Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, ...
Article by Chetan Savade | 08 Sep 2014 | 1 comment
This article is the fifth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous four are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by .Brian | 11 Jul 2014 | 1 comment
Introduction This is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 07 May 2014 | 4 comments
This document describes the creation of a maintenance plan for system and SEP (Sem5) databases of SQL Server 2008. This plan is made of simple tasks that do not impact the operation of the databases. These activities aim at increase the performance of ...
Article by Leon_Homar | 17 Mar 2014 | 0 comments
Hello Everyone, It's a very common practice for System administrators to disconnect the active session and reconnect it using 'mstsc' command. By doing this, many sessions can get activated in the background. It happens especially when ...
Article by Chetan Savade | 03 Mar 2014 | 4 comments
Introduction This is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 31 Jan 2014 | 2 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Updated on 23rd Dec'13   Hello All, Symantec Endpoint Protection 11 RU7 MP4 (11.0.7400.1398) is released on 20th Dec'13 This build's version is: 11.0.7400.1398 This is the final planned release for Symantec ...
Article by Chetan Savade | 19 Dec 2013 | 1 comment
Most of the organizations use SCCM to deploy Third party software, OS patches etc to endpoints.It’s a very tedious process for the SCCM admin to verify if all the endpoints are 100% compliant. I would like to present a solution where you can ensure ...
Article by Robocop | 27 Nov 2013 | 3 comments