Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 818 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Ransomware and other threats - High Risks on Android Devices.

It has been reported that a new ransomware called DoubleLocker targeting Android devices. The malware spreads through counterfeit applications (mostly fake Adobe Flash Player) via compromised websites....

View Article


Image may be NSFW.
Clik here to view.

Now You Can Protect Your AWS S3 Buckets Too! Symantec Introduces Cloud...

Many organizations are migrating workloads to Amazon Web Services (AWS), seeking improved business agility, operational efficiency, and cost savings. Some are even going “all-in” with AWS, choosing to...

View Article


Image may be NSFW.
Clik here to view.

How Does Symantec Email Security Stack Up Against the Competition?

Email is by far the most popular method for attackers to spread malware and breach organizations, as the ubiquity of email and ease of impersonation makes email attacks lucrative for cybercriminals....

View Article

Image may be NSFW.
Clik here to view.

What You Can Do About Powershell Threats

IntroductionThis is the twentieth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

November 28, 2017

In this release, we've made it even easier to manage SEP Cloud.Two-factor authentication for administrators - simple and secureWith the flip of a switch, you can now ensure that all of your...

View Article


Image may be NSFW.
Clik here to view.

Collect full memory dump of a VMware virtual machine (VM)

First of all, We will download the files locally in a windows 7 Machine and later on, we will use the vmss2core tool locally to convert to .DMP file.1) Download and install vmss2core tool:1.1 Navigate...

View Article

Image may be NSFW.
Clik here to view.

Recolectar un volcado completo de memoria en máquina virtual (VM)

En primer lugar, descargaremos los archivos localmente en una máquina , en este caso Windows 7 y más adelante, usaremos la herramienta vmss2core localmente para convertirla a un archivo .DMP1)...

View Article

December 14, 2017

In this release, we continue to improve SEP Cloud with user experience enhancements and bug fixes.Better support for the latest versions of Mac and iOS.The OS Distribution widget on the Dashboard now...

View Article


How to fix CIS Microsoft Windows Server 2012 R2 v2.2.0/v2.2.1

Predefined CCS Technical standards "CIS Microsoft Windows Server 2012 R2 v2.2.0" and "CIS Microsoft Windows Server 2012 R2 v2.2.1" have issue with following checks:1.2.3 Is the 'Reset account lockout...

View Article


Data Center Security: Meltdown and Spectre Situation Update

Meltdown and Spectre Situation UpdateTwo newly discovered processor chip vulnerabilities, dubbed Meltdown and Spectre, could permit attackers to gain unauthorized access to a computer’s memory. Spectre...

View Article

Meltdown & Spectre Vulnerability: Symantec Critical System Protection

Meltdown & Spectre Vulnerability: Symantec Critical System ProtectionA series of new vulnerabilities has been discovered which affect the processor chips and potentially permits attackers to gain...

View Article

Image may be NSFW.
Clik here to view.

How to exclude particular Files and Folders from all Scanning on SEPM(GUI based)

How to exclude particular Files and Folders from all Scanning on SEPMIn Symantec console Go to Policies Tab --> ExceptionsRight Click on Blank Space and Choose AddGive name to PolicyChoose Add...

View Article

Changing Dynamic Sub Partitions.

This issue was found on version 11.9.1.4 Build 209785 When changing a dynamic subpartition only new partitions created from that time on will have the new characteristics. Existing dynamic...

View Article


Handy SQL Queries for SEPM v14

Below is a handy collection of SQL queries that might be useful for day to day admin work. All of these queries has been tested & confirmed as working for SEPM v14.Fancy reading up the Database...

View Article

Image may be NSFW.
Clik here to view.

Symantec DCS 6.7 Management Server pictured Installation.

Symantec DCS 6.7 Server installation step by step as shown below:1.Install management server, for that extract the setup, locate DCS server advanced folder--> double click server.exe to install the...

View Article


关于对 macOS 10.13 上 Symantec Endpoint Protection 的内核扩展进行授权

从 macOS 10.13 起,要求对内核扩展 (kexts) 进行授权是一项新安全功能:https://developer.apple.com/library/content/technotes/tn2459/_index.htmlSymantec Endpoint Protection 14.0.1 增加了对 macOS 10.13 的支持。您必须对 Symantec Endpoint...

View Article

Image may be NSFW.
Clik here to view.

Data Centre Security (DCS) & UMC - Ad login failure

Common Data Centre Security & UMC - Ad login failureHi,In this article, I will cover how to troubleshoot a very common error that occurs when enabling Active Directory within DCS. It's not always...

View Article


Image may be NSFW.
Clik here to view.

Trace SMB Double Pulsar Attack Source Machines

At times you may be reported by users about Symantec Client tray icon Notification "[SID: <pid number> Attack: SMB Double Pulsar..]" Similiar as below First measure no need to panic your machine...

View Article

Image may be NSFW.
Clik here to view.

Data Loss Prevention (DLP) - Create custom file type signature

Data Loss Prevention (DLP) - Create custom file typesHi,This article will cover the process that is required to create a custom file type signature in DLP. This is traditionally used for Zip files on...

View Article

Workflow - REST - Response Header

A question from @epkpej was asked on another of my ArticlesUsing the REST Generator (Response Content) in Workflow...

View Article
Browsing all 818 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>