Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Search

Search results

It may be desireable to designate a system to act as a GUP where the system has multiple network interfaces. In this case, it also may be desired that some of IP addresses associated with these interfaces NOT be included in the GUP list. The enhance ...
Idea by JimA | 28 Jan 2015 | 1 comment
I want a centralized dashboard solution that can give me visibility across my security environment. I currently have many Symantec tools in place along with some other desperate solutions, a unified dashboard tool would allow for easy reporting and ...
Idea by tr399 | 26 Nov 2013 | 1 comment
When sending emails to non local domains, the response should be relaying denied instead of Recipient address rejected: User unknown for example: Connected to mx1.domain.com. Escape character is '^]'. 220 mail.domain.com ESMTP ...
Idea by Yafit-amd | 20 Jan 2013 | 0 comments
From time to time, there are some errors on internal LUA site and we need to clear all the content in distribution center and re-populated them. But right now, every time when we do that, we have to delete/recreate the distribution site. It would be ...
Idea by KathyV | 17 Jul 2012 | 2 comments
Could Centralized Exceptions be modeled after the custom IPS library? For example, you create an list of  exclusions for a server acting as a web server, another for your mail server, another for DC's, etc. These are like the individual rule sets ...
Idea by BrooksGarrett | 25 May 2010 | 0 comments
When a malware is detected on a system with SEP 11 installed, alert was sent to administrators, it would be nice that you can include the client virus defintion date and primary action is defined , the actual action is taken along with other ...
Idea by mssym | 26 Apr 2010 | 4 comments
I have had to stop using our Application and Device Control Policy to block programs running from CDs/DVDs as it simply isn't feasible to add a fingerprint for each Setup.exe file or other fingerprints, a line at a time in the policy.  There needs ...
Idea by jimmyjames | 16 Apr 2010 | 3 comments
Hi, in some cases f.e. on clients it could be very helpful to execute a task after the scheduled scan. For example in consideration of green it and cost savings. When you schedule a client scan after the business hours, it should be possible to ...
Idea by toby | 16 Apr 2010 | 0 comments
Please, an area dedicated to a very good, but honestly often forgotten product even many Symantec folks know nothing about....... Symantec Protection for Sharepoint Services! It's a security application, an AV app, just like AV for email or ...
Idea by ShadowsPapa | 15 Apr 2010 | 32 comments
Currently on the Threat Explorer page you can search by threat name or for file names. http://www.symantec.com/business/security_response/threatexplorer/index.jsp For example, a search for Spyware.Perfect or BPK.exe return results for the ...
Idea by SeanG | 13 Apr 2010 | 0 comments