Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 818 articles
Browse latest View live

Microsoft Access definition, functions, advantages and disadvantages

    Greetings Community Happy Tuesday to all of you today has been a very productive day and with much to do I hope you are in the same and fulfilling the daily goals, in my last 3 articles I talked...

View Article


Spam mail, type of email Spam, Virus, Ransomware and Malware in email Spam

    Good night community today concludes another day full of success and high productivity in each activity designated by the areas of our work, I recently talked about an article related to Microsoft...

View Article


Image may be NSFW.
Clik here to view.

How do I add the Policy ID (x-bluecoat-reference-id) Field to a 10.3.x...

SituationBy default, neither Reporter nor the ProxySG appliance report on the Policy ID. With the standard log file, the ProxySG does not log the Policy ID. Because the default access log does not...

View Article

How to check System Status of Reporter v10.x

SituationHow to check the System Status/Health Monitoring of Reporter?SolutionSystem Status on Reporter 10.1.xreporter>enableEnable Password :reporter#show ststusSystem Status on Reporter...

View Article

Image may be NSFW.
Clik here to view.

Independent tests prove effectiveness of Symantec's Email Security

Email is widely recognized as the most popular method for attackers to spread malware and breach organizations.  Our 2019 Internet Security Threat Report shows that employees of small organizations...

View Article


Image may be NSFW.
Clik here to view.

SCWP- AWS: Deny Shutdown Workload Action from CWP.

Hello,In this guide I'm going to highlight how to set deny permissions within AWS to prevent CWP users being able to remotely shutdown AWS workloads. The business reasoning for this can vary from...

View Article

Image may be NSFW.
Clik here to view.

Email Security.cloud, goes from strength to strength

On 29 March 2019 we further extended the capabilities of Symantec Email Security.cloud.  This is part of our ongoing, and continual investment in protecting our customers from the multiple email-based...

View Article

General Availability Release of ICDx Now Available to Symantec Customers

Please review instructions in the support article below.https://support.symantec.com/en_US/article.TECH253299.html

View Article


Security Analytics: Risk and Visibility Report

The Risk and Visibility Report in Security Analytics is a powerful way to provide non-analysts, executives, and other members of your organization with a general overview of the latest threats that...

View Article


Image may be NSFW.
Clik here to view.

CloudSOC CASB Users/Admin role - Incident Investigation

     My team just finished creating a whitepaper on How to build a Cloud Center of Excellence. We were sitting back and contemplating follow-on papers representing deeper dives into each of the topics...

View Article

SEP v15 Cloud vs SEP v14.2 RU1 - A Follow Up

A follow up to my previous article - "SEP 15 is Cloud based - what's your views" - Symantec has published a new article, where they explained the differences between Symantec Endpoint Protection 14.2...

View Article

Security Analytics Support Tips - May 2019

Tips from the Security Analytics Support DeskHere are a few tips from the Security Analytics Support Team they thought would be helpful for customers to get the most out of their Security Analytics...

View Article

Image may be NSFW.
Clik here to view.

WSS + SEP Mobile builds a strong line of defense for mobile users

The integration of Web Security Service (WSS) and SEP Mobile brings advanced web security to the mobile devices. WSS protects web and cloud app traffic, users, and devices via cloud-delivered security...

View Article


Endpoint Detection and response procedures for blocking and attacks against...

    Advanced threat protection levels represent a fundamental role in securing the volume of information in companies in such a competitive market businesses are constantly looking to improve security...

View Article

In the UK? Register for our Endpoint protection user group in London May 30th!

Using SEP, come join us at the SEP user group in London May 30thProduct Management will be in attendance to give the latest roadmap, hear from other customers about their SEP implementation, and our...

View Article


Image may be NSFW.
Clik here to view.

Killing Wannacry: How to Eradicate Ransom.Wannacry for Good

IntroductionThis is the twenty-third in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

"Couldn't connect to the SMTP server using the specified settings. Please...

Hi,Recently, I implemented Symantec Data Loss Prevention 15.5 MP1 and encountered an issue on configuring the Exchange Server section for mail notifications. The issue notification I received was:...

View Article


Non-public Oracle Java 8 updates support

Starting from PMImport 7.3.333 Patch Management solution supports non-public Oracle Java 8 updates. Initial release includes JAVA8-211 and JAVA8-212 bulletins for corresponding JRE releases (8u211 and...

View Article

Creating a CCoE: The Book is now a Movie!

For those of you who have read our whitepaper on line, How to Implement a Cloud Center of Excellence, we've recorded a webinar on the topic that is available on-demand.Click HERE to enjoy the webinar...

View Article

Image may be NSFW.
Clik here to view.

Step by step guide to install Information Centric Security Module (ICSM)

Download Software from https://support.symantec.com/en_US/mysymantec.html it's a zip file & size is around 266 MBOnce the download finishes successfully, extract the contents of the compressed file...

View Article
Browsing all 818 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>