Video Screencast Help

Search

Search results

Hi All, As I am working on Symantec Endpoint Protection 12.1.since more than year, I went through different issues on Symantec Manager and client and most important different Viruses, Worms and Trojans. Here I am sharing some best practices which I ...
Article by kishorilalWipro | 05 Feb 2016 | 0 comments
Real Use Case: An Apache Web Server was compromised and the following folders were used to store malware code.                                                 /home/XXX/public_html/XXXX/                                               ...
Article by Orionx | 04 Feb 2016 | 0 comments
You can move the database of the SEPM from an embedded one to a Microsoft SQL Server, and here are the detailed steps: 1. Backup the database by running 'Database Backup and Restore' tool from Windows Start: 2. Backup the ...
Article by yang_zhang | 04 Oct 2015 | 1 comment
The attached document illustrates step-by-step instructions for configuring an all-in-one production-style Mobility tenant.  This article is intended to be used for testing purposes only. All-in-one_Lab.pdf (Managing Mobility, ...
Article by adam_burner | 24 Sep 2015 | 0 comments
아래 기술문서는 RU4와 RU5 버전의 SEPM을 기준으로 작성되었습니다. RU6는 적용되지 않으니 참고하시기 바랍니다. Apache Reverse Proxt를 사용하면 LUA 도입없이 기존 SEPM을 활용하여 내부 라이브업데이트 서버를 구현 할 수 있습니다. SEPM은 바이러스패턴을 다운로드하여 보관하는 방식이아닌 캐시서버역할을 하게됩니다. 설정방법: 챕터1. SEPM Apache Reverse Proxy ...
Article by 김기명 | 17 Jun 2015 | 0 comments
You’ve installed & set up the SEPM console. You’ve also deployed the SEP clients to PCs across the network. The job is done… or so you thought. While it can ‘run’ itself most of the time, there are some thing you will have to monitor the health of ...
Article by Tony Sutton | 13 Jan 2015 | 8 comments
Hello All, Follow the below steps and you are ready to scan for Heartbleed vulnerability: 1. In the CCSVM Console Web interface, click Administration from the top menu. Under the Scan Options Section on the administration page, click the manage ...
Article by isaneh | 15 Oct 2014 | 0 comments
Hello All, Lots of people are facing issue to scan their network for shellshock vulnerability with CCSVM. Follow the below steps and you are ready to scan for shellshock vulnerability: 1. In the CCSVM Console Web interface, click Administration ...
Article by isaneh | 08 Oct 2014 | 0 comments
The Project has been designed to address the concern of a few client who wanted to know whether it would be possible to update or modify resolution details when ticket is either in "Resolved" or "Closed". This project can help in ...
Article by SandeepShrivastava | 12 Aug 2014 | 0 comments
By default, the Select User field (or more precisely, Check if User Exists Using Email Address button next to it) on Submit Incident (Advanced) form only accepts user's primary e-mail, not user's name. There have been questions about why it ...
Article by toomas | 05 Jun 2014 | 1 comment