First Response to: Cryptolocker \ Ransomcrypt\ Encryptor
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 4
This article is a continuation of my three previous articles:How to utilize SEP 12.1 for Incident Response - PART 1How to utilize SEP 12.1 for Incident Response - PART 2How to utilize SEP 12.1 for...
View ArticleMicrosoft Exchange ActiveSync
Microsoft Exchange ActiveSync is a way that you can send corporate emails from a mobile device. ActiveSync can send email either to recipients internal to the corporate network or outside of the...
View ArticleComplete Process of Deploying and Enabling of Endpoint FlexResponse plug-in
Symantec Data Loss Prevention provides a set of response rule actions that you can specify to remediate an incident. These provided actions include logging, sending an email, blocking an end-user...
View ArticleThe Graphical Guide of The Failover Installation in SCSP
According to this article:https://www-secure.symantec.com/connect/articles/u...and the KB:http://www.symantec.com/business/support/index?pag...we can understand the load balance and failover in...
View ArticleConfiguring and running SharePoint server scans & How to set up Scans of...
Scans of SharePoint Servers : The Network Discover Server locates a wide range of exposed confidential data on SharePoint servers. It communicates with the Enforce Server to obtain information about...
View ArticleNetwork Monitor Implementation
Network Monitor :Network Monitor accurately detects confidential information across configured network protocols and content types before it leaves the network. Real-time monitoring and reporting...
View ArticleCollect Agent Information from SCSP Management Console
On SCSP agent, there is a script named getagentinfo.bat under the installation folder. The end-user can use this script to collect the information that needed by support to troubleshoot SCSP agent...
View ArticleKilling Conficker: How to Eradicate W32.Downadup for Good
IntroductionThis is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleEnforce Server integration with Symantec Protection Center (SPC) & How to...
Symantec Protection Center (SPC) is a common user interface which lets you centralize data and management of Symantec and third-party security products on one web console. This consolidation provides...
View ArticleKnowledgebase Articles for Symantec Protection Engine (SPE)
The following document may be an introduction to Symantec Protection Engine for NAS (SPE for NAS) and Symantec Protection Engine for Cloud Services. The most current version of this product available...
View ArticleSymantec Endpoint Protection 12.1 のサイジングと拡張性に関するベストプラクティス
Symantec Endpoint Protection はあらゆる規模の企業に対して最善のエンドポイントセキュリティを提供します。このホワイトペーパーでは、Symantec Endpoint Protection 環境を正しくサイジングして配備し、最適な保護と有用性を実現するためのベストプラクティスを説明します。 SizingSizabilityBestPractices_SEP12.1_ja.pdf
View ArticleMobile Email Monitor
Symantec Data Loss Prevention Mobile Email Monitor provides you with the ability to monitor your company's confidential information when it is ownloaded from your corporate network to the native email...
View ArticleWhat are the default SCSP SQL database accounts and what are they used for?
There are several default accounts created in the SQL Server Database after the installation of the SCSP. You can find these users by logging into the SQL Server Management Studio:There are four...
View ArticleRecovering Embedded Database Password SEPM 12.1
Hello Guys,In this article I will show you how to recover Embedded Database password in SEPM 12.1 X version.1) Navigate to <Installed drive>:\Program Files (x86)\Symantec\Symantec Endpoint...
View ArticleSymantec Data Loss Prevention Mobile Prevent and server-side/ Clinet-side...
1] Symantec Data Loss Prevention Mobile Prevent andserver-side application configuration.2] Symantec Data Loss Prevention Mobile Prevent and client-side application configuration.1] Symantec Data Loss...
View ArticleSymantec Endpoint Protection Manger Upgrade failed "The installation cannot...
Hello Everyone,It's a very common practice for System administrators to disconnect the active session and reconnect it using 'mstsc' command. By doing this many sessions can get activated in the...
View ArticleArchiving incidents
1] Incident Archiving :Incident archiving lets you flag specified incidents as "archived." Because these archived incidents are excluded from normal incident reporting, you can improve the reporting...
View ArticleHow to implement Exact Data Matching
Exact Data Matching (EDM) detects content you want to protect that is stored in structured or tabular format. For example, you can use EDM to detect confidential customer information from a database....
View ArticleConfigure Symantec DLP with RSA envison for Syslog Alert
Dear All,Please follow the below instruction as I integrated DLP 12.0.1 with RSA envison for syslog.Configure Symantec DLPTo configure Symantec DLP to work with the enVision appliance, you must...
View Article