Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Hi, It would be nice for the AV, when the heuristic engine detect suspicious file or behavior to upload the file itself, and not just the log and MD5/SHA-1/2/3 to your file analysis system. Multiple vendor offer now this features and it it ...
Idea by MHinse | 20 Oct 2014 | 0 comments
Novacoast Webinar September 30th @ 12pm EST Tue, 30 September, 2014 - 12:00 - 13:00 EDT ...
Event by ryanschoenherr | 29 Sep 2014 | 4 comments
I need a solution Bonjour,  Mon but est d'installer un  second serveur  Symantec Endpoint Protection Manager pour un sous réseau. C'est à dire,je veux que mon second ...
Forum Discussion by bassanjerome@gm... | 20 Jun 2014 | 3 comments
Online Thu, 05 June, 2014 - 14:00 - 15:00 EDT   Free Webcast from ITS   Thursday, ...
Event by Chad Dupin | 23 May 2014 | 0 comments
Please bring back the clear infection option under Monitor>Logs>Computer Status. I cannot accurately determine if the infection is clear or get rid of false positives.  (Security, 12.1, Endpoint Protection Small Business Edition 12.x, ...
Idea by Nick Burns | 07 Apr 2014 | 0 comments
Suggest the next SEP can display SEP scan pop-up for removable media when the removable media attached. It will inform the user SEP is protecting them.   SEP doesn't scan when SEP doesn't scan when removable media is inserted. Only ...
Idea by haiyang | 06 Mar 2014 | 2 comments
We would like to see reputation based URL Filtering added to Symantec Endpoint Protection to protect workstation clients from malicious web-sites, phishing and other malicious activities as an adjunct to Download Insight.    The URL Filtering would act ...
Idea by Wally | 13 Jan 2014 | 1 comment
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 1 comment
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments