Quantcast
Browsing all 818 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Using the new End User Notification Task in 8.5 RU2

8.5 RU2 – New Feature: End User Notification Task This new feature introduces a new Plugin installed with the “Core-SMA” on the Client Computer called End User Notification Agent. The End User...

View Article


SEP v14 client & macOS 10.15 Catalina

With the new macOS 10.15 (Catalina) released recently, the current Mac SEP client may or may not work with the current SEP 14 versions.You will be pleased to know that macOS 10.15 Catalina will be...

View Article


IT Management Suite 8.5 RU3 is now available

Release notes are available at the following URL:https://support.symantec.com/us/en/article.doc11603.html

View Article

Image may be NSFW.
Clik here to view.

SMP - ASDK - 8.5 RU3

With the release of ITMS 8.5 RU3 there were some new Web Service methods added to the following:FeatureDescriptionEnhancements of the Symantec Administrator Software Development Kit (ASDK) application...

View Article

Image may be NSFW.
Clik here to view.

Security Analytics 8.1 Key Feature – Intelligent Capture

To help conserve valuable storage space in Security Analytics, the new 8.1 feature, Intelligent Capture, allows you to discard packets you don’t want to retain, but you still want indexed and enriched...

View Article


Now Available: Security Analytics 8.1 – What’s New?

Symantec Security Analytics (SA) 8.1 is now available, adding new capabilities to Symantec’s powerful network traffic analysis and forensics solution. Enhancements include: added support for deployment...

View Article

Image may be NSFW.
Clik here to view.

Security Analytics 8.1 Key Feature – Session View

With Session View, Incident Responders can quickly get all details of network flows and narrow their investigation focus before retrieving artifacts, greatly improving the efficiency of an...

View Article

Image may be NSFW.
Clik here to view.

Security Analytics 8.1 Key Feature – Dynamic Storage Expansion

Dynamically scale storage and expand as needed. You can start with a smaller deployment and grow when needed. The “Expand Storage utility” (available through Symantec Support) makes it easy to add...

View Article


Image may be NSFW.
Clik here to view.

Security Analytics 8.1 Key Feature – ICDx Support

Security Analytics now supports ICDx to open up integrations with a multitude of tools and threat data, including SIEMS (Security Information and Event Monitoring) solutions, orchestration, other...

View Article


Image may be NSFW.
Clik here to view.

Security Analytics 8.1 Key Feature – Dark Theme

The new dark theme option supports SOC teams’ preferences and enables more comfortable, extended viewing time. Viewing a bright white screen in a dark room for multiple hours isn’t ideal so this...

View Article

Code Execution Vulnerability Found In Symantec Endpoint Protection

The BugAfter discovering the bug, the researchers reported it to Symantec in August 2019, which the vendors confirmed the next day.The Symantec Endpoint Protection Local Privilege Escalation (LPE) bug...

View Article

How To Get Symantec Endpoint Division (SED) Product Support Within Broadcom

Hi Connect Community,We realize you may have questions about support now that Symantec Enterprise Division (SED) is a division of Broadcom.  I hope that the below information is helpful and please...

View Article

Image may be NSFW.
Clik here to view.

Malicious email claims to be from Microsoft --- Do NOT open.

If you get an email claiming to be from Microsoft about a Windows update, DON’T OPEN it.Security researchers have discovered a new malicious campaign that spoofs urgent update emails from Microsoft to...

View Article


Image may be NSFW.
Clik here to view.

Ransomware Everywhere

Little known before 2014, Ransomware is now one of the most popular methods used by hackers to attack corporations. 2018 was the year Ransomware, 2019 is even worse. For those who don’t know,...

View Article

Image may be NSFW.
Clik here to view.

Initial filtering in Security Analytics

A logical first step when looking for a suspected event In Security Analytics is using the Timespan filtering capability. The reason for this is that by reducing searches down to a specific window of...

View Article


Image may be NSFW.
Clik here to view.

Downloading file extractions

File extractions are a valuable part of a forensic investigation. In Security Analytics, these extractions are the reconstruction of files found within the payload of packets captured traversing a...

View Article

Symantec Endpoint Protection Manager 14.0 Videos

Hi All, I have created Videos for Symantec Antivirus 14.0 , Below are the links to access the videos. Please comment if I can make any improvements.Step by Step Installation Symantec Antivirus 14.0...

View Article


Image may be NSFW.
Clik here to view.

ICDx

 ICDxSymantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against...

View Article

Image may be NSFW.
Clik here to view.

ICDx - Documentation

 ICDxSymantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against...

View Article

Image may be NSFW.
Clik here to view.

ICDx - Apps

 ICDxSymantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against...

View Article
Browsing all 818 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>