Video Screencast Help

Search

Search results

Online Thu, 24 April, 2014 - 11:00 - 12:00 EDT Thursday, April 24th at 11:00 am (EST) ...
Event by Chad Dupin | 17 Apr 2014 | 0 comments
Give an attacker a phish and he will steal some data. Teach an attacker to spear phish and he will steal data bases.   Among the wide diversity of threats facing the modern enterprise, targeted attacks are often the most troubling and difficult ...
Blog Entry by Sdesc | 15 Apr 2014 | 0 comments
Hi, I would like to see some more integrated default protection policies in the Symantec Endpoint Protection 12.1 EE. For example a firewall policy or a rule to block Facebook/Twitter etc. Or Intrusion Prevention policy to block certian applications ...
Idea by paja | 09 Apr 2014 | 2 comments
I guess we need to face it. Sality is here to stay. We have been dealing with new Sality variants for more than 8 years and the Sality.AE family for a little over 5…the variants keep coming. It has become one of the most common file infectors ...
Blog Entry by Brandon Noble | 30 Dec 2013 | 2 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by captain jack sparrow | 03 Dec 2013 | 0 comments
In Current Symantec endpoint protection product SEP12, The client schedule update is based on heartbeat intervals and not on specific time based. This is causing lots of issues in our networks, while updating definition on clients. We never ...
Idea by BANE | 20 Nov 2013 | 1 comment
IT Analytics introduces powerful ad-hoc reporting and business intelligence tools, and along with it a few terms that may be new to you. To alleviate any confusion, this article describes a few key terms so that you can easily understand out-of-the-box ...
Article by dprager | 21 Oct 2013 | 0 comments
Welcome to the Part 3 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and explanation of several SEP related technologies, tools and ...
Article by SebastianZ | 18 Mar 2014 | 8 comments
Hello, My name is Mithun Sanghavi and I am part of the Technical Support organization at Symantec. I’m sure you have had a few “How do I..." or "Where can I find...?” kind of questions about Symantec Endpoint Protection. This blog is to ...
Blog Entry by Mithun Sanghavi | 20 Aug 2013 | 0 comments
Hi, to use the Application and Device Control in productive enviroment, the handling of the CD should be like the handling of USB sticks. There should be a posibility to block CD writes and reads certain. There should be also a posibility to log the ...
Idea by Montgomery | 25 Jul 2013 | 0 comments