Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to utilize SEP 12.1 for Incident Response - PART 9

This article is the ninth installment in an on-going series of articles on how to utilize SEP 12.1 for Incident Response. Links to the previous eight articles are below:How to utilize SEP 12.1 for...

View Article


The communication ports that Symantec Endpoint Protection uses

About the communication ports that Symantec Endpoint Protection usesIf the Symantec Endpoint Protection Manager computer and Symantec Endpoint Protection client computers run firewall software, you...

View Article


Image may be NSFW.
Clik here to view.

How to Update Mobility Suite 5.3+ User Portal logout page to Match the...

If you wish for the Mobility Suite User Portal logout page icon to match the branding in Mobility Suite's Admin Console, then the following information will explain how to perform this task. The...

View Article

Image may be NSFW.
Clik here to view.

How can the embedded Java version be upgraded independently in the Veritas...

ProblemJava is embedded within the Veritas Operations Manager (VOM) application and requires manual steps to upgrade to work with the application.ErrorThere are many scans that can alert to...

View Article

Image may be NSFW.
Clik here to view.

How to Customize Mobility Suite 5.3+ favicon logo for the Mobility Manager

If you wish for the Mobility Suite's favicon in the Mobility Manager to match the branding in Mobility Suite's Admin Console, then the following information will explain how to perform this task. The...

View Article


Symantec Endpoint Manager (SEPM) syslog export field details 12.1.6 MP2

Document that details the Symantec Endpoint Manager console syslog fields details, if using the console syslog export functionality.Document has been created for release 12.1.6 MP2 also known as 12.1...

View Article

Image may be NSFW.
Clik here to view.

Support Perspective: W97M.Downloader Battle Plan

IntroductionThis is the tenth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article

Managing Altiris and SEP Client Health

This Article takes you through the steps to import data from the SEP DB into the Altiris CMDB. Then how to use that data to ensure you have matching agent coverage in SEP and Altiris and that both...

View Article


Image may be NSFW.
Clik here to view.

How To "Bubble" List Items in the EnsembleMenuSelect Component

ServiceDesk Forms use the EnsembleMenuSelect Component to represent Hierarchy Data, for example: This example shows a manageable list; If your data is less than manageable, you can use the following...

View Article


Security Advisories Relating to Symantec Products : SYM15-011

Hi ,A recent vulnerability has been identified and it is SYM15-011 and all SEP 12.1.x versions are affected.To fix the vulnerability either the SEPM or the clients needed to upgraded to 12.1.6 MP3For...

View Article

Image may be NSFW.
Clik here to view.

Mick's Greatest Hits: Index of Helpful Connect Security Articles

IntroductionBy popular demand, below is an index of my Connect articles.  Illustrated, semi-formal and mildly amusing, I hope they assist admins and individuals along their neverending quest to find a...

View Article

Image may be NSFW.
Clik here to view.

How BCS Customers can Sign Up for Alerts and Notifications

IntroductionThis is number eleven in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

2015 Partner Engage EMEA Keynotes/Plenary Sessions

Video Sizzle ReelEnterprise Security Vision and Strategy (Global Sales and GTM Strategy)EMEA GTM StrategyPartner Strategy, Programs and InvestmentSecuring the Enterprise (Solution, Strategy and...

View Article


Symantec EMEA Partner Engage 2015 Breakout Sessions

Threat Protection and Information ProtectionCyber Security ServicesPartner Program: Symantec Secure One

View Article

Stress testing of the DLP environment while improving detection capabilities

Most of us run the DLP Solution under different banners. Most of us call it the Data Loss Prevention program while some call it the Malicious insider Program or even the Data Breach Prevent program as...

View Article


Image may be NSFW.
Clik here to view.

How to Keep the Mobility Suite Admin Console Restricted from the Internet

The below steps explain how to restrict the Mobility Suite's Mobility Manager Admin Console from being published to the internet and only accessible from the internal network:1. Modify the...

View Article

Image may be NSFW.
Clik here to view.

How to Gather Android Device Logs Using Logcat with Android Studio

    1.  Download and install the ADB drivers required for the device.  These drivers may be found on the device manufacture website.  For Google products such as the Nexus go to:...

View Article


Symantec Presence @ Experience Zone

SOCAdvanced Threat ProtectionNo password, No problemEMEA MarketingSecure One Partner ProgramRenewals: Realise the Value

View Article

SysAdmin Virtual Library

In this article I have collected some of the tools already published and dedicated to system administrators. This collection was divided by applications for management systems, office, network...

View Article

Image may be NSFW.
Clik here to view.

Sending process to Workflow within a custom automation library

Here I will not go into details of creating Automation Library along with process data type.This is described in Workflow 7.6 User Guide in section ‘Creating Automation Library’ on pages...

View Article
Browsing all 1863 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>