Configure liveupdate to run on client computers - Part 1
Hello,This article will demonstrate hot to configure liveupdate to run client updates.Some time customers may get confuse with these settings, they may feel these settings are applicable for SEP client...
View ArticleConfigure liveupdate to run on Symantec Endpoint Protection Manager (SEPM) -...
Hello,In the previous article we seen how to configure liveupdate on SEP client computers.Here is the link for that:...
View ArticleHow to export device IDs from Application and Device control policy
Hello All,It is sometime necessary to list all the Device Ids which are added in the Application and Device Control policy.This is not possible with the default SEPM reports.Here are the steps to...
View ArticleNetwork Monitor and Network Prevent- Differences and When to use what.
During my work with a lot of customer I keep hearing the following questions very often: -What is the difference between Network Monitor and Network Prevent?Do I need both Network Monitor and Network...
View ArticleInstall and Use Enterprise Manager for DLP Oracle Database
Think about: running the DLP Solution for about one year, and find out that there are no more tablespace of the DLP Oracle to store the new incidents.Then, you need to expand the tablespace, or, add...
View ArticleApply a policy on a single machine also without creating a new group.
Please find the below my Document, As per the document now we can apply a policy on a single machine also without creating a new group. Thanks, Sachin Sawantapply a policy on a single machine.docx
View ArticleIntroduction of Content Root Enumeration on DLP 12.0
There is a new feature on DLP 12.0: Content Root Enumeration. The Content Root Enumeration is a function about Auto-discovery of servers and shares.Content Root Enumeration enables you to locate...
View Article"How to..." Series for Symantec Endpoint Protection - Part 3
Hello,This is Part 3 of the "How to Series...", you can find the Part 1 here and Part 2 here.Here are few popular "How to..." which would be assistance to the Symantec Endpoint Protection Users.Series...
View ArticleA graphical overview of using Sym Help tool
If you want to have pre installtion check,Health checkup, recommendations and collect logs for support. Then please go through the document so that you can learn how to run a Sym help toolSym Help...
View ArticleKnowledgebase Articles for Liveupdate Administrator (LUA)
Please find knowledgebase articles available for SymantecLiveupdate Administrator (LUA) - current version available is 2.3.2.99. Articles are split in several catagories to allow you fast browsing and...
View ArticleIntroduction to DLP 11 Pre-Configured Reports
Symantec Data Loss Prevention comes with over 40 pre-configured reports to help customers manage their business. These reports allow customers to meet compliance requirements, assess business risk,...
View ArticleHow to monitor ESXi Host with CSP Agent Collector Node
Content:OverviewInstallation & ConfigurationTroubleshooting Overview In an ESX environment, you can install a native Symantec Critical System Protection agent and apply policies to monitor and...
View ArticleHow to Reset Symantec Endpoint Protection Manager Console password in SEP 12.1
Hello,For one reason or another you might come into a situation were you are unable to login to the Symantec Endpoint Manager Console, Symantec provides a tool that helps to reset the admin password,...
View ArticleSEPM Administrators.
Hello Everyone,By default when you do a install of Symantec Endpoint Protection Manager an 'admin' account gets created with full access and permissions to all areas of Symantc Endpoint Protection...
View ArticleIntroduction to Symantec Protection Engine for Network Attached Storage
Symantec™ Protection Engine for Network Attached Storage replaces Symantec AntiVirus™ for Network Attached Storage.Symantec Protection Engine provides virus scanning and repair services for a number of...
View ArticleSymantec Endpoint Protection Terminology Guide - Concepts, Technologies,...
Welcome to the Part 1 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 2
In a continuation from my previous article, this article will look at using SEP 12.1 System Lockdown in blacklist mode to stop the spread of a malicious actor on your network. In order for System...
View ArticleSEP 12.1 Firewall - How to Block RDP while allowing only specific connections
This article will go into some detail on how to block RDP while allowing only specific connections using the SEP 12.1 firewall. This is also applicable to SEP 11.x.Often times, a request comes in to...
View ArticleOutbound Mail Validation/Verification (To important to forget about)
Hello,I wanted to share with you some thoughts and ideas about a common business use case for sending mail that brings a couple of risks that shouldn’t be forgotten as it can have a huge impact on your...
View ArticleSymantec Endpoint Protection Terminology Guide - Concepts, Technologies,...
Welcome to the Part 2 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and...
View Article