Video Screencast Help

Search

Search results

Hi All, Is there any options in SEPM console where we can upload or reload sepm logs in external syslog server for a perticular time periond. lets say if due to some network problem my sepm logged missed for a week period then I can select that ...
Idea by Sushil B | 15 Jul 2015 | 0 comments
標的型攻撃は、現代のセキュリティインフラストラクチャが直面している、特に厄介で難しい脅威です。シマンテックは、2013 年に標的型攻撃の件数が 91% も増加したことを確認しています。ここでは、標的型攻撃の詳細と、すぐに実行できる対策についてお伝えします。 ...
Blog Entry by Solange Deschatres | 02 Jun 2015 | 0 comments
HI Symantec, I have found related issues regarding to the apache error of SEPM that causes to intermittently Online/Offline of SEPM after the upgrade to SEPM 12.1 RU5. I also experienced this issue in most of our upgrades to 12.1 RU5 and the ...
Idea by Ch@gGynelL_12 | 07 Apr 2015 | 0 comments
You need to act NOW On July 14th, 2015, Microsoft will end support for all versions of Windows Server 2003. This means that Microsoft will no longer offer support, security patches and ...
Blog Entry by Digital_Kru | 05 Feb 2015 | 0 comments
Crypto-type malware is particularly nasty to deal with because it encrypts files.  While an infected file has had code added to it which antivirus can remove, an encrypted file isn’t ...
Blog Entry by Brandon Noble | 20 Jan 2015 | 40 comments
30(ish) Days Until Symantec Endpoint Protection 11 Reaches End of Support Life Do you still have Symantec Endpoint Protection 11 in your environment? On January 5th, 2015, Symantec ...
Blog Entry by Kari Ann | 01 Dec 2014 | 9 comments
The newest version of LiveUpdate Administrator (LUA) - 2.3.3 has been released. The version can be downloaded from here: http://www.symantec.com/docs/TECH134809 What's new in LiveUpdate Administrator 2.3.3 System ...
Blog Entry by SebastianZ | 14 Jul 2014 | 1 comment
Targeted attacks are some of the most troubling and difficult threats facing modern security infrastructure. Symantec found that the number of targeted campaigns jumped to 91% in 2013. Discover more about these ...
Blog Entry by Solange Deschatres | 15 Apr 2014 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by V4 | 03 Dec 2013 | 0 comments