How to import SEP client package in SEPM console
SEPM console lists all available SEP client packages ready for deployment. But, at times you may have requirement for older or newer version of client package. In my case i had a situation, I have SEPM...
View ArticleSoftware Management Resource Schema 8.1
Please see attached document and workflow comment.Software Management Resource Schema_8.1.docx
View ArticleThe Value of Certification and Training – The How (Pt. 3)
In the last part of this series of articles I’d like to outline how you can go about getting the training you need to result in a successful certification.Go back to the previous article...
View ArticleEnumerating files and folders using PowerShell through the Symantec...
The ProblemOver the past few days I've been researching an issue with a PowerShell script for custom inventorying "chrome.exe" and "chrome.dll" files located within the Users folder. This custom...
View ArticleSoftware Library FAQ for Software Management Solution 8.1
The Software Library and the Software Catalog provides functionality and dynamic abilities for managing Software. Sometimes these two items are used interchangeably, but they are not the same thing....
View ArticleUsing Patch Management Solution to deploy Windows 10 Fall Creators Update...
Symantec have provide DOC9422 on how to use patch Management to deploy feature updates:When Symantec Endpoint Encryption (SEE) is installed there are further complications for a Windows 10...
View ArticleBeginner's Guide to PartnerNet Pt. 1
Many IT software and hardware companies have partner programmes that are available for sign-ups by partners and their relevant staff. Simply put, if your vendor doesn't have a partner programme then...
View ArticleHow Service Providers can succeed in the SMB market with Security Services
Most Telco Service Providers have not been very successful in addressing the SMB market outside their core network services. But today there is a new opportunity as 65% of all security attacks target...
View ArticleBeginner's Guide to PartnerNet - Part II
So, by now you have been successfully registered on the Symantec PartnerNet site, activated your account and (hopefully!) started to take a look at what it has to offer. The amount of information...
View ArticleHow to restore all default and custom (shared) schedules for ITMS
How to restore all default and custom (shared) schedules for ITMSCase:Somehow your shared and custom schedules were removed from Task Scheduler Library on ITMS machine even NS.Weekly schedule, and this...
View ArticleSymantec VIP is Secure Against New SAML Vulnerabilities
This past week, a new attack was discovered that exploits commonly used Security Assertion Markup Language (SAML) implementations. It was discovered that an attacker could modify SAML content without...
View ArticleUsing Symantec Ghost Solution Suite Pt. 1- Setting up the Infrastructure
I took over as a senior engineer on a client's site after a period in a presales role. It had been a while, but was a refreshing change getting back into an operational environment, looking after an...
View ArticlePictured Installation of Symantec Endpoint Encryption 11.x on a Mac
The step by step guide shows the installation of SEE on MAC machinesMake sure FileVault feature on MAC should be turned on first. The encryption of the disk is done by file vault i.e native MAC...
View ArticleUsing Symantec Ghost Solution Suite Pt. 2 - Installing GSS
Pt. 2 – Installing and Configuring Symantec GSSPart 2 deals with installing Symantec GSS and configuring it. As with installing anything, there are a few prerequisites that need to be in place before...
View ArticleMACH5 Training now available in the SOS E-Library!
Have you been trying to find out more about MACH5? We now have a 1-hour training available on our E-Library training...
View ArticleHow to enable user registration in Symantec email security.cloud
In Symantec Email security.cloud Address Registration enables you to register your known email addresses. The service can then reject email sent to any addresses, not on this list. By default, this...
View ArticleUsing Symantec Ghost Solution Suite Pt. 3 - Creating & Configuring Your First...
Part 3 of this series deals with creating and configuring your first Ghost job. But why, in the first place, would you want to use Ghost? There would be a number of scenarios for this, and I will...
View ArticleATP and Malware protection and detection application control rules
Updated the rules - version 3I am using this thread to share with you my application control rules which cover most of the malware and ATP detection and protection.Used in a large healthcare enterprise...
View ArticleUsing Symantec Ghost Solution Suite Pt. 4 – Restoring an Image to a PC
Part 4 is the last technical section of this series of articles and deals with restoring a *.gho image to a PC. You can assume that the PC in question has died and needs to be reimaged in order to...
View ArticleUsing Symantec Ghost Solution Suite Pt. 5– Useful Information
Symantec GSS is a very useful tool to have in your IT environment, allowing you to deploy new images to multiple PCs or workstations at once, deploy new software, or even restore an image taken of a...
View Article