Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Often times we deploy SEP 12.1 to clients and assume the components are functioning correctly. While the majority of the time this is true, it never hurts to spot check clients to ensure they're working as expected. Below are tests you can run for ...
Article by .Brian | 25 Nov 2014 | 6 comments
Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, ...
Article by Chetan Savade | 08 Sep 2014 | 3 comments
This article is the fifth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous four are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by .Brian | 11 Jul 2014 | 1 comment
Introduction This is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 07 May 2014 | 4 comments
This document describes the creation of a maintenance plan for system and SEP (Sem5) databases of SQL Server 2008. This plan is made of simple tasks that do not impact the operation of the databases. These activities aim at increase the performance of ...
Article by Leon_Homar | 17 Mar 2014 | 0 comments
Hello Everyone, It's a very common practice for System administrators to disconnect the active session and reconnect it using 'mstsc' command. By doing this, many sessions can get activated in the background. It happens especially when ...
Article by Chetan Savade | 03 Mar 2014 | 4 comments
Introduction This is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 31 Jan 2014 | 2 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Updated on 23rd Dec'13 Hello All, Symantec Endpoint Protection 11 RU7 MP4 (11.0.7400.1398) is released on 20th Dec'13 This build's version is: 11.0.7400.1398 This is the final planned release for Symantec Endpoint ...
Article by Chetan Savade | 19 Dec 2013 | 1 comment