Symantec Endpoint Protection Terminology Guide - Concepts, Technologies,...
Welcome to the Part 1 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and...
View ArticleHow to open an archived item
Opening an Exchange/Outlook email which has been archived by Enterprise Vault might to some people seem like the simplest of things to do in the entire universe, with Enterprise Vault. There are a...
View ArticleServiceDesk VIP Field Set Automatically from AD Group
Here is an automatic way to mark Affected Users with VIP field in ServiceDesk 7.5, with these caveats:We have one team that creates and maintains Active Directory (AD) user accounts. We also have an...
View ArticleHow to utilize SEP 12.1 for Incident Response - PART 2
In a continuation from my previous article, this article will look at using SEP 12.1 System Lockdown in blacklist mode to stop the spread of a malicious actor on your network. In order for System...
View ArticlePit-Stop for Symantec Workspace Virtualization Release Information
What is my SWV build number against its Friendly version name ? Where is the Release Notes corresponding to a specific SWV version ? Where is the Admin/User Guide corresponding to a Specific SWV...
View ArticleSEP 12.1 Firewall - How to Block RDP while allowing only specific connections
This article will go into some detail on how to block RDP while allowing only specific connections using the SEP 12.1 firewall. This is also applicable to SEP 11.x.Often times, a request comes in to...
View ArticleOutbound Mail Validation/Verification (To important to forget about)
Hello,I wanted to share with you some thoughts and ideas about a common business use case for sending mail that brings a couple of risks that shouldn’t be forgotten as it can have a huge impact on your...
View ArticleNetbackup 7.5 - VMware Options short explained
Here is a short information about the Option available in Netbackup for VMware.VMware Credentials in Netbackup:Click Media and Device Management > Credentials > Virtual Machine Servers.Click...
View Article"Media In Use" when running a restore
Assumptions: NetBackup 7+, Unix master server Intro: If you are restoring a file recently written to tape, there's a fair chance that the tape will still be in use. If the restore job is...
View ArticleSymantec Endpoint Protection Terminology Guide - Concepts, Technologies,...
Welcome to the Part 3 out of 3 discussing the terms, technologies and concepts related to Symantec Endpoint Protection and Symantec Security Software. In the series you will find description and...
View ArticleUpgrading Mobile Security Gateways for Symantec Mobile Security 7.2
The Story So Far...This is the fourth in an informal series of illustrated articles about how admins (and end users) can best protect their mobile endpoints using Symantec Mobile Security 7.2. (This is...
View ArticleAccelerator backup of Windows Cluster systems
So you have a Windows clustered file server, and want to use Accelerator.....but what about Windows Change Journals and NetBackup Track files?Windows Change Journals follow the file system, so what...
View ArticleTroubleshooting a mailbox that will not archive in Enterprise Vault
One of the most common questions asked by Enterprise Vault administrators on the Symantec Connect forums is: “Why does this mailbox not get archived?”. There are many different reasons why the mailbox...
View ArticleInstallation of the Symantec Protection Engine - Graphical Steps
On the previous article:https://www-secure.symantec.com/connect/articles/i...we made a basic introduction to Symantec Protection Engine. In this article, we will go through the installation of the...
View ArticleSMP Resource Key Creation Logic for Mac OS Client Computers
The following describes how the values for the resource keys are created on Mac clients. Run 'aex-helper info resource' on any Unix, Linux or Mac client that has the SMP agent installed to see the...
View ArticleFaking drivers in GSS 2.5.1 for WinPE 3.1
We now return to “As the Ghost Solution Suite Turns”Last time, we learned that WinPE 2.0 was replaced by its evil twin,...
View ArticleServer Documentation, SQL and Monitor Solution 7.1
Today I'm going to talk about something that server admins fear the most. Server Documentation.Introduction1. First Steps -What Policies Apply to What Computers? 1.1 Monitor Solution's Policy Guid...
View ArticleHow to Prevent Custom Inventories from Being Processed as Basic Inventory
Content:Problem descriptionFinding a SolutionImplementationImport the xmlModify the Custom InventoriesMonitor incoming Custom InventoriesConclusionProblem description:As I discovered for one of my...
View ArticleBay Dynamics' Risk Fabric™ Integration with Symantec DeepSight DataFeeds
Bay Dynamics' Risk Fabric pulls data threads from multiple Security and IT Operations sources and weaves them together to provide federated insight that represents the true risk posture of an...
View ArticleSEP LiveUpdate Engine (LUE) vs. Windows LiveUpdate (WLU) - Terminology,...
Welcome to the Liveupdate (LUE) vs. Liveupdate (WLU) discussion. In this article I will try to provide you with a closer look at the SEP Liveupdate used in SEP/SEPM 11.x based on the WLU - Windows...
View Article