Video Screencast Help

Evolution of Security

Results for Evolution of Security

Currently tamper protection exclusions will only allow specific file exclusions. Can it also be adjusted to allow folder and sub folder locations. (Security, 12.x, Endpoint Protection (AntiVirus), Evolution of Security, Security Risks) () ...
Idea by GeoGeo | 11 Feb 2014 | 0 comments
Our auditors require from us to be able to track who is doing what on our systems. I had a look on the logs Brightmail_Admin_Events.YYYY-MM-dd.log and here is the information I can find Date time, User xxx has logged in whithout any information ...
Idea by Amundi | 06 Feb 2014 | 3 comments
It doesn’t seem that SEPM has an easy way to show virus severity.  It just listed the risk name.  If we have a number of different viruses in our environment, it is difficult to determine criticality and prioritize the remediation without a lot of manual ...
Idea by dpirolotvc | 14 Jan 2014 | 0 comments
I need a solution Hi All, Anyone can guide me, What should I do for in this situation. Please guide me as soon as so that I can make secrity status good for our envoirment. ...
Forum Discussion by Naivedya24 | 13 Jan 2014 | 7 comments
We would like to see reputation based URL Filtering added to Symantec Endpoint Protection to protect workstation clients from malicious web-sites, phishing and other malicious activities as an adjunct to Download Insight.    The URL Filtering would act ...
Idea by Wally | 13 Jan 2014 | 1 comment
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 1 comment
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment
Hi there I am a network administrator. I face a problem with SEP firewall that seems to be a bug. The scenario is as follows: I have windows clients with managed SEP antivirus installed. Also I have windows 2008 domain and Microsoft ISA serer ...
Idea by adc29s | 22 Dec 2013 | 1 comment