Video Screencast Help

Search

Search results

Using ADC to block Chrome extensions There may be situations where you wish to block end-users from utilizing a specific Google Chrome browser extension. This can be accomplished, fairly easily, via Application and Device Control in Symantec ...
Article by DSOLO | 08 Feb 2016 | 0 comments
There is an introduction about the Symantec Protection Engine (SPE): https://www-secure.symantec.com/connect/articles/introduction-symantec-p... SPE can work with NetApp Filer to run virus scan for the shared files. Here are the steps to ...
Article by yang_zhang | 23 Aug 2015 | 0 comments
There are the 3 types of Policies for Unix in Symantec Data Center Security – 1) The UNIX Null prevention policy provides no protection for an agent computer. The Null policy does not log policy violations. The policy is automatically applied to ...
Article by Mithun Sanghavi | 13 Jul 2015 | 0 comments
Trends in Trust on the internet of Things We are all happy with how technology is making our lives easier and fulfilling. Most of the internet population is however not aware that the moment you turn on a device connected to internet or ...
Article by dion_alken | 22 Apr 2015 | 0 comments
All, I have only recently been able to have the time and sit down to script this all out for my organization We have no issues (crossed fingers) with this script after deploying to over 20K endpoints and have seen a few forum posts about how to ...
Article by AltirisJunkie | 24 Mar 2015 | 7 comments
The Protection Engine (formerly named as Scan Engine) download the updates from Internet by default, but, we can configure it to update from LiveUpdate Administrator. Such kind of configuration will be very useful if the customer has a LUA in their ...
Article by yang_zhang | 01 Oct 2014 | 4 comments
Introduction This is the fifth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it ...
Article by Mick2009 | 31 Jan 2014 | 5 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
The following process is a guide on how to migrate endpoints from previous versions of Altiris to Symantec Management Platform 7.5 utilizing a side by side infrastructure method.  (Version 6.x current and Version 7.5 future) Assumptions:  The ...
Article by JasonI | 12 Dec 2013 | 2 comments
Symantec Data Loss Prevention provides many operational log files that can be used to interpret how the system is running. The default locations put the log files during installation for the Enforce Server and Detection Servers on the computers that ...
Article by yang_zhang | 21 Nov 2013 | 0 comments