Video Screencast Help

Search

Search results

How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
I need a solution Hi, We have two servers with SEPM (SEPM-A and SEPM-B). We want to eliminate the SEPM-B and migrate all the SEP clients and licenses to the SEPM-A. I want to know ...
Forum Discussion by eugui | 01 Sep 2015 | 2 comments
I need a solution Hi, I am constantly receiving these e-mails from my Symantec Endpoint Protection .cloud service: A high-risk intrusion was detected on  SERVER.domain.local ...
Forum Discussion by SIFIInfrastructure | 21 Aug 2015 | 1 comment
Symantec Endpoint Protection should log the MD5 hash of all detected threats prior to quarantine/clean/deletion. This is an included feature of the McAfree enterprise AV solution. For example: 1/5/2015 3:55:02 PM Deleted (Clean failed because the ...
Idea by Shryke | 06 Aug 2015 | 0 comments
I need a solution Hi, I am using windows 8.1 professional version. I have Endpoint Antivitus. I regullary do complete scan. But antivirus doesnt show any virus or infected file. ...
This issue has been solved
Forum Discussion by Praveen.Solanki | 16 Dec 2014 | 2 comments
I need a solution Hi everyone,     Kindly enlighten us on how to use 'Inherit policies and settings.." configuration. I have two concerns, kindly refer to the ...
This issue has been solved
Forum Discussion by maeLove | 11 Dec 2014 | 6 comments
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
In Current Symantec endpoint protection product SEP12, The client schedule update is based on heartbeat intervals and not on specific time based. This is causing lots of issues in our networks, while updating definition on clients. We never ...
Idea by BANE | 20 Nov 2013 | 1 comment