Video Screencast Help

Search

Search results

Most of the organizations use SCCM to deploy Third party software, OS patches etc to endpoints.It’s a very tedious process for the SCCM admin to verify if all the endpoints are 100% compliant. I would like to present a solution where you can ensure ...
Article by Robocop | 27 Nov 2013 | 3 comments
I have come across customers who are on Symantec Endpoint Protection Manager 11 and are gearing to migrate / upgrade to Symantec Endpoint Protection Manager 12. The Challenge / dilemma they face is whether to retain the existing SEPM 11 or setup a ...
Article by Robocop | 28 Oct 2013 | 2 comments
Welcome to the Part 3 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and explanation of several SEP related technologies, tools and ...
Article by SebastianZ | 04 Sep 2013 | 8 comments
This article presents an introduction to publicly available solutions and knowledge-base for Symantec Liveupdate Administrator (LUA) product - latest  available LUA version is 2.3.3.20 . KB listing has been split in several categories to allow ...
Article by SebastianZ | 17 Aug 2013 | 11 comments
Hello, CIOs are under increasing pressure to reduce desktop and application management costs while providing seamless and secure access to corporate resources across an array of user devices. They also realize that increased regulatory requirements ...
Article by Mithun Sanghavi | 08 May 2013 | 2 comments
1 Introduction Smartphones have been widely adopted by organisations for day to day business and operational use, and employees can often access their work related data by connecting to corporate networks using their Smartphones. Many ...
Article by Vikas Rajole | 21 Mar 2013 | 12 comments
I have come across lot of customers who have Symantec Network Access Control License but they are not using it. It is part of the Symantec Protection Suite 3 or 4 that you might have. The simple reason could be either they find it complicated to ...
Article by Vikram Kumar-SA... | 25 Feb 2013 | 4 comments
  One of the challenges for administrators, architects and developers in the cloud environment is to comprehend the relationships between different components deployed in the cloud as more resources are added to the infrastructure. Most management ...
Article by Krishnan Narayan | 28 Nov 2012 | 0 comments
  [This is taken from a older forum post I created . . . placing it here for higher visibility] The I-DHCP Enforcer, Gateway Enforcer and LAN Enforcer enforce Host Integrity policies by blocking network access or sending non-compliant machines to ...
Article by Chuck Edson | 07 Aug 2012 | 0 comments
In the news….. The FBI will be losing their court granted hold over the DNS servers in March and they are planning to make them “go dark”. Rather than changing their green lights sabers to red, this will cause any machine still looking to ...
Article by Brandon Noble | 27 Feb 2012 | 1 comment