Determine if Workflow is running in Debug
When creating a workflow which uses Windows Authentication it is impossible to retrieve the current user (Get Current User-component) when debugging the workflow. Each time you need to debug the...
View ArticleBest Practices for a Successful DLP Implementation
Hi All,As I am working on DLP since long almost more then 4 years which includes different role right from planing, implementation,Administration,incident management and consulting. Below best...
View ArticleHow to install SEP 12.1.6 MP3 on Linux RHEL 7.2
I had to check several different documents for information on preparing and installing SEP 12.1.6 on RHEL 7.2 so I decided to create the following concise guide. Pre-installation RequirementsDownload...
View ArticleLog Files for SEP 12.1.6 for Linux
Installation logs: /root/sepap-install.log/root/sepap-legacy-install.log/root/sepfl-install.log/root/sepfl-kbuild.log/root/sep-install.log/root/sepjlu-install.log/root/sepui-install.logNote: Not all of...
View ArticleSEP 12.1.6 for Linux Footprint
Installation Logs/root/sep-install.log/root/sepap-install.log/root/sepap-legacy-install.log/root/sepfl-install.log/root/sepfl-kbuild.log/root/sepjlu-install.log/root/sepui-install.log*** Not all of...
View ArticleDetecting Cryptolocker activity with Symantec Endpoint Protection
1. Create an "Application and Device Control" rule."Apply this rule to the following processes:" *Add "File and Folder Access Attempts"1.1. "Properties" of File and Folder Access AttemptsApply to the...
View ArticleSEPM 12.1.6 MP4 Has Been Released - Includes Win10 Fixes!
This is the moment you’ve been waiting for – Symantec has released Symantec Endpoint Protection (SEP) 12.1 Release Update 6 Maintenance Pack 4 (12.1.6 MP4). The exact version is 12.1.6860.6400....
View ArticleAccessing encrypted computer (Symantec Encryption Desktop) if normal login...
At some point it might happen that the computer encrypted with Symantec Encryption Desktop (SED) cannot be accessed. There are many reasons why this happens and here are some tips which can be used to...
View ArticleHow-To: Automatically download and install Rapid Updates for SEP Manager
In SEP Manager UI, there is no settings available to set whether the system should download Rapid virus definitions automatically. These definitions can be downloaded manually, The latest Rapid...
View ArticleBackup DCS:SA Database In The Case Of SQL Server Express
If you need to deploy Symantec Data Center Security: Server Advanced in an evaluation installation, or you just need to install several DCS agents on the critial business server, you can use SQL Server...
View ArticleCreating a dynamic drop down report of the membership of any filter
It can be helpful to run reports of the membership of any filter as reports offer you the ability to add in additional data as well as export them to CSV for further processing. Here is one way to do...
View ArticleRemotely Interacting with SWV Layers
Recently I was working on a project where I needed to check the current state of virtual layers on various client machines. In order to speed up the testing process I decided to create some PowerShell...
View ArticleSMP - Altiris Agent - Send Notification Task
In this Article I'm going to explain how to send a message to the Altiris Agent via a Task, this is possible due to a method within the Agent called DisplayBalloon.Remote onto your SMP/Altiris ServerGo...
View ArticlePolicy Tuning for the SMTP Gateway (Email Prevent a.k.a. Network Prevent for...
Most Consultants are hired in the DLP space these days for several reasons. Improving Detection rate and reducing false positives is one of the most highly fetched reasons in today's market. Improved...
View ArticleRecover a failing BitLocker encrypted HDD using Ghost
Background: We recently had a hard drive that was showing signs of failing. User data partition wasn’t unlocking automatically (the data could therefore not be copied off) and the recovery keys...
View ArticleSymantec Data Loss Prevention v14.0.1 Server Backup Step by Step
Find the Attachment For More Details ( With Screenshots )Table of ContentsSr. NoContentPage No1About backup and recovery on Windows32Recommendations43Calculating the total size of the backup on...
View ArticlePetya Ransomware's Encryption Defeated and Password Generator Released
At last! Someone have managed to crack the Petya Ransomware's Encryption and is offering a tool for you to generate a key for FREE! And knowing that many if you were hit with this, and having to resort...
View ArticleSymantec Endpoint Encryption 11.1.0 Management Server Backup
In this article we will create a backup of Symantec Endpoint Encryption Management Server Database....
View ArticleiOS Signature Validation Failures
Apple released a change two weeks ago to the way that the codesign tool works in regards to applications that have been signed on a Mac in OSX El Capitan. The sha1 has can no longer be accepted for...
View ArticleHow to uninstall Mobility Suite 5.4.2 and refresh dependencies.
If Mobility Suite 5.4.2 fails to install due to dependency errors, then the script attached to this article can be run to remove the packages that Mobility Suite installed, clean the yum repository,...
View Article