Video Screencast Help

Search

Search results

This video is a presentation and demonstration about the DNS Spoofing attack methodology and how to mitigate it using Symantec Endpoint Protection system. Rather than providing ...
Video by Farzad | 26 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
Symantec Endpoint Protection should log the MD5 hash of all detected threats prior to quarantine/clean/deletion. This is an included feature of the McAfree enterprise AV solution. For example: 1/5/2015 3:55:02 PM Deleted (Clean failed because the ...
Idea by Shryke | 06 Aug 2015 | 0 comments
I need a solution Hi, I am using windows 8.1 professional version. I have Endpoint Antivitus. I regullary do complete scan. But antivirus doesnt show any virus or infected file. ...
This issue has been solved
Forum Discussion by Praveen.Solanki | 16 Dec 2014 | 2 comments
I have a problem where software vendors are disabling Symatec EPP when diagnosing an issue on a clients server.  I am an IT Contractor who supports approx 30 companies The scenario, a law firm A Software vendor has one of the law firm staff ...
Idea by mbkitmgr | 25 Nov 2014 | 0 comments
Hi, It would be nice for the AV, when the heuristic engine detect suspicious file or behavior to upload the file itself, and not just the log and MD5/SHA-1/2/3 to your file analysis system. Multiple vendor offer now this features and it it ...
Idea by MHinse | 20 Oct 2014 | 0 comments
You guys really need to improve the following in SEP related to GUP managemnt / features: Ability to mass-upload GUPs via host name / IP address via a TXT / CSV file. Ability to Report on GUPs, there is not even basic reporting in SEPM ...
Idea by BigDogRockies | 02 May 2014 | 0 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Hi there, I have seen some clients mentioning something similar particularly in the case of limited bandwidth, so this might be an idea that was logged before, and I am sure with the current SEPM architecture it should be possible... What I ...
Idea by Gino I | 03 Dec 2013 | 0 comments