Changing Dynamic Sub Partitions.
This issue was found on version 11.9.1.4 Build 209785 When changing a dynamic subpartition only new partitions created from that time on will have the new characteristics. Existing dynamic...
View ArticleAll about the Dashboard- Symantec Messaging Gateway
The Symantec Messaging Gateway has one of the most simple looking yet very informative dashboard as compared to other products. We shall go through all the important aspects of the dashboard.1. Log in...
View ArticleHandy SQL Queries for SEPM v14
Below is a handy collection of SQL queries that might be useful for day to day admin work. All of these queries has been tested & confirmed as working for SEPM v14.Fancy reading up the Database...
View ArticleSymantec DCS 6.7 Management Server pictured Installation.
Symantec DCS 6.7 Server installation step by step as shown below:1.Install management server, for that extract the setup, locate DCS server advanced folder--> double click server.exe to install the...
View Article关于对 macOS 10.13 上 Symantec Endpoint Protection 的内核扩展进行授权
从 macOS 10.13 起,要求对内核扩展 (kexts) 进行授权是一项新安全功能:https://developer.apple.com/library/content/technotes/tn2459/_index.htmlSymantec Endpoint Protection 14.0.1 增加了对 macOS 10.13 的支持。您必须对 Symantec Endpoint...
View ArticleGet Information of Computers using SEPM API (Python)
Python program using SEPM API to fetch information related to all endpoints. File can be used as template to fetch other information using SEPM API. Suggestions and usecases are most welcome to further...
View ArticleData Centre Security (DCS) & UMC - Ad login failure
Common Data Centre Security & UMC - Ad login failureHi,In this article, I will cover how to troubleshoot a very common error that occurs when enabling Active Directory within DCS. It's not always...
View ArticleWeb Forms - Flyout Menu/Tooltip Demo
Edit: added codepen snippet at Master Hedley's request; updated javascript to include onmouseleave event. Updated attached package.I received a request last week to put together a demo project...
View ArticleTrace SMB Double Pulsar Attack Source Machines
At times you may be reported by users about Symantec Client tray icon Notification "[SID: <pid number> Attack: SMB Double Pulsar..]" Similiar as below First measure no need to panic your machine...
View ArticleTechnology Integration Partner Program
Click Here for the latest information on the Technology Integration Partner Program
View ArticleData Loss Prevention (DLP) - Create custom file type signature
Data Loss Prevention (DLP) - Create custom file typesHi,This article will cover the process that is required to create a custom file type signature in DLP. This is traditionally used for Zip files on...
View ArticleLearning Workflow -- Exceptions
This tutorial is intended to help you understand how exception triggers work, and the difference between the triggers. Every Workflow project starts with a "Critical Errors" model, which will catch...
View ArticleLearning Workflow -- Hanging Paths
This tutorial is intended to help you understand how hanging path triggers work, and the difference between the triggers. Generally, the Workflow designer canvas expects lines to be drawn from...
View ArticleWorkflow - REST - Response Header
A question from @epkpej was asked on another of my ArticlesUsing the REST Generator (Response Content) in Workflow...
View ArticleSymantec Email Security.cloud App for Splunk
The Symantec Email Security.cloud App and Add-on for Splunk collects data from Symantec Email Security.cloud and then uses the power of Splunk to give you aggregated and individual visualizations for...
View ArticleWorkflow - How To Create Authenticated REST Components
We will be creating (3) SEP Manager 14.x REST API Service Components.VersionAuthenticateGroupsWorkflow includes a plethora of SEP Components (Symantec.Components.SEP.dll); This technique can be applied...
View ArticleATP and Malware protection and detection application control rule
This is version no.1 (will be updated in the future)I have exported a sanitized(from my organizations data) application control rule which covers most of the malware and ATP detection and protection...
View ArticleJavascript coin miners are on the rise - and you can't see them, must read...
Hello friends,As a security administrator in my organization I can see a rising trand of JSCoinminer eventsThese events are users surfing to a web page which is infected with a malitious...
View ArticleThe Value of Certification & Training - The Why (Pt. 1)
Over the course of many years I have seen multiple questions crop up regarding certification and training, with a general lack of understanding of what to do to get it. Most of the time the queries...
View ArticleThe Value of Certification & Training - The What (Pt. 2)
Part 2 of this series relates to The How of Certification and Training. By this, what's available to you in order to get your certification journey started and completed.The most obvious way to do so...
View Article