Video Screencast Help

Search

Search results

Hi All, As I am working on Symantec Endpoint Protection 12.1.since more than year, I went through different issues on Symantec Manager and client and most important different Viruses, Worms and Trojans. Here I am sharing some best practices which I ...
Article by kishorilalWipro | 05 Feb 2016 | 0 comments
9 月 29 日火曜日から、シマンテックのお客様は、ファイルの場所を示す URL を指定するだけで、専用の Web サイトからファイルをご提出いただけるようになります。 これまで、シマンテックにファイルをお送りいただくには、該当のファイルをダウンロードしてから、送信ポータルにアップロードしなければなりませんでした。今回の新機能により、お客様がダウンロード URL ...
Blog Entry by Brandon Noble | 06 Dec 2015 | 0 comments
About the communication ports that Symantec Endpoint Protection uses If the Symantec Endpoint Protection Manager computer and Symantec Endpoint Protection client computers run firewall software, you must open certain ...
Article by Topa 101 | 04 Nov 2015 | 0 comments
As of now when an email subscription is triggered by the Endpoint Protection .Cloud for lets say Subscription is expired there is no information about the account or customer just reference to the serial number and dates affected. If the account using ...
Idea by ArisZ | 07 Oct 2015 | 0 comments
You can move the database of the SEPM from an embedded one to a Microsoft SQL Server, and here are the detailed steps: 1. Backup the database by running 'Database Backup and Restore' tool from Windows Start: 2. Backup the ...
Article by yang_zhang | 04 Oct 2015 | 1 comment
Although all the other permissions for limited administrators are restricted to the groups they manage, anyone with console access and permission to manage installation packages can enable the option to collect user data for the entire SEP domain. ...
Idea by Kev Romine | 30 Sep 2015 | 0 comments
Starting Tuesday September 29th, our customers will be able to submit files through the submission website, by supplying a URL where the file can be found. Currently customers must download a file and then submit it to Symantec by uploading through ...
Blog Entry by Brandon Noble | 28 Sep 2015 | 2 comments
When a Symantec client finds an infected item that cannot be repaired with the current virus definitions, it blocks access to the item. The client then packages the item along with any affected system files and settings, and moves the package to the ...
Article by yang_zhang | 27 Sep 2015 | 0 comments
This video is a presentation and demonstration about the DNS Spoofing attack methodology and how to mitigate it using Symantec Endpoint Protection system. Rather than providing ...
Video by Farzad | 26 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments