Video Screencast Help
We've launched some major improvements to the interface and community structure. Learn about them here!

IT Risk Management

Results for IT Risk Management

Request: Add support for %USERPROFILE% environment variable to Custom Exclusions Path Macro. Use Case: Current Path Macros focus on all user pathing but do not provide coverage for per user pathing.  It is difficult to exclude common resources used ...
Idea by Scott_001 | 20 Jun 2017 | 0 comments
Request: Add support for environment variables in exclusions. Use case: Resources with variable pathing based on environmental variables are difficult to exclude.  As an example resources stored under "%USERPROFILE%\Application\Extensions" ...
Idea by Scott_001 | 20 Jun 2017 | 0 comments
In April 2017, an attack group calling itself the TheShadowBrokers, released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and tools the attack group state were used by Equation. ...
Article by Brandon Noble | 20 Jun 2017 | 0 comments
  Hello DLP Users.. I wanted to share some information on how to get DLP to Scan Amazon AWS Buckets. I had a customer who wanted to scan their Amazon AWS Storage (S3), there is no documentation on how to do this and it is currently NOT ...
Article by DLP Solutions2 | 13 Jun 2017 | 0 comments
I need a solution SEPM & SEP version on my manager server is 14.0.2349. 5/31/2017, 8:00:18 GMT -> EVENT - PRODUCT UPDATE FAILED EVENT - Update available for SEPM Content ...
Forum Discussion by @Kathir | 31 May 2017 | 2 comments
I need a solution How to resolve this issue ?  What could be the possible isolation steps to remediate this infections and locate the infected file ?  ...
This issue has been solved
Forum Discussion by @Kathir | 22 May 2017 | 3 comments
Many of your customers are expressing an urgent need to receive Attacker IP Address in SEP email alerts . In addition, I would like to find this information somewhere in the affected computer's log files or Windows event log . Without ...
Idea by IT User 123 | 19 May 2017 | 0 comments
Hi, If ATP Endpoint detects any suspicious files or unknown files which may harm the system, it should have a capability to submit those files to Cynic for analysis and verdict without any manual intervention. Thanks and Regards. ...
Idea by rtp | 09 May 2017 | 0 comments
Webinar Thu, 11 May, 2017 - 11:00 - 12:00 CDT During the webinar we will discuss how the Oracle ...
Event by David Kruse Sath | 20 Apr 2017 | 0 comments
I need a solution Hi, We have 6000 licenses purchased for our SEPM however as part of Migration and aquisition of few companies the over deployed licenses have increased the client ...
Forum Discussion by @Kathir | 18 Apr 2017 | 8 comments