Dallas Security User Group Single Agent Presentation - January 17, 2019
Hello,This deck was presented by Jusint Martin at the latest Dallas Security User Group event held on January 17, 2019.
View ArticleScript to Delete Computers from SMP Remotely using Integrated Windows...
Background In our environment we deploy computers with Symantec's Ghost Solution Suite, and then maintain them through the rest of their lifecycle using ITMS. One of the issues we faced recently in our...
View ArticleData Sheet - TIPP Innovation Playground
SEP 14 Data SheetTIPP Innovation Playground Program Guide
View ArticlePreventive measures to combat malicious ransomwares attacks in banking entities
Happy weekend community I hope you had a great week full of success, in my first article I had talked about some tips that recommended to avoid the attack of ransomwares to windows 7 and windows...
View ArticleApplication URL showing unknown in google chrome in DLP
Issue:-Incident details in the Enforce console display the URL as 'Unknown' for incidents generated by the Chrome HTTPS monitor.Cause:-One of the components of the Chrome extension for the HTTPS...
View ArticleLearn How to Contribute
Connect is as strong as its contributing members. To help others with information, ask for help, or offer solutions to problems please follow the below steps. Before we begin, though, please know that...
View ArticleData Loss Prevention (DLP) - Create custom file type signature
Hi,This article is a How-To on how to enable, create and implement custom file type signatures in DLP. In this example I'm going to use a scenario I've recently been working on which proved to be an...
View ArticleIntegration Wizard Troubleshooting and Operational Tips and Tricks
About the Integration WizardYou use the Symantec ICA integration wizard to define data sources and mappings for your environment. The wizard has one section for data sources, and one section for data...
View ArticleCreating a SQL Report for DLP Scan History.
IntroductionSymantec DLP provides a wealth of information in regards to scanning Data at Rest (DAR) and Data In Motion (DIM). However, accessing this information for reporting purposes can be does not...
View ArticleDefinition of ransomware types of ransomware and ways to face the threat
Happy week community I hope this week is quite productive for everyone, in the last 2 articles that I wrote I had talked about the measures to combat the massive attack of ransomwares for windows 7...
View ArticleData Loss Prevention (DLP) - Customising Agent Communication
Hello,In this article I'm going to show how to modify the default agent communication properties within Symantec Data Loss Prevention, this will allow the agent to communicate more or less often to the...
View ArticleSQL Query to show Estate-Wide Discover Scan Data
The BriefIn my previous article Creating a SQL Report for DLP Scan History, I provided a query that showed the scan history in SQL format for reporting purposes.Following that, I received a request to...
View ArticleSQL Query to Show Violations of Specific Rules - Discover
The BriefContinuing what feels like a series of articles on the utilisation of SQL within DLP (1,2) this piece highlights another, very useful application of a Structured Query within DLP. The ability...
View ArticleSQL Query for Average Scan Speed Across Whole Estate – Discover
The BriefThis article builds on a query covered in one of my previous pieces. As usual, the full query is at the bottom if you want to skip right to it. If not, I’ll go over the context and walk...
View Article¿What is Endpoint? common problems and how to execute correctly
Dear community, greetings from this humble servant, I hope that the week has been quite successful and beneficial for all. The challenges and the way to expand security in different sectors are...
View ArticleEmail Security.Cloud: An Effective Countermeasure Against Trojan.Emotet
By Rodrigo Calvo, CISSP, PCIP,Symantec Knight Sr. Security Consultant at Infolock.In July 2018 the Symantec Security Response Attack Investigation Team published an article about the evolution of the...
View ArticleSEP 15 is Cloud based - what's your views
With the announcement slowly tricking in about SEP 15, one thing stood out about this new release is that it's Cloud based product only. While I agree that more and more product are going cloud based,...
View ArticleEducation Services: CloudSOC Administration R2 Course
Symantec offers live, instructor-led training for CloudSOC.The CloudSOC R2 Administration course provides an overview of the CloudSOC service, covering initial setup, deployment options and service...
View ArticleTroubleshooting the Symantec Endpoint Protection Manager Web and Java Remote...
Web ConsoleThe Symantec Endpoint Protection Manager Web Console allows you to remotely manage SEP in a web browser window. In 14.2 MP1 the following browsers are supported for web console access to...
View ArticleTroubleshooting 14.2 to 14.2 MP1 AutoUpgrade
Debugging to enable for troubleshooting AutoUpgrade SEPM Debugging:Enable Finest logging on the SEPMEnable Secreg/Secars debug on SEPMSEPM and SEPM Web Service will need to be restarted after these...
View Article