Video Screencast Help

Search

Search results

Configuring SEP Client Logging and External Logging The external logging feature in the Symantec Endpoint Protection Manager (SEPM) allows for saving log data outside of a SEPM server. These two methods are: Exporting log data to a ...
Article by dougj | 21 Apr 2016 | 1 comment
Hi All, As I am working on Symantec SEPM and Clients issues and reporting, prepared the task summary sheet which specifies that being Syamntec Admin/engineer what are the task needs to be done daily,weekly,monthly and quarterly basis. Attaching ...
Download by kishorilalWipro | 29 Feb 2016 | 2 comments
Roles and responsibilities as Symantec Admin Monitor client-to-SEPM communication. Maintain a Symantec Endpoint Protection environment. Upgrade the Symantec Endpoint Protection environment. Monitor and troubleshoot a Symantec ...
Article by kishorilalWipro | 25 Feb 2016 | 1 comment
Hi All, As I am working on Symantec Endpoint Protection 12.1.since more than year, I went through different issues on Symantec Manager and client and most important different Viruses, Worms and Trojans. Here I am sharing some best practices which I ...
Article by kishorilalWipro | 05 Feb 2016 | 0 comments
About the communication ports that Symantec Endpoint Protection uses If the Symantec Endpoint Protection Manager computer and Symantec Endpoint Protection client computers run firewall software, you must open certain ...
Article by Topa 101 | 04 Nov 2015 | 0 comments
You can move the database of the SEPM from an embedded one to a Microsoft SQL Server, and here are the detailed steps: 1. Backup the database by running 'Database Backup and Restore' tool from Windows Start: 2. Backup the ...
Article by yang_zhang | 04 Oct 2015 | 2 comments
When a Symantec client finds an infected item that cannot be repaired with the current virus definitions, it blocks access to the item. The client then packages the item along with any affected system files and settings, and moves the package to the ...
Article by yang_zhang | 27 Sep 2015 | 0 comments
This video is a presentation and demonstration about the DNS Spoofing attack methodology and how to mitigate it using Symantec Endpoint Protection system. Rather than providing ...
Video by Farzad | 26 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
I need a solution Hello Experts I have Symantec Endpoint Protection Small Business Edition , i have got an virus message on my network computers which name is W32.Pykspa!gen1 ...
Forum Discussion by Sisin | 25 Jul 2015 | 5 comments