Video Screencast Help
New Company Name and Logo Announced. Learn More.

Search

Search results

You’ve installed & set up the SEPM console. You’ve also deployed the SEP clients to PCs across the network. The job is done… or so you thought. While it can ‘run’ itself most of the time, there are some thing you will have to monitor the health of ...
Article by Tony Sutton | 13 Jan 2015 | 1 comment
This article is the sixth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous five are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by Brɨan | 03 Jan 2015 | 3 comments
A. Take a Backup of Database OR Follow the Disaster Recovery Steps for 12.1  http://www.symantec.com/docs/TECH160736   B. Symantec Endpoint Protection – How to cleanup excessive disk usage  This document describes the necessary steps ...
Article by Amit.eu | 22 Dec 2014 | 2 comments
How to move SEPM from C drive to x drive :  The best course of action in this situation would be to run a disaster recovery on the SEPM, and reinstall SEPM directly on another drive.  Here are the steps for your reference: 1. Disaster ...
Article by Amit.eu | 05 Dec 2014 | 0 comments
With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). However, some folder exclusions still have to be configured via the command-line interface (e.g. /sys and /proc).  TECH95274 ...
Article by DSOLO | 04 Dec 2014 | 0 comments
Often times we deploy SEP 12.1 to clients and assume the components are functioning correctly. While the majority of the time this is true, it never hurts to spot check clients to ensure they're working as expected. Below are tests you can run for ...
Article by Brɨan | 25 Nov 2014 | 9 comments
Hi, This article will demonstrate how to uninstall Symantec Endpoint Protection on Red Hat Linux machine.. You must have superuser privileges to uninstall the Symantec Endpoint Protection client on the Linux computer. The procedure uses sudo ...
Article by Chetan Savade | 23 Oct 2014 | 1 comment
Meet the all-new Norton .  Boldly go where you want, when you want. NORTON PRODUCTS Norton Security Norton Security with Backup Norton Small Business Norton Mobile Security Norton Online Backup ...
Article by GSO Customer Tr... | 22 Oct 2014 | 0 comments
What is Endpoint Protection ? Symantec Endpoint Protection is an endpoint security solution designed to provide a layered approach to defense. Leveraging the power of Symantec's Global Intelligence Network, it detects and removes more ...
Article by GSO Customer Tr... | 22 Oct 2014 | 0 comments
Overview The Symantec Endpoint Protection client for Linux provides Virus and Spyware protection and Auto-Protect features for supported Linux operating systems. It can be deployed using the Web link and email or Save package method from ...
Article by Shulk | 15 Oct 2014 | 0 comments