Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

Currently Symantec requires the services account to have several user rights privledges. It also requires membership of backup operators and  domain or local administrators (TECH36718).  This conflicts with best practices, security strategies, and is ...
Idea by IT@SA | 18 Aug 2014 | 0 comments
http://www.symantec.com/business/support/index?pag... Required exclusions for proxy servers to allow Symantec Endpoint Protection to connect to Symantec reputation and licensing servers Suggestion:  Make the endpoint clients correctly use ...
Idea by Mike_M | 30 Jun 2014 | 1 comment
Good morning gentlemen  It would be great to create a failure analysis after disinfection in the operating system  It would be very good this fix in the system caused by malicious file example of an attack that metasploit using java and concept by ...
Idea by Fabiano.Pessoa | 31 Aug 2012 | 0 comments
Dear, good morning. Who ever heard of sites cloned? The idea that I come to propose, it is a defense against social engineering attack. Network, we could do many things or outside, because the Internet is the "big network". The case ...
Idea by Fabiano.Pessoa | 03 Aug 2012 | 0 comments
Dear, good morning.   It would help create a line of defense based on commands ROUTER, given that we could make a coordinated attack by both the equipment that support the operation such as: router, hubs, switches. With this type of attack, the ...
Idea by Fabiano.Pessoa | 02 Aug 2012 | 0 comments
Prezados, bom dia. Muito estamos preocupados com grandes ataques a nossos computadores e redes, no qual o que menos queremos no momento, seria um roubo de informação ou algo do tipo. Porém vale lembrar a todos, que os ataques estão sendo modificados, ...
Idea by Fabiano.Pessoa | 01 Aug 2012 | 0 comments
It is apparent to me and many others that the SMTP system in Backup Exec has been broken almost as long as I have been using it, sometime around 2005. That was probably before they were even taken over by Symantec, but the problem was able to be fixed ...
Idea by MBHB IT crew | 23 May 2012 | 2 comments
 Im sure you are all familiar with "host groups" and how this feature can be used in the Firewall to reduce complexity and visual size or FW Rules sets. Well, im proposing that Symantec add a New but simular feature called "Application ...
Idea by Topa 101 | 20 Jan 2012 | 2 comments
Hi All,   We can have a new option enabled in checkpoint collector for the environment having auto failover of checkpoint management servers (with CA faileover).   We should able to configure all the available checkpoint management server ...
Idea by Avkash K | 18 Oct 2011 | 3 comments
When modifying a firewall policy, on the Traffic and stealth page if Enable anti mac spoofing is set, there is not currently a way to prevent a user notification pop up. (Security, 11.x, Endpoint Protection (AntiVirus), Education, Firewall, ...
Idea by K12 Support User | 15 Aug 2011 | 0 comments