Video Screencast Help

Search

Search results

Real Use Case: An Apache Web Server was compromised and the following folders were used to store malware code.                                                 /home/XXX/public_html/XXXX/                                               ...
Article by Orionx | 04 Feb 2016 | 0 comments
Since cmdmatchv2.exe is not public anymore , could you create a tool that can be used by Partner Consultants in order to troubleshoot Data Center Security command line matching issues? Is very common to find issues with arguments , if that requires ...
Idea by Orionx | 03 Feb 2016 | 0 comments
I need a solution Hi, What is the SMTP server for SCSP? Thanks! 0 Do you mean on how to configure ...
Forum Discussion by SuConnect | 10 Dec 2015 | 2 comments
I need a solution Hi, I'm new to SCSP i would like to know how can i use this software to prevent modification towards specific registry keys. Thanks! ...
Forum Discussion by SuConnect | 08 Dec 2015 | 2 comments
I need a solution I have done new installation of Symantec Critical System Protection 5.2.9 on Windows Server 2008 R2. Its Database is on separate server running MS SQL Server 2008 ...
Forum Discussion by jawad1987 | 18 Nov 2015 | 3 comments
I need a solution I have done new installation of Symantec Critical System Protection 5.2.9 on Windows Server 2008 R2. Its Database is on separate server running MS SQL Server 2008 ...
This issue has been solved
Forum Discussion by jawad1987 | 17 Nov 2015 | 3 comments
This video is a presentation and demonstration about the DNS Spoofing attack methodology and how to mitigate it using Symantec Endpoint Protection system. Rather than providing ...
Video by Farzad | 26 Sep 2015 | 0 comments
I need a solution Hi Guys, i seems to be having some problems recently with SCSP agent installed on a RHEL 6.4 machine. It is meant to be used for as Arcsight smart connector ...
Forum Discussion by gerard ng | 17 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
I need a solution Dear All: I have  an AIX7 server with SCSP Agent 5.2.9MP6 installed for few month. The only policy is File Watch for 6 document, report frequency is less ...
Forum Discussion by TonyChen | 15 Sep 2015 | 0 comments