Video Screencast Help

Search

Search results

Configuring SEP Client Logging and External Logging The external logging feature in the Symantec Endpoint Protection Manager (SEPM) allows for saving log data outside of a SEPM server. These two methods are: Exporting log data to a ...
Article by dougj | 21 Apr 2016 | 1 comment
Installation logs: /root/sepap-install.log /root/sepap-legacy-install.log /root/sepfl-install.log /root/sepfl-kbuild.log /root/sep-install.log /root/sepjlu-install.log /root/sepui-install.log Note: Not all of ...
Article by dougj | 30 Mar 2016 | 0 comments
Roles and responsibilities as Symantec Admin Monitor client-to-SEPM communication. Maintain a Symantec Endpoint Protection environment. Upgrade the Symantec Endpoint Protection environment. Monitor and troubleshoot a Symantec ...
Article by kishorilalWipro | 25 Feb 2016 | 1 comment
Hi All, As I am working on Symantec Endpoint Protection 12.1.since more than year, I went through different issues on Symantec Manager and client and most important different Viruses, Worms and Trojans. Here I am sharing some best practices which I ...
Article by kishorilalWipro | 05 Feb 2016 | 0 comments
About the communication ports that Symantec Endpoint Protection uses If the Symantec Endpoint Protection Manager computer and Symantec Endpoint Protection client computers run firewall software, you must open certain ...
Article by Topa 101 | 04 Nov 2015 | 0 comments
Hello, The Endpoint Protection Small Business Edition 12.1.x product has reached End-of-life and is set to be replaced by the Hosted (or .Cloud) version of the product. This does NOT mean the customer needs to immediately upgrade their product. ...
Article by Chetan Savade | 02 Nov 2015 | 0 comments
You can move the database of the SEPM from an embedded one to a Microsoft SQL Server, and here are the detailed steps: 1. Backup the database by running 'Database Backup and Restore' tool from Windows Start: 2. Backup the ...
Article by yang_zhang | 04 Oct 2015 | 2 comments
When a Symantec client finds an infected item that cannot be repaired with the current virus definitions, it blocks access to the item. The client then packages the item along with any affected system files and settings, and moves the package to the ...
Article by yang_zhang | 27 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
How to move SEPM from C drive to x drive :  The best course of action in this situation would be to run a disaster recovery on the SEPM, and reinstall SEPM directly on another drive.  Here are the steps for your reference: 1. Disaster ...
Article by Amit.eu | 05 Dec 2014 | 0 comments