Video Screencast Help

Rules

Results for Rules

It is a difficult task for a system administrator or security engineer to determine where exploitable software is installed within their environment. How can they find the exploitable software installed in their environment. Well, Symantec Control ...
Article by Sanehdeep Singh | 18 Feb 2012 | 2 comments
I need a solution Hi, I've done some work around classes,status etc on Configuration Items for my CMDB (which Altiris feeds the Desktop and Laptop CI's into). ...
Forum Discussion by GOC | 18 Feb 2012 | 0 comments
I do not need a solution (just sharing information) Is there any manual or information about regular regular expressions or any samples about rules that we could use on IPS?  ...
This issue has been solved
Forum Discussion by n3m3sls | 17 Feb 2012 | 3 comments
I need a solution We use SEP 12.1, and we want to block all USB storega device except Ironkey USB device. What should I do? How a application and device control rule must I create? ...
This issue has been solved
Forum Discussion by mikailnazli | 17 Feb 2012 | 3 comments
I do not need a solution (just sharing information) Hi, i have a question: EndPoint 11.0.x and 12.1 protects user against phising ¿? if its true, whats the policy that we have to ...
This issue has been solved
Forum Discussion by n3m3sls | 16 Feb 2012 | 3 comments
At the core of Symantec DLP, lies the policy of it, which determines the successful or not so successful implementation of Symantec DLP at organizations. Since DLP is not the perimeter security or the endpoint security, it is the security built around ...
Article by AR Sharma | 14 Feb 2012 | 6 comments
I need a solution I am using PGP Desktop 10.1.1 and it always encryptes e-mail, when it finds a PGP-key of the people I want to sent the mail to. I am using Outlook 2007 with an ...
This issue has been solved
Forum Discussion by jörg from Harman | 14 Feb 2012 | 3 comments
I do not need a solution (just sharing information) Does the community already have a forum where we as a community can share our reports/rules with each other? If not, is anybody ...
Forum Discussion by jaswad23 | 13 Feb 2012 | 7 comments
I need a solution I'm trying to figure out some way to get value out of the GIN watchlists.  By themselves the value is farily low due to high false positive rates, but I was ...
Forum Discussion by mathell | 10 Feb 2012 | 4 comments
I need a solution Hi,   I tried to implement an application and device control policy. Application control : block execution of *.MP3 files - One rule for all processes ...
Forum Discussion by jcnelite | 10 Feb 2012 | 5 comments