Video Screencast Help

Search

Search results

I need a solution Is SEP 12.1 MP4a (12.1.4023.4080) vulnerable to Heartbleed?   Currently, all hosts are internal, however the SEPM does go through squid proxy to capture daily ...
Forum Discussion by JRS17 | 10 Apr 2014 | 15 comments
I do not need a solution (just sharing information) XCEND Group is a Syamntec Platinum Partner but we developed our own unique real time dashboard solution MetriX. MetriX gives users ...
Forum Discussion by XCENDGroup | 25 Mar 2014 | 1 comment
Add the events' Description as a new column, and show the target hashes in the Target column (Security, 12.x, Endpoint Protection (AntiVirus), Emerging Threats, Malicious Code, Features, Reporting) () Add the events' Description ...
Idea by msauafXOM | 28 Feb 2014 | 0 comments
Like Lockdown automatic updates, it should have an automated way of adding new filenames and hashes to ADC rules. We are going to use ADC to blacklist by filename and also to monitor hashes of certain applications. This changes weekly and ...
Idea by msauafXOM | 28 Feb 2014 | 0 comments
It doesn’t seem that SEPM has an easy way to show virus severity.  It just listed the risk name.  If we have a number of different viruses in our environment, it is difficult to determine criticality and prioritize the remediation without a lot of manual ...
Idea by dpirolotvc | 14 Jan 2014 | 0 comments
We would like to see reputation based URL Filtering added to Symantec Endpoint Protection to protect workstation clients from malicious web-sites, phishing and other malicious activities as an adjunct to Download Insight.    The URL Filtering would act ...
Idea by Wally | 13 Jan 2014 | 1 comment
Introduction This is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 10 Jan 2014 | 6 comments
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 07 Jan 2014 | 0 comments
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 27 Dec 2013 | 0 comments