Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

Currently Symantec requires the services account to have several user rights privledges. It also requires membership of backup operators and  domain or local administrators (TECH36718).  This conflicts with best practices, security strategies, and is ...
Idea by IT@SA | 18 Aug 2014 | 0 comments
As a Disaster Recovery and High-Availability Consultant, I've participated in several disaster recovery exercises, for different customers in different industries, most of them large financial institutions, that are severely regulated here in Brazil ...
Article by RAPHAEL F CARVALHO | 16 Dec 2013 | 0 comments
We are standardizing on Surface RT as our business tablets and have heard that Outlook RT will be coming sometime this year (2013) for Windows RT. Our primary need is to have the evault plugin available for this asap. I don't know if ya'll can ...
Idea by dglasgow | 14 May 2013 | 5 comments
I need a solution Hi, We uses SEP and SEPM 12.1 RU1 MP1. Our problem is that the SEPM sends multiple notifications through e-mail. It is very annoying. Please help us to get rid of ...
Forum Discussion by Ishmael | 04 Oct 2012 | 2 comments
I need a solution hi all Every monday our SEPM server reports a Poor health status. I check the free disc space and it is still 14.5 GB, The memory is 3 GB. Do anyone here had the ...
Forum Discussion by Ishmael | 16 Sep 2012 | 8 comments
I do not need a solution (just sharing information) Good morning,  It would not be important in similar forensic software security solution to point some strange movement in net for ...
Forum Discussion by Fabiano.Pessoa | 09 Sep 2012 | 2 comments
I do not need a solution (just sharing information) Dear, good morning.   I would like to propose a database for codes port scan, or create a code base with NMAP scans ...
Forum Discussion by Fabiano.Pessoa | 05 Sep 2012 | 5 comments
Good morning gentlemen  It would be great to create a failure analysis after disinfection in the operating system  It would be very good this fix in the system caused by malicious file example of an attack that metasploit using java and concept by ...
Idea by Fabiano.Pessoa | 31 Aug 2012 | 0 comments
I do not need a solution (just sharing information) STEP 1: Once you start GRUB press the E (edit). STEP 2: Select the line below and press the E (edit). kernel ...
Forum Discussion by Fabiano.Pessoa | 27 Aug 2012 | 0 comments
I need a solution Given the findings of some practices and routines, it is easy to know what the problems are with the security companies. It is your case? The scenes are classic. A ...
This issue has been solved
Forum Discussion by Fabiano.Pessoa | 26 Aug 2012 | 6 comments