 2016 Las Vegas DLP User Group meetingMobile Forensics in a Corporate Environment2.pptx

View Article
Browsing all 818 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>