Jon Damratoski's Presentation -- Cloud Review
Presentation given by Jon Damratoski during the November 10, 2016 Nashville DLP User Group meetingNashville DLP Cloud Review .pptx
View ArticleValueError: Cannot find a UNIQUE constraint on table IosCommand
When does this happen?This issue can occur while performing an upgrade of Mobility Suite and the message that "Load settings failed to complete" in the "/var/log/nukona/appcenter-setup.log" due to a...
View ArticleSymantec Workspace Virtualization & Workspace Streaming (SEV) 7.6 HF7
Symantec is pleased to announce the General Availability of Symantec Workspace Virtualization & Workspace Streaming (SEV) 7.6 HF7 via File connect. This document contains release information and...
View ArticleDLP custom plugin
You may think you miss some functionalities in Symantec DLP, especially in DLP incident processing. In order to workaround this issue, you could implement some plugins which will allow you : - to add...
View ArticleDropbox Strengthens Security Solutions With Symantec Data Loss Prevention...
"Dropbox today announced Symantec has joined the Dropbox Partner Network. Expanding on an existing partnership, Symantec and Dropbox will support multiple integration initiatives, helping enterprise...
View ArticleUsing Powershell to replace sylink.xml
There are several limitations that i've run into when attempting to replace the sylink.xml file on many machines at once.The communication updater although it works great when you have a very small...
View ArticleSMP Agent for Mac 8.0 - SSL, TLS, Key Exchange & Cipher Information
The following charts show test results for various configurations of SSL, TLS, Key Exchange and Cipher settings in IIS for SMP Agent for Mac communication with the SMP server. While it would be...
View ArticleAutoPatcher
AutoPatcherSymantec End Point Management, Patch Management automation toolRequirements:Symantec Management Platform - Patch Management 8.0 or later.Run as an account with sufficient permisions for...
View ArticleServiceDesk Ticket Search by Number, Title or Description
This project is offered as an alternative to the builtin ServiceDesk Ticket Search function. The primary difference being the ability to search the Ticket Description.The following examples explain...
View ArticleAn unknown service (Port ####) is starting on your Mac.
Why does this window pop up?When the Symantec Endpoint Protection Cloud (SEPC) agent is installed on a Mac and the below message appears, it means that SEPC would like to know if the service trying to...
View ArticleCentOS or Ubuntu are displayed as „untracked“
It may happen that you install SMA on LINUX successfully, and even agent seems to be working fine, you can still see it as “UNTRACKED” in SMP Console. I noticed that behavior on some releases of CentOS...
View ArticleHow To Use Deploy Anywhere Evaluation In Ghost 3.0/3.1
Deploy Anywhere is a utility used for injecting drivers on a target OS. The below documentation references how to run an evaluation on your client machine to verify all drivers are compatible and not...
View ArticleSEP 14: Replication New Configuration settings
Replication in Symantec Endpoint Protection 14 has more configuration settings. One of the benefit is to reduce the bandwidth usage.New Replication scheduling added Option to select Replicate every X...
View ArticleVisual analisis of file shares access logs
Analysis of large reports in Veritas Data Insight is a challenge. How to find patterns in the vast array of "raw" data? How to distinguish between the typical behavior of users and the malicious? One...
View ArticleVMM Host Report for ESX
I have completed ESX Discovery and Inventory tasks, but default report did not display data I was expeting:VMM > Host Summary Report I checked that these data are available in Resource Manager,...
View ArticleSEP 14 - Microsoft Azure Compatibility
In this article I will be covering the compatibility issues we faced when trying to use Symantec Endpoint Protection version 14 with Microsoft's Cloud Platform - Microsoft Azure. There are two sections...
View ArticleHow to configure peer-to-peer downloading in IT Management Suite?
About peer-to-peer downloading featureThe peer-to-peer downloading feature is available starting from IT Management Suite version 8.0 HF5.The peer-to-peer downloading feature lets you download and...
View ArticleSecuring CCS with SSL Certificates
IntroductionThis article will be about configuring SSL encrypted communication between CCS Application server and Production/Reporting server and also enabling SSL on CCS Web portal. Symantec CCS...
View ArticleRandomization Technique for Risk Mitigation in Software Deployments
Reasons for RandomizationI am an Altiris administrator in a very large organization with over 50k managed endpoints. When our team is tasked with a software deployment, there could be some unknown...
View Article