Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Data Loss Prevention (Vontu)
Showing posts in English
Hear4U | 08 Sep 2010

Here's your chance to be "King for a Week" with our new Security Solutions Contest! 

What Is the Security Solutions Contest?
It's all about solving end user questions in the forums area.  We created this contest to help increase the total number of solutions on the Security Community.  We are going to select threads we'd like you to solve, and give you an opportunity to win a weekly prize. Yes, I said "weekly!"  Keep reading to find out more about the prize!

How Do I Participate?
First, if you want to play, pull out your dust-ridden, coffee stained endpoint protection & related security product manuals, re-read all the latest and greatest knowledge base articles, and put your thinking-caps on! 

Why?  Because to be the "King for a Week" in this contest, you need to be able to solve popular forum threads that will be hand...

Hear4U | 30 Aug 2010 | 4 comments

Hello All,

IT Analytics (ITA) will now be offered to SEP, Altiris and Protection Suite customers for free via FileConnnect.

There will be no changes from how ITA is currently supported.  GDSS will continue to route all ITA calls to the Altiris support team to be resolved.

Below is some general information and links concerning ITA.


Thank you,

-Sean Downs


Symantec IT Analytics FAQ


Q1. What is IT Analytics?

IT Analytics enables users to maximize the value of the data that resides within the Altiris and Symantec Endpoint Protection by incorporating multidimensional analysis and robust graphical reporting features. This allows users to explore the databases without advanced knowledge of databases or third-party reporting tools, empowering them to ask and answer their own questions quickly, easily, and effectively. Features include powerful on-the-fly ad-hoc...

jjesse | 10 Aug 2010 | 0 comments

Problem: Errors in the console about clicking on invalid links, link timing out or corrupted incidents, also in the log files references to errors updating the User tablespace


Solution: Oracle has a hard limit of file sizes to 33GB and once that limit is hit and there are no other files available the system will stop writing to the database. In order to solve this problem we needed to create additional DBF files for the user field. By default the installation creates only one USERS01.DBF file.

To create additional files follow these steps:

  1. Open up a command prompt
  2. Launch SQLPLUS by typing the following command sqlplus /nolog and hit enter
  3. From the SQL> prompt type connect sys as sysdba and hit enter
  4. Provide the password for sys:
  5. From the SQL> prompt type: alter tablespace "USERS" ADD DATAFILE 'd:\oracle\product\10.2.0\oracdata\protect\users02.dbf' size 138240k reuse autoextend on next...
jjesse | 27 Jul 2010 | 1 comment

On August 24, 2010 I will be presenting a webcast for work as a part of our normal webcast series. This time I will be presenting on Symantec DLP, SEP and Workflow and an example on how you can use Workflow as a product to tie two other Symantec products together that do not necessarily connect. If you are interested feel free to sign up here: The text below is from our marketing guy

In this webcast the experts at ITS Partners will discuss how you can use Symantec's Workflow Solution to

trigger a SEP lockdown of a device.

A DLP incident triggers a workflow which locks down an environment and also notifies your IT staff.

Hear4U | 20 Jul 2010

If you are considering a Symantec product for your business, this is a great place to start!  Let us help you understand how to utilize the power of Symantec's solutions.  Information discussed includes key challenges, environment, applications, services provided, among others.  This new series of Customer Success Stories will focus on both small/mid-size businesses, and enterprise success stories.  Links are generally PDF files.

Small and Mid-Size Business

Apprise Software (U.S.)
For Apprise Software, Symantec Hosted Endpoint Protection provides improved protection, is simple to deploy and easy to use, and will cut its monthly security review time in half.  View story

John Septimus Roe Anglican Community School (Australia)

jjesse | 13 Jul 2010 | 0 comments

Saw this come across one of my Google Alerts and wanted to pass it around.  Gartner’s Magic Quadrant is made up of four sections (quadrants):

  • Leaders
    • Score high on ability to execute and completeness of vision
  • Challengers
    • Score high on ability to execute and lower on completeness of vision
  • Visionaries
    • Score lower on the ability to execute and higher on the completeness of vision
  • Niche Players
    • Score lower on both criteria but are new to additions to the Magic Quadrant

For more information see this Wikipedia entry on the Magic Quadrant.

The three reports are:

Gina Sheibley | 21 Jun 2010 | 0 comments

The results from Symantec’s 2010 Small and Midsized Business (SMB) Information Protection Survey are in and they tell a much different story than a survey we conducted in 2009. SMBs—many of whom admitted to forgoing even the most basic protection such as backup and antivirus just 15 months ago —are now getting serious about information protection and are seeing data loss as a real threat.

So why the change? Based on the results, I’d say it’s because SMBs are feeling the effects of information loss and cyber attacks first hand. Out of the 2,152 SMB executives and IT decision makers in 28 countries surveyed, nearly 75 percent experienced cyber attacks in the past year, which caused expensive downtime, loss of important corporate data as well as personally identifiable information of customers or employees.

Or maybe it’s the fact that SMBs realized just how costly it can be when an employee loses a device that contains company...

hecongyan | 06 May 2010 | 1 comment

You have just completed installing Windows Server 2008, and you click the CTRL + ALT + DELETE keys and then you were lost, what username should you log on with, what password should you use ? Especially that you did not create any during the installation process ! In this article, I will show you how to successfully log on to Windows Server 2008.

With Windows Server 2008 RC0 and the Beta builds of Windows Server 2008, you were automatically logged on after the successful completion of Windows Server 2008 installation, and then creating the administrator user account password was the first option inside the Initial Configuration Tasks.  ICT-RC0

Whereas With...

hecongyan | 06 May 2010 | 2 comments

Part of any good computer security strategy is changing computer password on a regular basis. A strong password is the first line of defense against those who wish to get access to our computers and the important data they contain.
In this article We will learn how you can easily change your password in Windows 7.

Difficulty: Easy

Things You'll Need:

  • Windows 7


  1. Step 1


    Click on the "Start" , which is the "Windows Orb...

imi so ubu | 05 May 2010 | 0 comments

Since I participate in several social networks professionally and personally, I have taken an interest in protecting the security of my computers. 

Recently, I read an article that was supposed to offer various topics including:  

  • DNS Threats
  • The Kaminsky Vulnerability
  • DNSSEC Deployment
  • Loading Balancing & DNSSEC
  • and more!

Unfortunately, I was a little disappointed by the selection....mainly because a free webcast was offered in place of the actual article.

There was no indication that  a user could reduce or minimize the risk and/or potential threat to security.

As I continued to read the document, I was very pleased to find an icon that provided insightful guidance. 

Consumers and businesses rely on electronic information systems to store, transmit, and manage their most important, private data. But the recent rise in...