Video Screencast Help

Defense & Intelligence

Results for Defense & Intelligence

De-Militarized Zone or the DMZ is the portion of the network which has two main specifications: 1-      Contains servers and services which are accessible from outside of the network. 2-      Any access to these servers and transaction with them ...
Article by Farzad | 19 Mar 2013 | 7 comments
This paper discusses the need for business continuity practitioners to make incident management a focal element of their programme.   Particularly during the first few minutes and hours of a business disruption, an established incident ...
Article by Courtenay Enrig... | 29 Jan 2013 | 0 comments
Hi Everybody,                       You may be facing lot of problems with a virus infected systems in your  IT environment. Here is a tool which will help your endpoints to recover after a massive virus outbreak. If the endpoints are  heavily ...
Article by Samir-Ahmed | 13 Jan 2013 | 1 comment
I need a solution When drilling down into events that are part of a SSIM incident you discover that SEP has detected a number of malware threats. The Data Status ID of the threats ...
Forum Discussion by 0zguR | 14 Nov 2012 | 0 comments
When Erik Hughes, the Principal Product Manager on SWV asked me to write an article on our PolicyPak utility for SWV, I wasn’t exactly sure how to start. As a Group Policy MVP I often think about the big picture problems around desktop management. ...
Article by Jeremy Moskowitz MVP | 08 Nov 2012 | 0 comments
I need a solution Hello The whole world is saying today symantec was attacked by anonymous group, is this true? Someone could give us news even if it actually happened? should ...
This issue has been solved
Forum Discussion by StevenN | 05 Nov 2012 | 5 comments
10 South La Salle Suite 1330, Chicago, IL 60603 (Workbridge Associates) Thu, 29 November, 2012 - 18:30 - 20:30 CST ...
Event by Christine Arnold | 05 Nov 2012 | 0 comments
I need a solution Hello I see many advertisements on the Symantec researching more about the product on the internet I found that the site of AV Test for example it shows only 4.5 ...
Forum Discussion by NatanL1965 | 20 Oct 2012 | 3 comments
I do not need a solution (just sharing information) In a test conducted in my lab working on incident response plans that can not stop the run would not be creating a good background ...
Forum Discussion by Fabiano.Pessoa | 12 Oct 2012 | 5 comments
HI, Have a customer who have 60,000 Symantec Endpoint Protection Client. They are requesting for MAC (Modify, Access, Cretated) field to be part of the recoreded field to be presented in all the relavant logs. As this could assist them ...
Idea by Victor Lee | 10 Oct 2012 | 1 comment