Video Screencast Help
Welcome to Symantec Connect
Solve problems, Share knowledge, Earn rewards.

Connect communities are where Symantec business customers, partners, and employees find solutions, share technical knowledge, and submit product ideas.

Join the conversation with over 397,072 registered members.

FIND
Your Community

Content is grouped in communites around products and topics:

EARN
Rewards

Earn rewards points whenever you participate on Connect.

EXPLORE
IT Trends

Follow conversations about today's IT Trends.

Connect ActivityRSS

new discussion 22 May 2015
We have a need to monitor users that are copying files off their laptops when they are off the corporate network. So we’ve made an Endpoint Monitoring Policy. The problem is we get a big performance hit when users are opening or closing Outlook or adding PST files to Outlook when on the corporate network. When you check out the configuration below you can see I’m attempting to drop the ...
new discussion 22 May 2015
Hi all. I am talking about the integration that would allow to use the DLP console to release incidents from Brightmail's quarantine folders. We tried to enable it, exchanged certificates, and it is not working. Has anyone been able to successfully make it work?  Does anyone have a step-by-step, exactly where to go and what to click?  We have gone over the Symantec Data ...
updated blog entry 22 May 2015
Contributor: Lamine Aouad SMS spammers are attempting to avoid URL filters by hiding links in YouTube videos. Symantec discovered this trend in a recent SMS spam campaign, which disguised the sender as a woman looking to date the message’s recipient. The message directed the user to a YouTube video, which asked them to “get verified” by visiting a link included in the video. However, this ...
updated blog entry 22 May 2015
Rarely a month goes by now without researchers publicizing a newly discovered attack or vulnerability against widely used systems. So far this year we’ve had GHOST in January, JASBUG in February, FREAK in March, and VENOM in May. Now, we can add Logjam to the collection. The discovery of the Logjam attack (minus a logo) comes courtesy of an international group of security researchers. This ...