Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Currently, you can block applications by using hash value and  filename. Cons of Hash Value and Filename: 1. New version of application has different hash values. 2. Filename can be renamed. Suggestions: 1. Add Publisher Name of the ...
Idea by jomargonzales | 14 Mar 2012 | 0 comments
Symantec is using Hardware ID(found in Symantec registry and program files) as its one of the identifier. However,some companies are using imaging software(such as Ghost) in workstation setup. Since image has same registry entries, this will cause error ...
Idea by jomargonzales | 21 Dec 2011 | 5 comments
I would like to suggest to easily view the contributions made in Symantec Connect by clicking the text in the Contribution Stats. For example, when I click Ideas, there will be a pop-up or any window that will show all my submitted Ideas. ...
Idea by jomargonzales | 06 Apr 2011 | 3 comments
Malware Analyzer Not all malware are detected by Proactive Threat Protection. May suggestion is to have a new feature wherein there is file analyzer embedded so while waiting for the rapid release of virus definition, we can block it in the ...
Idea by jomargonzales | 06 Apr 2011 | 0 comments
Scheduled update is only available in Liveupdate. It is better if we can also set schedule in GUP for updating virus definitions by clients. Currently, this is our main problem with minimal network banwidth9we are using 256 kbps). Throttling is not ...
Idea by jomargonzales | 05 Apr 2011 | 1 comment
You can only move the clients to their desired group by righ-clicking the client and selecting move. It is better if you can just drag the client to the group just like Users and Computers in Active Directory. (Security, 11.x, Endpoint Protection ...
Idea by jomargonzales | 30 Mar 2011 | 0 comments
Current protection for Symantec clients are: 1. Enable auto-protect after X minutes ( 3 minutes is the minimum). 2.  Symantec Management Client services cannot be stopped. 3. Tamper Protection 4. Protect client files and registry keys ...
Idea by jomargonzales | 29 Mar 2011 | 3 comments
I would like to suggest that Host Group and Network Services of Policy Components can be exported and imported from SEPM. This is very useful if you are using two SEPMs and configuring Firewall. Agreed, this would be very Agreed, this would be ...
Idea by jomargonzales | 29 Mar 2011 | 1 comment
Everyday, Symantec releases 3 revisions for virus definitions. Every definitions consumes 110+Mb of size in hard disk. This is an issue for companies who are using small bandwidth such as 128 kbps and 256 kbps line. Eventhough there is bandwidth ...
Idea by jomargonzales | 29 Mar 2011 | 0 comments
I think this is very helpful to all security admins since in real world, we need to temporary disable any the policy we have implemented such as application and device policy especialy when we need to access temporary the said application or device. For ...
Idea by jomargonzales | 26 Apr 2010 | 6 comments