Video Screencast Help

Search

Search results

Introduction This is the ninth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 24 Jun 2015 | 1 comment
아래 기술문서는 RU4와 RU5 버전의 SEPM을 기준으로 작성되었습니다. RU6는 적용되지 않으니 참고하시기 바랍니다. Apache Reverse Proxt를 사용하면 LUA 도입없이 기존 SEPM을 활용하여 내부 라이브업데이트 서버를 구현 할 수 있습니다. SEPM은 바이러스패턴을 다운로드하여 보관하는 방식이아닌 캐시서버역할을 하게됩니다. 설정방법: 챕터1. SEPM Apache Reverse Proxy ...
Article by 김기명 | 18 Jun 2015 | 0 comments
The Symantec Endpoint Protection Manager (SEPM) requires the Microsoft SQL Server Native Client (bcp.exe & SQLCMD) to communicate with the SQL database. Thus before installing SEPM, it is required to install the Microsoft SQL Server Native Client. ...
Article by Shulk | 09 Jun 2015 | 0 comments
# Updated: 27th May'15 Hello Everyone, SEP 12.1 RU6 (12.1.6168.6000) has been released and now available on Flexnet to download. For Non English languages it may take few more days. Note: Symantec Endpoint Protection 12.1 RU6 does ...
Article by Chetan Savade | 20 May 2015 | 35 comments
Introduction This is the eighth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 20 May 2015 | 7 comments
Introduction This is the seventh of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 26 Feb 2015 | 3 comments
FAQ Scanning of network drives Q. Does an Administrator-Defined Scan scan the mapped network drives? A. No, it does not. However, if a file located on the network drive is run locally on the client computer and loaded in the ...
Article by Shulk | 20 Feb 2015 | 6 comments
The importance of orchestrated “cloud” security In today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could be experiencing “a new era in cybercrime”. ...
Article by dion_alken | 20 Feb 2015 | 0 comments
This article is the seventh installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous six are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by Brɨan | 15 Feb 2015 | 2 comments
Partners, Your customers may be experiencing issues pertaining to one or both of the following:  SEP 11 End of Service Life  Discontinuation of SEP 11 Virus Definitions The below tools are available to help successfully resolve ...
Article by Cristen Allard | 11 Feb 2015 | 1 comment