Video Screencast Help

Search

Search results

Stay safe. Online Shopping Security Tips The Diwali and Christmas season is a time for celebrations and gifts. ...
Blog Entry by Mithun Sanghavi | 09 Nov 2015 | 1 comment
If you trigger an upgrade of a SEP client from the server the server it will always fail. Our security policy requires UAC be enabled. A security product should not require you to turn off UAC in order to update itself. Please fix Symantec End ...
Idea by rhardy | 04 Nov 2015 | 0 comments
It would be great to bulk update the alias based on information held on other systems via some sort of csv upload facility. For example, we have a list of users against each hostname held within a database which we could export to csv. If we could upload ...
Idea by Marshall542 | 19 Oct 2015 | 0 comments
Every 30 days, the Symantec.cloud client on workstations runs a full scan. This is hard-coded into the client settings upon installation and there is now way to cancel. This full scan slows down the computer and cannot be stoped. Can run for several ...
Idea by Lantek | 15 Oct 2015 | 0 comments
You can move the database of the SEPM from an embedded one to a Microsoft SQL Server, and here are the detailed steps: 1. Backup the database by running 'Database Backup and Restore' tool from Windows Start: 2. Backup the ...
Article by yang_zhang | 04 Oct 2015 | 1 comment
Although all the other permissions for limited administrators are restricted to the groups they manage, anyone with console access and permission to manage installation packages can enable the option to collect user data for the entire SEP domain. ...
Idea by Kev Romine | 30 Sep 2015 | 0 comments
When a Symantec client finds an infected item that cannot be repaired with the current virus definitions, it blocks access to the item. The client then packages the item along with any affected system files and settings, and moves the package to the ...
Article by yang_zhang | 27 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
Hi All, I have been supporting Symantec Endpoint Protection for few years now, having said that, I have always felt it hard to identify the location that a client uses, from the SEPM Console. I know that this is fetchable from "Client ...
Idea by elango252006 | 26 Aug 2015 | 0 comments
Symantec Endpoint Protection should log the MD5 hash of all detected threats prior to quarantine/clean/deletion. This is an included feature of the McAfree enterprise AV solution. For example: 1/5/2015 3:55:02 PM Deleted (Clean failed because the ...
Idea by Shryke | 06 Aug 2015 | 0 comments