Video Screencast Help

Search

Search results

CmdmatchV2.exe, a command line driven tool, can be used to help troubleshoot the mismatch of command line arguments in policies.  It is designed to mimic the IPS driver's behavior when parsing command line arguments. In CSP, the command line ...
Download by Chuck Edson | 26 Jun 2013 | 0 comments
  This is an Application Control Policy used to block psexec.exe.  This policy will block psexec.exe based on: - fingerprint -services/processes -filename The action is block and notification is set to display a pop up.   ...
Download by Philly Flyer | 16 Aug 2012 | 2 comments
Here is a Comparison between Windows Vista Firewall and Symantec Endpoint Protection Firewall. This document gives you information on why we should use SEP firewall rather than Windows Firewall. Windows Vista and Windows 2008 share the same ...
Download by Vikram Kumar-SA... | 28 Feb 2012 | 8 comments
Hi, The attached document suggest the steps for creating the ADC (application and device control) policy and stopping the user from write/read/create a registry access. You can use any part of the registry key, here as a example I have used ...
Download by pete_4u2002 | 09 Jan 2012 | 3 comments
Hello Friends, I've created a custom script for a customer that disables or enables Internet Explorer's proxy settings due to clients location. This package includes two .dat files that you can easily import to your Host Integrity ...
Download by oykunsatis | 01 Dec 2010 | 2 comments
  The approach to designing an IT architecture and implementation is changing from a technology-centered paradigm to a solution that is based on business process orchestration. When IT solutions are centered on business processes, an enterprise can ...
Download by Steven.Riley | 12 Nov 2010 | 0 comments
Hi All, Please find the attached Pack that contains additional rules for monitoring DNS.  Details on the rules are listed below: Failed transfer of zone from DNS server. The DNS server could not initialize a recursion ...
Download by Joseph_Carson | 30 Jul 2010 | 0 comments
This Document includes the steps on how to write a Custom Intrution Prevention/Detection system Signature.  With the help of which you can block/control unwanted traffic in your network. Steps_to_create_a_custom_IDS_signature.pdf ...
Download by Vikram Kumar-SA... | 05 Apr 2010 | 4 comments