DLP Policy tuning
The tuning of DLP policy is a mandatory task that will better protect your information assets and simplify the activity of those to assess DLP incidents.Unfortunately there are no magic rules or tools...
View ArticleConfigure Replication and Hierarchy for Two Notification Server
In order for Notification Server to participate in Hierarchy, there must be at least one package server available within the Notification Server site.When you attempt to add a Notification Server to a...
View ArticleInventory of ILO details
I got interesting question, whether ILO network interface details can be collected via Altiris Inventory.My immediate impressions was that it must be possible - since I perfectly remember seeing that...
View ArticleSMP - ASDK - Web Service - Update Resource Target
I raised an Idea on connect - SMP - ASDK - Web Service - InvalidateTargetMembership asking for a way to programatically update a Target in an efficient way.There are a number of ways to do this either...
View ArticleWindows 10 Filters
Microsoft introduced new versioning concept for Windows 10– we now talk about release numbers like 1511 or 1607.For more details please refer to this article:...
View ArticleHow to map an additional drive in Ghost Solution Suite 3.0/3.1
Summary:This document is meant to provide guidance on mapping a secondary drive / network drive as an alternative storage location for Ghost Solution Suite.*Please backup jobs and computers before...
View ArticleSymantec Email Quarantine - How to setup
The attached document will give you an overview on how to setup the Symantec Email Quarantine.*NEW* Symantec Email Quarantine v1.5 - How to Setup the Email Quarantine (Step by Step)*NEW* Symantec Email...
View ArticlePackaging Thunderbird and office integration.
Purpose:to provide a packaging recommendations when dealing with Microsoft office attachments opening from mail clients.Problem:When using mail clients (non-microsoft) to open office suite attachments...
View ArticleEnabling blocked files via custom script feature
Have you ever tried performing compliance check using CCS Agent against Unix password files – for example, to verify there are no passwords in / etc / passwd*, empty password field in /etc/shadow or...
View ArticleSEPM 12.x to SEPM 14.0 Upgrade process graphical overview with Embedded database
Hi,This is SEPM 12.x (12.1 RU6 MP6) login screenStop the 12.x Symantec Endpoint Protection Manager Service before starting upgrade process. The download is a zip file and the file size is approximately...
View ArticleMobile Forensics in a Corporate Environment
Presenation given by Laura Morgan at the October 2016 Las Vegas DLP User Group meetingMobile Forensics in a Corporate Environment2.pptx
View ArticleDCS 6.5 agent not updating policy.
Ensure that the DCS IPS Driver is running and loaded (SISIPSService):If the service is running, the agent version is below "6.5.0.498", and is not receiving policy updates then the Hot Fix 9 agent...
View ArticleMobility Suite Email Proxy Errors when using Work Mail (Too many open files)
If errors occur in the Mobility Suite Email Proxy's "/usr/local/nginx/logs/error.log" file that mention "accept4() failed (24: Too many open files)", then the following steps can be followed to resolve...
View ArticleSEPM 12.x to SEPM 14.0 Upgrade process graphical overview with Embedded database
Hi,This is SEPM 12.x (12.1 RU6 MP6) login screenStop the 12.x Symantec Endpoint Protection Manager Service before starting upgrade process.You can download Symantec Endpoint Protection from Symantec...
View ArticleSEPM 14.0 Fresh install with Embedded database - graphical overview
Hello Everyone,This article will demonstrate how to install SEP 14.0 (14.0.1904.0000) Enterprise Edition using Embedded database. Note: SEPM can be installed on 64 bit operating systems only. Let's see...
View ArticleSEPM 14.0 Fresh install with SQL database - graphical overview
Hello Everyone,This article will demonstrate how to install SEP 14.0 (14.0.1904.0000) Enterprise Edition using Embedded database. Note: SEPM can be installed on 64 bit operating systems only. Let's see...
View ArticleDLP and privacy
In many countries, privacy is not limited to your company borders. In order to implement DLP in these countries, it is necessary to be cautious on many aspect otherwise you will not be able to...
View ArticleDLP and third party communication systems
Once implemented DLP solution with its entire ecosystem, it is a bit annoying to end up with some of your colleagues still having a way to exchange information without any control (I do not speak here...
View ArticleSymantec Endpoint Protection v14 has been released! (v14.0.1904.0000)
Hey all,It was not that long ago Symantec released 12.1.6 MP6. Then all of sudden, we’re seeing a new release from them already! :DThe latest version is now SEPM v14 (v14.0.1904.0000) and it contains...
View ArticleHow to debug and troubleshoot Virtualization Agent
Purpose:To be able to capture addition kernel logging when troubleshooting virtualization agent issues. Issue:Virtualization agent will only log errors to the event viewer or write to a memory dump. If...
View Article