Video Screencast Help

Search

Search results

Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, ...
Article by Chetan Savade | 08 Sep 2014 | 1 comment
This article will demonstrate the upgrade process from the SEPM 11 RU7 MP2 to SEPM 12.1 RU4 MP1a version. Download the latest software from here: https://symantec.flexnetoperations.com/control/symc/registeranonymouslicensetoken . Product Serial ...
Article by Chetan Savade | 28 May 2014 | 3 comments
Hello Everyone, This whitepaper focuses strictly on providing guidance on how to successfully deploy the Symantec Endpoint Protection 12.1 protection stack components to a Citrix VDI Environment. This whitepaper does not cover deploying Symantec ...
Article by Chetan Savade | 22 May 2014 | 0 comments
Brief Description about Symhelp: Symantec Help (SymHelp) is a diagnostic utility designed for Symantec Endpoint Protection used in identifying common issues and providing quick solutions to common problems. SymHelp - with a run time around three ...
Article by Chetan Savade | 21 May 2014 | 3 comments
Overview:  While you may not realize it, any  .dat   policy exported from the Symantec Endpoint Protection Manager is simply a compressed XML file. By changing the extension from  .dat  to  .zip , you gain access to the actual input ...
Article by jcrawford2009 | 30 Apr 2014 | 0 comments
Overview: When it comes to creating and configuring administrator-defined scans in the Symantec Endpoint Protection Manager, sometimes there isn't quite enough granularity. For example, let's say that all the clients addressed by your ...
Article by jcrawford2009 | 28 Apr 2014 | 6 comments
Hello Everyone, It's a very common practice for System administrators to disconnect the active session and reconnect it using 'mstsc' command. By doing this, many sessions can get activated in the background. It happens especially when ...
Article by Chetan Savade | 03 Mar 2014 | 4 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 30 Dec 2013 | 2 comments
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments