Video Screencast Help

Search

Search results

Stay safe. Online Shopping Security Tips The Diwali and Christmas season is a time for celebrations and gifts. ...
Blog Entry by Mithun Sanghavi | 09 Nov 2015 | 1 comment
You can move the database of the SEPM from an embedded one to a Microsoft SQL Server, and here are the detailed steps: 1. Backup the database by running 'Database Backup and Restore' tool from Windows Start: 2. Backup the ...
Article by yang_zhang | 04 Oct 2015 | 1 comment
Although all the other permissions for limited administrators are restricted to the groups they manage, anyone with console access and permission to manage installation packages can enable the option to collect user data for the entire SEP domain. ...
Idea by Kev Romine | 30 Sep 2015 | 0 comments
When a Symantec client finds an infected item that cannot be repaired with the current virus definitions, it blocks access to the item. The client then packages the item along with any affected system files and settings, and moves the package to the ...
Article by yang_zhang | 27 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
Symantec Endpoint Protection should log the MD5 hash of all detected threats prior to quarantine/clean/deletion. This is an included feature of the McAfree enterprise AV solution. For example: 1/5/2015 3:55:02 PM Deleted (Clean failed because the ...
Idea by Shryke | 06 Aug 2015 | 0 comments
On July 29th, Microsoft will be releasing their next major operating system, Windows 10. Unlike previous OS upgrades, this version does not require users to purchase the new OS. The existing Windows 7 and 8 end users might initiate an upgrade directly on ...
Blog Entry by Liz Jennings | 22 Jul 2015 | 12 comments
情報セキュリティ意識について、従業員のトレーニングを実施しましょう オンラインでの企業の安全対策は、コンピュータとネットワークの安全対策に従業員も関与するところから始まります。 ...
Blog Entry by Mithun Sanghavi | 03 Jun 2015 | 0 comments
標的型攻撃は、現代のセキュリティインフラストラクチャが直面している、特に厄介で難しい脅威です。シマンテックは、2013 年に標的型攻撃の件数が 91% も増加したことを確認しています。ここでは、標的型攻撃の詳細と、すぐに実行できる対策についてお伝えします。 ...
Blog Entry by Solange Deschatres | 02 Jun 2015 | 0 comments
SEP Enterprise Edition Hello Everyone, SEP 12.1 RU6 (12.1.6168.6000) is now available on Flexnet to download. Full setup file is of size 675 MB. Installation and ...
Blog Entry by Chetan Savade | 20 May 2015 | 27 comments