Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to import SEP client package in SEPM console

SEPM console lists all available SEP client packages ready for deployment. But, at times you may have requirement for older or newer version of client package. In my case i had a situation, I have SEPM...

View Article


Software Management Resource Schema 8.1

Please see attached document and workflow comment.Software Management Resource Schema_8.1.docx

View Article


Image may be NSFW.
Clik here to view.

The Value of Certification and Training – The How (Pt. 3)

In the last part of this series of articles I’d like to outline how you can go about getting the training you need to result in a successful certification.Go back to the previous article...

View Article

Image may be NSFW.
Clik here to view.

Enumerating files and folders using PowerShell through the Symantec...

The ProblemOver the past few days I've been researching an issue with a PowerShell script for custom inventorying "chrome.exe" and "chrome.dll" files located within the Users folder. This custom...

View Article

Software Library FAQ for Software Management Solution 8.1

The Software Library and the Software Catalog provides functionality and dynamic abilities for managing Software. Sometimes these two items are used interchangeably, but they are not the same thing....

View Article


Using Patch Management Solution to deploy Windows 10 Fall Creators Update...

Symantec have provide DOC9422 on how to use patch Management to deploy feature updates:When Symantec Endpoint Encryption (SEE) is installed there are further complications for a Windows 10...

View Article

Beginner's Guide to PartnerNet Pt. 1

Many IT software and hardware companies have partner programmes that are available for sign-ups by partners and their relevant staff. Simply put, if your vendor doesn't have a partner programme then...

View Article

How Service Providers can succeed in the SMB market with Security Services

Most Telco Service Providers have not been very successful in addressing the SMB market outside their core network services. But today there is a new opportunity as 65% of all security attacks target...

View Article


Beginner's Guide to PartnerNet - Part II

So, by now you have been successfully registered on the Symantec PartnerNet site, activated your account and (hopefully!) started to take a look at what it has to offer. The amount of information...

View Article


Image may be NSFW.
Clik here to view.

How to restore all default and custom (shared) schedules for ITMS

How to restore all default and custom (shared) schedules for ITMSCase:Somehow your shared and custom schedules were removed from Task Scheduler Library on ITMS machine even NS.Weekly schedule, and this...

View Article

Symantec VIP is Secure Against New SAML Vulnerabilities

This past week, a new attack was discovered that exploits commonly used Security Assertion Markup Language (SAML) implementations.  It was discovered that an attacker could modify SAML content without...

View Article

Using Symantec Ghost Solution Suite Pt. 1- Setting up the Infrastructure

I took over as a senior engineer on a client's site after a period in a presales role. It had been a while, but was a refreshing change getting back into an operational environment, looking after an...

View Article

Image may be NSFW.
Clik here to view.

Pictured Installation of Symantec Endpoint Encryption 11.x on a Mac

The step by step guide shows the installation of SEE on MAC machinesMake sure FileVault feature on MAC should be turned on first. The encryption of the disk is done by file vault i.e native MAC...

View Article


Image may be NSFW.
Clik here to view.

Using Symantec Ghost Solution Suite Pt. 2 - Installing GSS

Pt. 2 – Installing and Configuring Symantec GSSPart 2 deals with installing Symantec GSS and configuring it. As with installing anything, there are a few prerequisites that need to be in place before...

View Article

MACH5 Training now available in the SOS E-Library!

Have you been trying to find out more about MACH5? We now have a 1-hour training available on our E-Library training...

View Article


Image may be NSFW.
Clik here to view.

How to enable user registration in Symantec email security.cloud

 In Symantec Email security.cloud Address Registration enables you to register your known email addresses. The service can then reject email sent to any addresses, not on this list. By default, this...

View Article

Image may be NSFW.
Clik here to view.

Using Symantec Ghost Solution Suite Pt. 3 - Creating & Configuring Your First...

Part 3 of this series deals with creating and configuring your first Ghost job. But why, in the first place, would you want to use Ghost? There would be a number of scenarios for this, and I will...

View Article


Image may be NSFW.
Clik here to view.

ATP and Malware protection and detection application control rules

Updated the rules - version 3I am using this thread to share with you my application control rules which cover most of the malware and ATP detection and protection.Used in a large healthcare enterprise...

View Article

Image may be NSFW.
Clik here to view.

Using Symantec Ghost Solution Suite Pt. 4 – Restoring an Image to a PC

Part 4 is the last technical section of this series of articles and deals with restoring a *.gho image to a PC. You can assume that the PC in question has died and needs to be reimaged in order to...

View Article

Using Symantec Ghost Solution Suite Pt. 5– Useful Information

Symantec GSS is a very useful tool to have in your IT environment, allowing you to deploy new images to multiple PCs or workstations at once, deploy new software, or even restore an image taken of a...

View Article
Browsing all 1863 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>