SEPM 12.1 - Advanced Settings filter options for Client Activity logs
Trying to wade through Client Activity logs can become a tedious task, especially when you have thousands of clients. I would like to show you some advanced filtering that you can do to get the Client...
View ArticleHow to sign up for alerts and notifications on the BCS notification system
IssueThis document explains the process of configuring the Symantec Alerting Services for BCS customers, which includes editing and confirming your recipient information, alerts and notifications and...
View ArticleModifying IT Analytics Reports to Decrease Load Times
For IT Analytics reports hosted by SQL Server Reporting Services (which include out-of-the-box reports and dashbaords) some users may experience extended wait times before the report is able to render,...
View ArticlePreventing IT Analytics Reports from Running Automatically
By default, reports and dashboards in IT Analytics (hosted by SQL Server Reporting Services) will run automatically when selected. This behavior can sometimes be problematic for environments with...
View ArticleThe Log Files Location and Description of Symantec DLP Server
Symantec Data Loss Prevention provides many operational log files that can be used to interpret how the system is running.The default locations put the log files during installation for the Enforce...
View ArticleSEP Firewall "Did You Know...?" - How To Monitor Web Traffic
Did you know that it IS possible to monitor web traffic using the SEP firewall? In this article, I will show you how to monitor web traffic using the SEP firewall.Before we get started there are a...
View ArticleInstalling SCCM agent via SEP / SNAC
Most of the organizations use SCCM to deploy Third party software, OS patches etc to endpoints.It’s a very tedious process for the SCCM admin to verify if all the endpoints are 100% compliant.I would...
View ArticleHow to avoid or minimize data loss when using Symantec Encryption solution?
Disclaimer: this may not be an exaustive description of the solution and is intended to be used as a guideline. All information is available in the product documentation, including the Administrator's...
View ArticleLatest Symantec Endpoint Protection Release - SEP 11 RU7 MP4 (11.0.7400.1398)
Hello All,Symantec Endpoint Protection 11 RU7 MP4 (11.0.7400.1398) is Released.This build's version is: 11.0.7400.1398SEP all version release details are available here: http://bit.ly/m0vOJpNote: If in...
View ArticleSecurity 1:1 - Part 1 - Viruses and Worms
Welcome to the Security 1:1 series of articlesIn Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used...
View ArticleSecurity 1:1 - Part 2 - Trojans and other security threats
Welcome to the Security 1:1 - Part 2In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack...
View ArticleSecurity 1:1 - Part 3 - Various types of network attacks
Welcome to the Security 1:1 - Part 3In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user...
View ArticleIntroduction to various Symantec and Norton Security Products
What is this about?In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family...
View ArticleSecurity 1:1 - Part 5 - Online gaming fraud, scam and phishing attempts
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 SeriesOnline gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the...
View ArticleHow to prevent unauthorized users from removing the Symantec DLP Agent from...
To prevent unauthorized users from removing the Symantec DLP Agent from an endpoint computer you just need to Add uninstallation passwords to agents.Uninstallation passwords prevent unauthorized users...
View ArticleCommands to check the Linux Version, Release name & Kernel version.
In order to install #SAVFL on your #Linux Machine you need to check your verify your OS details. Commands to check the Linux Version, Release name & Kernel version.uname -a (Print all Information)...
View ArticleThe Day After: Necessary Steps after a Virus Outbreak
IntroductionThis is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleHow Symantec Data Loss Prevention for Mobile works & How to Implement
Symantec Data Loss Prevention for Mobile connects to your corporate network through Wi-Fi access or through cellular 3G connectivity. Network traffic for Webmail, third-party applications such as...
View ArticleData Loss Prevention Install- Single Tier
This topic covers the installation of DLP Enforcer and Detection Server version 12.0 in grpahic representation for a Single Tier Architecture. Oracle is already installed on the server. The...
View ArticleConfigure DLP to Send Email Notification to Employee's Manager
Some customers want to know whether the DLP can send an Email notification to the manager if an employee trigger an incident. The answer is Yes.This is some kind of workflow in DLP that can help the...
View Article