Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Search

Search results

How to move SEPM from C drive to x drive :  The best course of action in this situation would be to run a disaster recovery on the SEPM, and reinstall SEPM directly on another drive.  Here are the steps for your reference: 1. Disaster ...
Article by Amit.eu | 05 Dec 2014 | 0 comments
What is Symantec.cloud ? Symantec.cloud services provide essential protection while virtually eliminating the need to manage hardware and software on site. SECURITY Email Security.cloud Symantec ISO 27001:2005 ...
Article by GSO Customer Tr... | 22 Oct 2014 | 0 comments
What is Endpoint Protection ? Symantec Endpoint Protection is an endpoint security solution designed to provide a layered approach to defense. Leveraging the power of Symantec's Global Intelligence Network, it detects and removes more ...
Article by GSO Customer Tr... | 22 Oct 2014 | 0 comments
Overview:  While you may not realize it, any   .dat   policy exported from the Symantec Endpoint Protection Manager is simply a compressed XML file. By changing the extension from  .dat  to  .zip ,   you gain ...
Article by jcrawford2009 | 30 Apr 2014 | 0 comments
Overview: When it comes to creating and configuring administrator-defined scans in the Symantec Endpoint Protection Manager, sometimes there isn't quite enough granularity. For example, let's say that all the clients addressed by your ...
Article by jcrawford2009 | 28 Apr 2014 | 8 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 1 comment
What is this about? In this article we will have a look at portfolio of both Symantec and Norton Security products. The introduced list will include both Enterprise products in case of Symantec family and Consumer products from Norton family. Some of ...
Article by SebastianZ | 30 Dec 2013 | 2 comments
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments