Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 818 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to point DCS Server to migrated SQL database.

After the SQL database has been migrated to a new instance the "server.xml" file will need to be updated with the new database information. The default location of this file on the DCS Server is as...

View Article


Image may be NSFW.
Clik here to view.

How to collect and add fingerprint of any app or location to SEP manager...

Hi all,In this article, I will explain the procedure to collect file fingerprint of any file or location within the system and add the same to Symantec Endpoint Protection Manager.So, Let's get...

View Article


Image may be NSFW.
Clik here to view.

Ransomware Discovery

Hi All,Theseday we are hearing many cases of ransomware infection which is not only badly impacts bussiness but also the crticial data. As this virus encrypt the sensetive data with private key...

View Article

Image may be NSFW.
Clik here to view.

How to install SEPM 14 MP1 with embedded database (Graphical)

Dear all,This tutorial will give the overall ideal on how to install newly available Symantec Endpoint Protection 14 MP1 with embedded database.So lets get started -Step 1 - Download and extract the...

View Article

Image may be NSFW.
Clik here to view.

How to disable Device Control switch option in SEP 14.0 for Mac

Steps to disable Device Control switch option in SEP 14.0 for Mac within Client Management Settings.From version SEP for Mac 14.0.x & later, there is now an switch option to enable/disable for...

View Article


Image may be NSFW.
Clik here to view.

Ransomware Preventive Methodology

Hi All,As I shared the little research, history and different ways how ransomware propagates into the network and system, now this article will be focused on prevention methodology which is prepared...

View Article

Image may be NSFW.
Clik here to view.

Creating Custom Content Filtering Policy in Symantec Messaging Gateway

In this article, a brief description is given about how to create a custom content filtering policy in Symantec Messaging Gateway.The steps are as below:Log in the Symantec Messaging Gateway GUI...

View Article

Image may be NSFW.
Clik here to view.

How to check specific process with Host Integrity Policy

Is it possible to monitor specific progress status with Host Integrity (HI) policy in endpoint protection? The answer is yes.Here is a simple example of how to set the requirement in HI policy. Details...

View Article


Image may be NSFW.
Clik here to view.

Blacklisting and Whitelisting Domains and e-mail Address in Symantec...

Blacklisting and White listing domains in Symantec Messaging Gateway 10x: 1. Log On to Symantec Messaging Gateway.2.1 Blacklisting a domain: (a)    Go To Reputation> Policies> Bad Senders.(b)...

View Article


Image may be NSFW.
Clik here to view.

Exceptions, Illustrated: Part One

IntroductionThis is the sixteenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

Image may be NSFW.
Clik here to view.

Exceptions, Illustrated: Part Two

IntroductionThis is the seventeenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

Script: Checking if a sample is detected as malware by Symantec by its hash

On the Symantec site, you can not search malwares by its hash, as for now. I made two scripts to help you, if there is a need to check a lot of hashes. You will need a free VirusTotal account, to use...

View Article

Image may be NSFW.
Clik here to view.

Help us spread the word about SEP 14 and get a $25 Amazon gift card!

 It’s simple: Click here and log into G2 Crowd using your LinkedIn Account.    You must contribute a detailed, balanced and complete review! After your review is verified, G2 Crowd will send the first...

View Article


Image may be NSFW.
Clik here to view.

Help us spread the word about DLP and get a $25 Amazon gift card!

It’s simple: Click here and log into G2 Crowd using your LinkedIn Account.  You must contribute a detailed, balanced and complete review! After your review is verified, G2 Crowd will send the first 40...

View Article

Support Perspective: PUA.Winexe

In May of 2017, Symantec added a Risk detection for the tool Winexe.Winexe is a Linux based application that allows the execution of commands remotely on Windows based OSes. It installs a service on...

View Article


System requirements for Endpoint Protection 14

System requirements for Symantec Endpoint Protection Manager and the Symantec Endpoint Protection clients are the same as those of the operating systems on which they are supported.Symantec Endpoint...

View Article

Data Loss Prevention DLP and Scanning Amazon AWS S3 and using S3FS

 Hello DLP Users..I wanted to share some information on how to get DLP to Scan Amazon AWS Buckets.I had a customer who wanted to scan their Amazon AWS Storage (S3), there is no documentation on how to...

View Article


Data Loss Prevention DLP and Scanning via SSH and using SSHFS

Hello DLP Users..I wanted to share some information on how to get DLP to Scan using SSH.I had a customer who wanted to scan their File Server (EMC Isilon), but NOT all of the File System was accesible...

View Article

Support Perspective: TheShadowBrokers and Equation Tools

In April 2017, an attack group calling itself the TheShadowBrokers, released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and...

View Article

Support Perspective: Vault 7

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that allegedly detail activities and capabilities of the United States Central Intelligence Agency to perform...

View Article
Browsing all 818 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>