Symantec-Altiris Software Management - Troubleshooting General Configuration
TroubleshootingThis section covers troubleshooting for the General Configuration Items and functions surrounding it.Software Library MoveThere may be a time when you need to move your Software Library....
View ArticleInformation Centric Analytics Best Practices - Post Configuration Tasks
After installing Symantec Information Centric Analytics, there are several configuration settings that should be set to allow the product to perform optimally. Follow the best practices below just...
View ArticleInformation Centric Analytics Best Practices - Enabling Email Alerts
It is recommended that the Symantec Information Centric Analytics Administrator(s) be notified proactively of job failures. Using the default functionality within SQL Server Management Studio, email...
View ArticleSecurity Analytics: Use Labels in Central Manager for better management and...
In the Security Analytics Central Manager, you can use Labels as a great way to tag, organize, and create useful groups of Security Analytics sensors for easier management and investigation.Here’s an...
View ArticleSecurity Analytics Support Tip: What does that pink banner mean - Or what is...
Security Analytics systems are constantly monitoring for possible hardware problems. There is a daemon which provides an interface between the software side of the application and the hardware. When...
View ArticleInformation Centric Analytics Best Practices - Configuring Organizational...
Once Symantec Information Centric Analytics (ICA) is installed and integrated with the various data sources within the environment, there are some additional configurations which should be completed to...
View ArticleInformation Centric Analytics Best Practices - Risk Vectors
Creating and Configuring Risk Vectors and Risk ScoresThis article deals with how Symantec Information Centric Analytics (ICA) incorporates Risk Vectors to improve and display Risk Scores. In ICA,...
View ArticleInformation Centric Analytics Best Practices - Using the Integration Wizard
Integration Wizard Best PracticesWith the Integration Wizard in Symantec Information Centric Analytics, users have the flexibility to import almost anything and everything from different data source....
View ArticleInformation Centric Analytics Best Practices - Integration Wizard...
Troubleshooting Integration Wizard Data Import Issues into Staging TablesThis article will provide you with the SQL necessary to troubleshoot the IW_DataSourceQuery that will pull data in from the...
View ArticleInformation Centric Analytics Best Practices - Risk Optimization
Risk Optimization in Information Centric AnalyticsThe mission of Symantec Information Centric Analytics is to allow enterprises to make the most of their limited resources by automating as much of the...
View ArticleSEP - Scripts
Following on from an excellent Article 'Handy SQL Queries for SEPM v14' from Tony Sutton I thought it would be useful to create a site to collate all this information in an easy to use format.This...
View ArticleProtect Symantec DCS agent
Good day to all Symantec DCS admins.I want to provide you with a solution to one problem.I hope that my decision is correct and will be useful.Sincerely.DimaRecently, I came to the client to solve a...
View ArticleAndroid malware - “Agent Smith”
A new android malware, ‘Agent Smith’ recently infected over 25 million android mobile devices worldwide. The malware exploits android vulnerabilities to replace legitimate apps with malicious...
View ArticleManaging Private Kubernetes Clusters with Secure Access Cloud
Kubernetes (commonly stylized as k8s) is an open-source container-orchestration system for automating application deployment, scaling, and management.It was originally designed by Google, and is now...
View ArticleEndpoint Security- Best Practices for Companies and Employees
What Is Endpoint Security? Any device that is connected to an organization’s network systems is known as an endpoint. Endpoint security is the protection and monitoring of end-user devices, such as...
View ArticleNew CA Certificate coming for CloudSOC Gateway
For Customers on the Global CloudSOC tenant with Gateway using gw.elastica.net and mgw.elastica.net, the CA certificate used for the Symantec CloudSOC Gateway will expire 12/12/2019.Due to this...
View ArticleHow to use Symantec Custom Inventory to report on Microsoft Office 365 Update...
Open SMP Console - > Settings -> All Settings -> Discovery and Inventory -> Inventory Solution -> Manage Custom Data Classes -> New data class -> Office 365 Update Channels Create...
View ArticleBatch file to delete corrupt SEP definitions
Hi All,Please find the script to delete corrupt defs using batch ( Use at your own risk). Tamper protection need to be turned off to delete defs or else you will receive Access Denied message@echo off...
View ArticleSQL Query for machines with Outdated Agents
I wanted to share a SQL query that can be used to list machines with outdated Altiris Agents select vc.Domain ,vc.name [Computer Name] ,vc.[OS Name] ,ah.[Last Configuration Request]...
View ArticleSEPM Dashboard Malfunctioning
Hello All,Many times SEPM dashboard is malfunctioning means showing incorrect values of "out of date, Up to date, Disabled" system count on Home screen.Please refer below solution - Issue: Incorrect...
View Article