Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

ServiceDesk - Process Automation - Rulesets

Table Of ContentsRulesetsEmail Templates SLA Levels SLA Escalations SLA Milestones Data MappingAdmin | Process Automation | [Choose Service] | Service DashboardManage RulesetsActions | Add...

View Article


Image may be NSFW.
Clik here to view.

ServiceDesk - Process Automation

In this series of Articles I'm going to explain how the to configure Process Automation for the available Services in your ServiceDesk / Process Manager.These can include (depending what modules you...

View Article


Image may be NSFW.
Clik here to view.

Use Symantec’s FIDO-Compliant VIP Security Keys to Authenticate Both On and...

FIDO stands for "Fast Identity Online"The Symantec VIP Security Key follows the U2F (Universal 2nd Factor) standard, a FIDO protocol that allows for a single security key to authenticate to all your...

View Article

Minimum privileges to scan Oracle 12c

For scanning Oracle DB, CCS requires privileges to import and scan CCS Oracle asset. When requesting DBA to create a user for CCS, answering their question on what are the permissions required takes a...

View Article

SEP Cloud Integration with ConnectWise Automate

We are pleased to announce that SEP Cloud partners can now use ConnectWise Automate to fulfill their remote monitoring & management (RMM) use cases.Partner Management Console (PMC) now allows...

View Article


Cloud Series – Going Big, or Small with your Cloud Provider – Going Large!

The second part to this series focusses more on larger cloud providers, and why they’d be more appropriate to provide services for your workloads. The previous article dealt with the smaller cloud...

View Article

Cloud Series – Who to Engage with when Moving to Cloud

I have been both a senior data center engineer, as well as a solutions architect responsible for data center solutions, and it was interesting to be involved with, or hear, discussions around cloud....

View Article

Cloud Series – Going Big, or Small with your Cloud Provider – Going Small!

There are many cloud providers out in the IT  world right now, all vying for your business, and most are of varying sizes. Some are small and target those customers not willing to pay large amounts of...

View Article


Setting up CCS-VM 12.4 using a remote SQL Database

Setting up CCS-VM using a remote SQL DatabasePurposeThe purpose of this article is to help guide people who may get a little stuck on the setup of CCS-VM when using a remote Database.When setting up an...

View Article


Cloud Series – Securing Your Cloud

Security has become increasingly important in IT as more exploits are attempted (and succeed), and more companies are looking to either full, or hybrid, cloud for their workloads.Extreme care needs to...

View Article

Image may be NSFW.
Clik here to view.

Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix &...

Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix & Agent installer troubleshooterPurpose The purpose of this article is to help others who have installed DCS 6.7 troubleshoot...

View Article

Cloud Series – Managing a Multi-Cloud Environment

With the push towards cloud becoming an ever-increasing push in business and IT, more companies are onboarding their services to multiple providers, and finding the management of these environments...

View Article

Image may be NSFW.
Clik here to view.

SEP - Component isolation

1. Disable Memory Exploit Mitigation.If you have grayed out as the image, you need to disable it in the policy .For disable it from the policy, go to the SEPM and to the group and edit Intrusion...

View Article


Image may be NSFW.
Clik here to view.

High Noon for the Cryptominers

 IntroductionThis is the twenty-first in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

Using an Appliance Pt. 1 - The Benefits of a Virtual Appliance

I’ve been busy with a project to link a number of VMware sites to a centralized Virtual Center Server. With the upgrade to ESXi 6.5 U1 across the board, it meant that the use of the Virtual Center...

View Article


Using an Appliance Pt. 2 – Some Gotchas Around Deploying an Appliance

This is the last section of a 2-part article series around virtual appliance and outlines what you should be aware of when deploying an appliance. Symantec have a number of appliances for products such...

View Article

Image may be NSFW.
Clik here to view.

Workflow - SEP - Components

If you create a new Project and add the Integration Library "Symantec.Components.SEP.dll"[Install Drive]:\Program Files\Symantec\Workflow\Shared\components\Symantec.Components.SEP.dllThis will then...

View Article


TLS 1.3: It's out there. Are you ready?

TLS 1.3: Embrace the new encryption standard, we got your back.A leading analyst firm once predicted, “half of malware campaigns in 2019 will use some type of encryption to conceal malware delivery,...

View Article

Image may be NSFW.
Clik here to view.

Configuring ProxySG to work with Symantec CAS and Symantec DLP

Configuring ProxySG to work with Symantec CAS and Symantec DLPPurposeThe purpose of this document is to help other successfully integrate CAS and DLP with ProxySG. This article will help you configure...

View Article

Image may be NSFW.
Clik here to view.

ICT - CLI Exit Codes

ICTCLI Exit CodesThe ICT CLI is a useful way of automating the tagging of file. Unfortunately when developing for this tool, there is limited access to the output of the application. Sometimes all you...

View Article
Browsing all 1863 articles
Browse latest View live