Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

  Here are few steps you can follow and try:  1) Create a .msi package.  http://www.symantec.com/docs/TECH165483     2) Edit the setup.ini file within the package and add that option either at the end of the CmdLine option ...
Article by Mithun Sanghavi | 03 Oct 2011 | 2 comments
Problem LiveUpdate tries to download updates, the following error message appears. - "LU1832: LiveUpdate could not read an update. LiveUpdate was not able to decompress an update because it was corrupted during download. LiveUpdate rerun to ...
Article by Mithun Sanghavi | 04 Jul 2011 | 2 comments
Hello, As Per the Symantec Knowledgebase Article: Symantec Endpoint Protection 11.0 compatibility with 64-bit platform http://www.symantec.com/docs/TECH102143   Currently the following SEP features do not run on 64 bit Windows ...
Idea by Mithun Sanghavi | 08 Jun 2011 | 0 comments
Problem: Receiving pop-up Error message stating "Low Disk Space" after installing Symantec Endpoint Protection Manager (SEPM) or Symantec Endpoint Protection(SEP) on Machines. Error: Receiving pop-up Error message stating "Low Disk ...
Article by Mithun Sanghavi | 01 Jun 2011 | 8 comments
Hello, When we change the View of Client Groups to "Client System", we see the Operating System. However we don't see the Type of Operating System (32 bit or 64 bit). Again, when we export the Client Status logs, we see the ...
Idea by Mithun Sanghavi | 12 May 2011 | 4 comments
Hello, How about seeing a new Feature where we could Import a list of IP addresses into Excluded Hosts of an IPS policy. Probably we can import it from .txt file or from probably from DHCP.  As of know, we see we could only enter single IP, ...
Idea by Mithun Sanghavi | 05 May 2011 | 1 comment
Hello, A way to disable Hyperlink from the Symantec Endpoint Protection Security Software. A rule which could assist Administrators, which could Disable hyperlinks in a junk/phishing email that has reached the user. I am not aware of any ...
Idea by Mithun Sanghavi | 05 May 2011 | 1 comment
 What is Peer to Peer (P2P) Application?  P2P is nothing but just Peer to Peer networking. As we have Server - Client Model and Peer to Peer network in the same way these P2P applications work. You need a P2P program that will be installed on ...
Article by Vikram Kumar-SA... | 13 Oct 2009 | 26 comments
I wanted to write about the Layered Security principle, which I've been familiar with for a couple of years.  I can definitely say that this model will exist forever. Before I explain in detail what layered security model is let me explain why this ...
Article by Chris_L | 31 Jul 2009 | 1 comment
Today Endpoint protection has become very critical. As Information technology has progressed over these years, its enemies have also increased. Starting from worms and viruses, today we face a lot of enemies waiting to attack our computers. Some of ...
Article by danny77 | 31 Jul 2009 | 6 comments