Video Screencast Help

Search

Search results

Hello Greg, I have copied / pasted your question for this case,  "Is there a Linux SCOM Management Pack for SPE?", with my answer below. At this time we do not have a Linux SCOM Management Pack for the Symantec Protection Engine ...
Idea by gmichae | 20 Jul 2015 | 0 comments
Up to version 10.5.4 of Symantec Messaging Gateway it is not possible to define sender-based exclusions for Disarm Content (Malware Policies). Using Policy Groups only internal recipient groups can be handled differently for various policies. ...
Idea by thomas.bandion@... | 09 Jul 2015 | 0 comments
Symante Messaging Gateways log files should contain an hash for every attachment. Once a virus is identified by other means (e.g. client PC unusual network activity) you can calculate the hash and search for the hash in the log files (remotely ...
Idea by lfornasari.exte... | 02 Jul 2015 | 0 comments
Hi, It would be nice for the AV, when the heuristic engine detect suspicious file or behavior to upload the file itself, and not just the log and MD5/SHA-1/2/3 to your file analysis system. Multiple vendor offer now this features and it it ...
Idea by MHinse | 20 Oct 2014 | 0 comments
First, Kudos to the Project and Dev teams for adding the ability to run Power Eraser remotely from the SEPM. This is an extremely valuable feature and ehnances our response team's capabilities greatly. I have another Idea I would like to ...
Idea by lockitdownjms | 07 Oct 2014 | 0 comments
The ability for SEP client install from a local repositry at a remote site.   You now support upgrades but not initial push.  This is desirable were there are poor wan connections. There is a clientremote.exe There is a clientremote.exe tool ...
Idea by DECnet | 17 Jul 2014 | 1 comment
Should eliminate the Options button from the "Edit Process Definition" dialog, to always show fingerprint and argument fields. Also, be able to sort on demand the "Apply/Don't apply to" lists, in both rules & conditions ...
Idea by msauafXOM | 28 Feb 2014 | 0 comments
Add the events' Description as a new column, and show the target hashes in the Target column (Security, 12.x, Endpoint Protection (AntiVirus), Emerging Threats, Malicious Code, Features, Reporting) () Add the events' Description ...
Idea by msauafXOM | 28 Feb 2014 | 0 comments
Like Lockdown automatic updates, it should have an automated way of adding new filenames and hashes to ADC rules. We are going to use ADC to blacklist by filename and also to monitor hashes of certain applications. This changes weekly and ...
Idea by msauafXOM | 28 Feb 2014 | 0 comments
It doesn’t seem that SEPM has an easy way to show virus severity.  It just listed the risk name.  If we have a number of different viruses in our environment, it is difficult to determine criticality and prioritize the remediation without a lot of manual ...
Idea by dpirolotvc | 14 Jan 2014 | 0 comments