Video Screencast Help

Search

Search results

Configuring SEP Client Logging and External Logging The external logging feature in the Symantec Endpoint Protection Manager (SEPM) allows for saving log data outside of a SEPM server. These two methods are: Exporting log data to a ...
Article by dougj | 21 Apr 2016 | 1 comment
Roles and responsibilities as Symantec Admin Monitor client-to-SEPM communication. Maintain a Symantec Endpoint Protection environment. Upgrade the Symantec Endpoint Protection environment. Monitor and troubleshoot a Symantec ...
Article by kishorilalWipro | 25 Feb 2016 | 1 comment
Hi All, As I am working on Symantec Endpoint Protection 12.1.since more than year, I went through different issues on Symantec Manager and client and most important different Viruses, Worms and Trojans. Here I am sharing some best practices which I ...
Article by kishorilalWipro | 05 Feb 2016 | 0 comments
About the communication ports that Symantec Endpoint Protection uses If the Symantec Endpoint Protection Manager computer and Symantec Endpoint Protection client computers run firewall software, you must open certain ...
Article by Topa 101 | 04 Nov 2015 | 0 comments
You can move the database of the SEPM from an embedded one to a Microsoft SQL Server, and here are the detailed steps: 1. Backup the database by running 'Database Backup and Restore' tool from Windows Start: 2. Backup the ...
Article by yang_zhang | 04 Oct 2015 | 2 comments
When a Symantec client finds an infected item that cannot be repaired with the current virus definitions, it blocks access to the item. The client then packages the item along with any affected system files and settings, and moves the package to the ...
Article by yang_zhang | 27 Sep 2015 | 0 comments
How to be ahead of Outbreaks! There are two common checkpoints that security administrators or managers inspect a computer or a host for evaluating the security well being. The first stage is the periodic report analysis, which is performed on ...
Article by Farzad | 17 Sep 2015 | 0 comments
Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, ...
Article by Chetan Savade | 08 Sep 2014 | 3 comments
Overview:  While you may not realize it, any   .dat   policy exported from the Symantec Endpoint Protection Manager is simply a compressed XML file. By changing the extension from  .dat  to  .zip ,   you gain ...
Article by jcrawford2009 | 30 Apr 2014 | 0 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments