Video Screencast Help

IT Risk Management

Results for IT Risk Management

The Endpoint Protection Manager 12.1.2 Console is feature rich but very cumbersome at times - especially when managing access rights. After tying in our Active Directory OUs, we could potentially have over 500 containers (SEPM groups) in the console. Not ...
Idea by nmlobo | 27 Feb 2014 | 0 comments
I need a solution I think I've finally got a decent technical understanding of how PGP interacts with the MBR, thanks to the link here ( ...
Forum Discussion by JackAllTrades | 25 Feb 2014 | 3 comments
I need a solution We have an issue with SMG 10.5.1 where spoofed HTML URLs don't get blocked. For example: <a ...
Forum Discussion by SamB86 | 19 Feb 2014 | 5 comments
Centurylink communications Desktop security would like Symantec to enable the ability to have the SEP FW inheritance ON for any particular group, and still have the ability to enable or disable rules of its lower branches by check box only. ...
Idea by Topa 101 | 18 Feb 2014 | 0 comments
I need a solution Bonjour, Le tableau ci dessous fait partie d'un rapport de SEPM 12.1 que je reçoit par mail. Mais je ne sais pas quelles actions mener (colonne action ...
This issue has been solved
Forum Discussion by MOHIZ | 10 Feb 2014 | 6 comments
Our auditors require from us to be able to track who is doing what on our systems. I had a look on the logs Brightmail_Admin_Events.YYYY-MM-dd.log and here is the information I can find Date time, User xxx has logged in whithout any information ...
Idea by Amundi | 06 Feb 2014 | 3 comments
Hi have read http://www.symantec.com/business/support/index?page=content&id=HOWTO38237 but this issue is happening here we turned off the internet to the workstations, to test network performance, for a whole day wow the ...
Idea by spec-steel | 20 Jan 2014 | 0 comments
It doesn’t seem that SEPM has an easy way to show virus severity.  It just listed the risk name.  If we have a number of different viruses in our environment, it is difficult to determine criticality and prioritize the remediation without a lot of manual ...
Idea by dpirolotvc | 14 Jan 2014 | 0 comments
I need a solution Hi All, Anyone can guide me, What should I do for in this situation. Please guide me as soon as so that I can make secrity status good for our envoirment. ...
Forum Discussion by Naivedya24 | 13 Jan 2014 | 7 comments
Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments