Definition of ransomware types of ransomware and ways to face the threat
Happy week community I hope this week is quite productive for everyone, in the last 2 articles that I wrote I had talked about the measures to combat the massive attack of ransomwares for windows 7...
View ArticleData Loss Prevention (DLP) - Customising Agent Communication
Hello,In this article I'm going to show how to modify the default agent communication properties within Symantec Data Loss Prevention, this will allow the agent to communicate more or less often to the...
View ArticleSQL Query to show Estate-Wide Discover Scan Data
The BriefIn my previous article Creating a SQL Report for DLP Scan History, I provided a query that showed the scan history in SQL format for reporting purposes.Following that, I received a request to...
View ArticleSQL Query to Show Violations of Specific Rules - Discover
The BriefContinuing what feels like a series of articles on the utilisation of SQL within DLP (1,2) this piece highlights another, very useful application of a Structured Query within DLP. The ability...
View ArticleSQL Query for Average Scan Speed Across Whole Estate – Discover
The BriefThis article builds on a query covered in one of my previous pieces. As usual, the full query is at the bottom if you want to skip right to it. If not, I’ll go over the context and walk...
View Article¿What is Endpoint? common problems and how to execute correctly
Dear community, greetings from this humble servant, I hope that the week has been quite successful and beneficial for all. The challenges and the way to expand security in different sectors are...
View ArticleEmail Security.Cloud: An Effective Countermeasure Against Trojan.Emotet
By Rodrigo Calvo, CISSP, PCIP,Symantec Knight Sr. Security Consultant at Infolock.In July 2018 the Symantec Security Response Attack Investigation Team published an article about the evolution of the...
View ArticleSEP 15 is Cloud based - what's your views
With the announcement slowly tricking in about SEP 15, one thing stood out about this new release is that it's Cloud based product only. While I agree that more and more product are going cloud based,...
View ArticleEducation Services: CloudSOC Administration R2 Course
Symantec offers live, instructor-led training for CloudSOC.The CloudSOC R2 Administration course provides an overview of the CloudSOC service, covering initial setup, deployment options and service...
View ArticleTroubleshooting the Symantec Endpoint Protection Manager Web and Java Remote...
Web ConsoleThe Symantec Endpoint Protection Manager Web Console allows you to remotely manage SEP in a web browser window. In 14.2 MP1 the following browsers are supported for web console access to...
View Article¿What is Windows Server? Most common functions, problems and threats and how...
I hope you had an excellent valentines day community I hope you are having an excellent time and that it has also been a very successful week since there is a lot to do and to contribute to the...
View ArticleDifferences between Virus, Ransomware and Malware and their ways of attacking...
Happy weekend community as always I hope that everything is going excellently, in this article I want to emphasize a common and simple but important issue to clarify since many times due to lack of...
View Article¿What is a Proxy? risks of using a proxy to navigate
Good evening, community, I send a big greeting to all of you and I hope that you have achieved your personal goals of the week as I always say the continuous duty and there is no rest to improve...
View ArticleSQL Query Showing Server Settings and Values – Enforce Console
The ContextContinuing the journey of mapping out DLP and its relationship to the Oracle database it sits on, we today look at how the server settings can be viewed and updated (if needed) in the...
View ArticleSQL Server definition, Functions, disadvantages and disadvantages, common...
Happy community week is time to start with new goals and meet the challenges of day to day, in the previous article that I had written I was talking about what is a Proxy and its risks to have an...
View ArticleDifferences, characteristics and disadvantages of SQL Server and Oracle
Good evening community in the most recent article I made a focused emphasis of what is SQL Server, its functions, advantages, disadvantages, common mistakes and how to correct some problems that...
View ArticleOracle Definition, Functions, Advantages and Disadvantages
Happy evening community is approaching another day full of challenges and I want to take this article to talk a little about what Oracle is in the previous article talk about the comparison between...
View ArticlePowershell Script to Automate Server JRE and Detection Server Installation –...
The ContextWhen performing a DLP installation, there is a point in which two (or more, depending on installation tiers) .msi files must be executed to install the server JRE and Detection Server. This...
View ArticleData Loss Prevention (DLP) - Migrator.exe Automation Script
Hello,In this article I have created an automation script allowing users to automate either the EnforceMigrator.exe or the SingleTierMigrator.exe process following an upgrade from 14.6 to 15.1.As part...
View ArticleData Loss Prevention (DLP) - Migration Rollback Automation Script
Hello,In this guide I've written a basic script which will allow a basic rollback of DLP following issues migrating from 14.6 to 15.1, it should be noted that this article is only relevant if the...
View Article