Video Screencast Help

Search

Search results

This document describes the creation of a maintenance plan for system and SEP (Sem5) databases of SQL Server 2008. This plan is made of simple tasks that do not impact the operation of the databases. These activities aim at increase the performance of ...
Article by Leon_Homar | 18 Mar 2014 | 0 comments
Hello Everyone, It's a very common practice for System administrators to disconnect the active session and reconnect it using 'mstsc' command. By doing this, many sessions can get activated in the background. It happens especially when ...
Article by Chetan Savade | 19 Mar 2014 | 4 comments
Symantec Endpoint Protection はあらゆる規模の企業に対して最善のエンドポイントセキュリティを提供します。このホワイトペーパーでは、Symantec Endpoint Protection 環境を正しくサイジングして配備し、最適な保護と有用性を実現するためのベストプラクティスを説明します。   SizingSizabilityBestPractices_SEP12.1_ja.pdf (Security, 12.x, ...
Article by SEP サポート | 16 Feb 2014 | 0 comments
Introduction This is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions).  The first article, Using ...
Article by Mick2009 | 14 Feb 2014 | 1 comment
This article is a continuation of my three previous articles: How to utilize SEP 12.1 for Incident Response - PART 1 How to utilize SEP 12.1 for Incident Response - PART 2 How to utilize SEP 12.1 for Incident Response - PART 3 ...
Article by _Brian | 14 Jan 2014 | 7 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 03 Apr 2014 | 4 comments
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 27 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 27 Dec 2013 | 0 comments
Most of the organizations use SCCM to deploy Third party software, OS patches etc to endpoints.It’s a very tedious process for the SCCM admin to verify if all the endpoints are 100% compliant. I would like to present a solution where you can ensure ...
Article by Robocop | 02 Dec 2013 | 3 comments
Did you know that it IS possible to monitor web traffic using the SEP firewall? In this article, I will show you how to monitor web traffic using the SEP firewall. Before we get started there are a couple of things you should be aware of: ...
Article by _Brian | 27 Nov 2013 | 9 comments