Microsoft Access definition, functions, advantages and disadvantages
Greetings Community Happy Tuesday to all of you today has been a very productive day and with much to do I hope you are in the same and fulfilling the daily goals, in my last 3 articles I talked...
View ArticleSpam mail, type of email Spam, Virus, Ransomware and Malware in email Spam
Good night community today concludes another day full of success and high productivity in each activity designated by the areas of our work, I recently talked about an article related to Microsoft...
View ArticleHow do I add the Policy ID (x-bluecoat-reference-id) Field to a 10.3.x...
SituationBy default, neither Reporter nor the ProxySG appliance report on the Policy ID. With the standard log file, the ProxySG does not log the Policy ID. Because the default access log does not...
View ArticleHow to check System Status of Reporter v10.x
SituationHow to check the System Status/Health Monitoring of Reporter?SolutionSystem Status on Reporter 10.1.xreporter>enableEnable Password :reporter#show ststusSystem Status on Reporter...
View ArticleIndependent tests prove effectiveness of Symantec's Email Security
Email is widely recognized as the most popular method for attackers to spread malware and breach organizations. Our 2019 Internet Security Threat Report shows that employees of small organizations...
View ArticleSCWP- AWS: Deny Shutdown Workload Action from CWP.
Hello,In this guide I'm going to highlight how to set deny permissions within AWS to prevent CWP users being able to remotely shutdown AWS workloads. The business reasoning for this can vary from...
View ArticleEmail Security.cloud, goes from strength to strength
On 29 March 2019 we further extended the capabilities of Symantec Email Security.cloud. This is part of our ongoing, and continual investment in protecting our customers from the multiple email-based...
View ArticleGeneral Availability Release of ICDx Now Available to Symantec Customers
Please review instructions in the support article below.https://support.symantec.com/en_US/article.TECH253299.html
View ArticleSecurity Analytics: Risk and Visibility Report
The Risk and Visibility Report in Security Analytics is a powerful way to provide non-analysts, executives, and other members of your organization with a general overview of the latest threats that...
View ArticleCloudSOC CASB Users/Admin role - Incident Investigation
My team just finished creating a whitepaper on How to build a Cloud Center of Excellence. We were sitting back and contemplating follow-on papers representing deeper dives into each of the topics...
View ArticleSEP v15 Cloud vs SEP v14.2 RU1 - A Follow Up
A follow up to my previous article - "SEP 15 is Cloud based - what's your views" - Symantec has published a new article, where they explained the differences between Symantec Endpoint Protection 14.2...
View ArticleSecurity Analytics Support Tips - May 2019
Tips from the Security Analytics Support DeskHere are a few tips from the Security Analytics Support Team they thought would be helpful for customers to get the most out of their Security Analytics...
View ArticleWSS + SEP Mobile builds a strong line of defense for mobile users
The integration of Web Security Service (WSS) and SEP Mobile brings advanced web security to the mobile devices. WSS protects web and cloud app traffic, users, and devices via cloud-delivered security...
View ArticleEndpoint Detection and response procedures for blocking and attacks against...
Advanced threat protection levels represent a fundamental role in securing the volume of information in companies in such a competitive market businesses are constantly looking to improve security...
View ArticleIn the UK? Register for our Endpoint protection user group in London May 30th!
Using SEP, come join us at the SEP user group in London May 30thProduct Management will be in attendance to give the latest roadmap, hear from other customers about their SEP implementation, and our...
View ArticleKilling Wannacry: How to Eradicate Ransom.Wannacry for Good
IntroductionThis is the twenty-third in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View Article"Couldn't connect to the SMTP server using the specified settings. Please...
Hi,Recently, I implemented Symantec Data Loss Prevention 15.5 MP1 and encountered an issue on configuring the Exchange Server section for mail notifications. The issue notification I received was:...
View ArticleNon-public Oracle Java 8 updates support
Starting from PMImport 7.3.333 Patch Management solution supports non-public Oracle Java 8 updates. Initial release includes JAVA8-211 and JAVA8-212 bulletins for corresponding JRE releases (8u211 and...
View ArticleCreating a CCoE: The Book is now a Movie!
For those of you who have read our whitepaper on line, How to Implement a Cloud Center of Excellence, we've recorded a webinar on the topic that is available on-demand.Click HERE to enjoy the webinar...
View ArticleStep by step guide to install Information Centric Security Module (ICSM)
Download Software from https://support.symantec.com/en_US/mysymantec.html it's a zip file & size is around 266 MBOnce the download finishes successfully, extract the contents of the compressed file...
View Article