Video Screencast Help

Search

Search results

I need a solution We are developing Entrerprice Security application(Developled using .Net. Windows Application) for authentication purpose. Recently Symantec Endpoint protection ...
Forum Discussion by VULVAJI | 08 Jan 2016 | 5 comments
Hi,  I would propose to have a public virus database lookup based on a certain filename or malware types or even based on certain md5 hashes just like virustotal which would state the type of virus and the date where defintiions/signatures are being ...
Idea by Raydon | 29 Nov 2015 | 1 comment
I need a solution Hello , is it neccesary to have MD5 of file and file path in fingerprint file used in blacklist mode like : 0bb018fad1b244b6020a40d7c4eb58b7 ...
This issue has been solved
Forum Discussion by Adriatikb | 30 Oct 2015 | 2 comments
I need a solution Hello, We have a plan to upgrade our old PC farm to Windows 7. Our testing machine has installed Windows 7 SP1 (32-bit) and also installed Symantec Endpoint ...
Forum Discussion by loftthehk | 19 Oct 2015 | 4 comments
I need a solution How much time it takes for the Symantec to update the identified event to be inserted in DB.  Does it do it immediately (or) it takes time?  If it takes time how long ...
Forum Discussion by gokikrishnan | 16 Oct 2015 | 3 comments
I need a solution I recently saw an article from mar of 2015 about DRIDEX. Does Syamantec Endpoint Protection detect and protect against this type of infection/malware. I want to ensure ...
Forum Discussion by alplechaty | 13 Oct 2015 | 7 comments
I need a solution Hi Guys, I am experiencing a strange error since today. It seems like Sysfer.dll is crashing the Windows Logon and Group Policy management of our clients. Here ...
Forum Discussion by StephanK | 02 Oct 2015 | 2 comments
The SONAR technology within SEP 12 RU6 currently does not detect when an application captures a screenshot without user interaction according to Symantec Technical Support.  The benefit of this would be stopping screen scraping malware that takes a ...
Idea by Steve26134 | 01 Oct 2015 | 0 comments
This video is a presentation and demonstration about the DNS Spoofing attack methodology and how to mitigate it using Symantec Endpoint Protection system. Rather than providing ...
Video by Farzad | 26 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments