Ransomware Preventive Methodology
Hi All,As I shared the little research, history and different ways how ransomware propagates into the network and system, now this article will be focused on prevention methodology which is prepared...
View ArticleNovacoast's Imaging Services
Why Novacoast Imaging Services?Is creating and maintaining your Windows 10 image a headache? Do you cringe when you hear the word “Drivers”?Creating and maintaining your OS Images costs countless...
View ArticleWhat's new in Ghost Solution Suite 3.2?
Symantec is pleased to announce the general availability of Ghost Solution Suite 3.2.Ghost Solution Suite 3.2 introduces the following new features and improvements:Installation Readiness Check (IRC)...
View ArticleCreating Custom Content Filtering Policy in Symantec Messaging Gateway
Log in the Symantec Messaging Gateway GUI Console Open a Browser> Type https://FQDN(for eg: https://172.31.1.204)Go to Content> Policies> Email. Click on Add.Select...
View Articleimpeltec
About impeltecThe core focus of impeltec is in offering Windows®-based SOE imaging services for end-user devices and servers. We offer complementary services including application packaging and...
View ArticleSOE Portal
Overviewimagine a Windows®-based SOE image inspired by automation. imagine an enterprise-class service at small business prices. imagine you didn't need any infrastructure or skilled technical...
View ArticleSMP - Patch Management - Associated Bulletins
I’m was working on a Patch Management Workflow and wanting to get the bulletins contained in a Policy created from the Patch Web Service.There is a Software Bulletins field which showed the...
View ArticleDisable Cloning of a Client Job
If you've ever cloned a Client Job or had to cleanup after someone else who did you know how annoying it is that cloning is even an option for a job. For those who haven't, every task and sub-job are...
View ArticleNew User Experience and Site Structure for Connect
Connect has taken a solid step forward to simplify the user experience with some big updates to the interface as well as some structural changes under the hood. When Connect started it was broken up...
View ArticleHow to check specific process with Host Integrity Policy
Is it possible to monitor specific progress status with Host Integrity (HI) policy in endpoint protection? The answer is yes.Here is a simple example of how to set the requirement in HI policy. Details...
View ArticleBlacklisting and Whitelisting Domains and e-mail Address in Symantec...
Blacklisting and White listing domains in Symantec Messaging Gateway 10x: 1. Log On to Symantec Messaging Gateway.2.1 Blacklisting a domain: (a) Go To Reputation> Policies> Bad Senders.(b)...
View ArticleHow do I use DeployAnywhere with Ghost Standard Tools 3.x?
DeployAnywhere is a utility that is used after image deployment to attempt to identify and inject missing drivers into a deployed Windows image. The DeployAnywhere executable files are included with...
View ArticleExceptions, Illustrated: Part One
IntroductionThis is the sixteenth in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleWorkflow ServiceDesk - Projects
Here is a list of Workflow/ServiceDesk Projects not included in the base install of WF/SD.---Email MonitorServiceDesk Multiple Email Box Monitor - Version...
View ArticleExceptions, Illustrated: Part Two
IntroductionThis is the seventeenth in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleOn-Demand Partner Enablement Webinars are Now Available!
Dear Valued Partners,We are very excited about this new era in our company, our partnership, and our program.From April to May 2017, We had outlined a number of trainings to help you up to speed, ready...
View ArticleScript: Checking if a sample is detected as malware by Symantec by its hash
On the Symantec site, you can not search malwares by its hash, as for now. I made two scripts to help you, if there is a need to check a lot of hashes. You will need a free VirusTotal account, to use...
View ArticleSVSadmin: Unable to capture layers in windows 10 build 1703
There is an issue with unloading registry hives when running the latest build of 7.6 (7.6.247).If you require more information on this issue please contact support and they would be glad to provide you...
View ArticleWorkflow - Plugin - Developer Guide
In this set of Articles I'm going to explain how to create a Plugin for use within Workflow.ArticlesList (this)SetupSimple PluginDeployAdvanced PluginIdeas for PluginsFavourite Components - Workflow...
View ArticleWorkflow - Plugin - Developer Guide - Setup
In this Article I'm going to explain how setup your environment for creating a Plugin.Table of ContentsListSetup (this)Simple PluginDeployAdvanced PluginYou will need Visual Studio, download a version...
View Article