Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Search

Search results

This article is the seventh installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous six are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by Brɨan | 15 Feb 2015 | 2 comments
Partners, Your customers may be experiencing issues pertaining to one or both of the following:  SEP 11 End of Service Life  Discontinuation of SEP 11 Virus Definitions The below tools are available to help successfully resolve ...
Article by Cristen Allard | 11 Feb 2015 | 0 comments
Often times we deploy SEP 12.1 to clients and assume the components are functioning correctly. While the majority of the time this is true, it never hurts to spot check clients to ensure they're working as expected. Below are tests you can run for ...
Article by Brɨan | 25 Nov 2014 | 10 comments
Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, ...
Article by Chetan Savade | 08 Sep 2014 | 3 comments
This article is the fifth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous four are below: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize ...
Article by Brɨan | 11 Jul 2014 | 2 comments
Introduction This is the sixth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 07 May 2014 | 5 comments
This document describes the creation of a maintenance plan for system and SEP (Sem5) databases of SQL Server 2008. This plan is made of simple tasks that do not impact the operation of the databases. These activities aim at increase the performance of ...
Article by Leon_Homar | 17 Mar 2014 | 0 comments
Hello Everyone, It's a very common practice for System administrators to disconnect the active session and reconnect it using 'mstsc' command. By doing this, many sessions can get activated in the background. It happens especially when ...
Article by Chetan Savade | 03 Mar 2014 | 4 comments
Introduction This is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 31 Jan 2014 | 2 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments