ServiceDesk - Process Automation - Rulesets
Table Of ContentsRulesetsEmail Templates SLA Levels SLA Escalations SLA Milestones Data MappingAdmin | Process Automation | [Choose Service] | Service DashboardManage RulesetsActions | Add...
View ArticleServiceDesk - Process Automation
In this series of Articles I'm going to explain how the to configure Process Automation for the available Services in your ServiceDesk / Process Manager.These can include (depending what modules you...
View ArticleUse Symantec’s FIDO-Compliant VIP Security Keys to Authenticate Both On and...
FIDO stands for "Fast Identity Online"The Symantec VIP Security Key follows the U2F (Universal 2nd Factor) standard, a FIDO protocol that allows for a single security key to authenticate to all your...
View ArticleMinimum privileges to scan Oracle 12c
For scanning Oracle DB, CCS requires privileges to import and scan CCS Oracle asset. When requesting DBA to create a user for CCS, answering their question on what are the permissions required takes a...
View ArticleSEP Cloud Integration with ConnectWise Automate
We are pleased to announce that SEP Cloud partners can now use ConnectWise Automate to fulfill their remote monitoring & management (RMM) use cases.Partner Management Console (PMC) now allows...
View ArticleCloud Series – Going Big, or Small with your Cloud Provider – Going Large!
The second part to this series focusses more on larger cloud providers, and why they’d be more appropriate to provide services for your workloads. The previous article dealt with the smaller cloud...
View ArticleCloud Series – Who to Engage with when Moving to Cloud
I have been both a senior data center engineer, as well as a solutions architect responsible for data center solutions, and it was interesting to be involved with, or hear, discussions around cloud....
View ArticleCloud Series – Going Big, or Small with your Cloud Provider – Going Small!
There are many cloud providers out in the IT world right now, all vying for your business, and most are of varying sizes. Some are small and target those customers not willing to pay large amounts of...
View ArticleSetting up CCS-VM 12.4 using a remote SQL Database
Setting up CCS-VM using a remote SQL DatabasePurposeThe purpose of this article is to help guide people who may get a little stuck on the setup of CCS-VM when using a remote Database.When setting up an...
View ArticleCloud Series – Securing Your Cloud
Security has become increasingly important in IT as more exploits are attempted (and succeed), and more companies are looking to either full, or hybrid, cloud for their workloads.Extreme care needs to...
View ArticleSteps after installing Data Centre Security 6.7 With DCS AD/sign in fix &...
Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix & Agent installer troubleshooterPurpose The purpose of this article is to help others who have installed DCS 6.7 troubleshoot...
View ArticleCloud Series – Managing a Multi-Cloud Environment
With the push towards cloud becoming an ever-increasing push in business and IT, more companies are onboarding their services to multiple providers, and finding the management of these environments...
View ArticleSEP - Component isolation
1. Disable Memory Exploit Mitigation.If you have grayed out as the image, you need to disable it in the policy .For disable it from the policy, go to the SEPM and to the group and edit Intrusion...
View ArticleHigh Noon for the Cryptominers
IntroductionThis is the twenty-first in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleUsing an Appliance Pt. 1 - The Benefits of a Virtual Appliance
I’ve been busy with a project to link a number of VMware sites to a centralized Virtual Center Server. With the upgrade to ESXi 6.5 U1 across the board, it meant that the use of the Virtual Center...
View ArticleUsing an Appliance Pt. 2 – Some Gotchas Around Deploying an Appliance
This is the last section of a 2-part article series around virtual appliance and outlines what you should be aware of when deploying an appliance. Symantec have a number of appliances for products such...
View ArticleWorkflow - SEP - Components
If you create a new Project and add the Integration Library "Symantec.Components.SEP.dll"[Install Drive]:\Program Files\Symantec\Workflow\Shared\components\Symantec.Components.SEP.dllThis will then...
View ArticleTLS 1.3: It's out there. Are you ready?
TLS 1.3: Embrace the new encryption standard, we got your back.A leading analyst firm once predicted, “half of malware campaigns in 2019 will use some type of encryption to conceal malware delivery,...
View ArticleConfiguring ProxySG to work with Symantec CAS and Symantec DLP
Configuring ProxySG to work with Symantec CAS and Symantec DLPPurposeThe purpose of this document is to help other successfully integrate CAS and DLP with ProxySG. This article will help you configure...
View ArticleICT - CLI Exit Codes
ICTCLI Exit CodesThe ICT CLI is a useful way of automating the tagging of file. Unfortunately when developing for this tool, there is limited access to the output of the application. Sometimes all you...
View Article