Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

SQL Injection. high density hazard

Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby...

View Article


Investigator App for Elastic

View Article


Elastic Installation and Configuration Guide

Symantec™ Integrated Cyber Defense Exchange SOC Investigator App for the Elastic Stack Installation andConfiguration Guide

View Article

Image may be NSFW.
Clik here to view.

How do I add the Policy ID (x-bluecoat-reference-id) Field to a 10.3.x...

SituationBy default, neither Reporter nor the ProxySG appliance report on the Policy ID. With the standard log file, the ProxySG does not log the Policy ID. Because the default access log does not...

View Article

How to check System Status of Reporter v10.x

SituationHow to check the System Status/Health Monitoring of Reporter?SolutionSystem Status on Reporter 10.1.xreporter>enableEnable Password :reporter#show ststusSystem Status on Reporter...

View Article


Image may be NSFW.
Clik here to view.

Independent tests prove effectiveness of Symantec's Email Security

Email is widely recognized as the most popular method for attackers to spread malware and breach organizations.  Our 2019 Internet Security Threat Report shows that employees of small organizations...

View Article

Image may be NSFW.
Clik here to view.

SCWP- AWS: Deny Shutdown Workload Action from CWP.

Hello,In this guide I'm going to highlight how to set deny permissions within AWS to prevent CWP users being able to remotely shutdown AWS workloads. The business reasoning for this can vary from...

View Article

Image may be NSFW.
Clik here to view.

Scanning Excel Formula in DLP

Symantec DLPIn this article we will discover how we can enable DLP to scan formula in excel documents.Use CaseWhy would you want to scan excel formulas? what could they possibly contain that would...

View Article


Image may be NSFW.
Clik here to view.

Email Security.cloud, goes from strength to strength

On 29 March 2019 we further extended the capabilities of Symantec Email Security.cloud.  This is part of our ongoing, and continual investment in protecting our customers from the multiple email-based...

View Article


General Availability Release of ICDx Now Available to Symantec Customers

Please review instructions in the support article below.https://support.symantec.com/en_US/article.TECH253299.html

View Article

Endpoint SWAT: Symantec Endpoint Protection 14.x

Useful SEP 14 Administration Web LinksThis collection of SEP 14 useful links should help new and experienced admins with day to day operations of SEP and help in understanding how the underlying...

View Article

Security Analytics: Risk and Visibility Report

The Risk and Visibility Report in Security Analytics is a powerful way to provide non-analysts, executives, and other members of your organization with a general overview of the latest threats that...

View Article

Error Codes and Messages for GetServiceUser Provisioning Status

< Back to Table of Contents PageNext >

View Article


Image may be NSFW.
Clik here to view.

CloudSOC CASB Users/Admin role - Incident Investigation

     My team just finished creating a whitepaper on How to build a Cloud Center of Excellence. We were sitting back and contemplating follow-on papers representing deeper dives into each of the topics...

View Article

SEP v15 Cloud vs SEP v14.2 RU1 - A Follow Up

A follow up to my previous article - "SEP 15 is Cloud based - what's your views" - Symantec has published a new article, where they explained the differences between Symantec Endpoint Protection 14.2...

View Article


Security Analytics Support Tips - May 2019

Tips from the Security Analytics Support DeskHere are a few tips from the Security Analytics Support Team they thought would be helpful for customers to get the most out of their Security Analytics...

View Article

Image may be NSFW.
Clik here to view.

WSS + SEP Mobile builds a strong line of defense for mobile users

The integration of Web Security Service (WSS) and SEP Mobile brings advanced web security to the mobile devices. WSS protects web and cloud app traffic, users, and devices via cloud-delivered security...

View Article


Endpoint Detection and response procedures for blocking and attacks against...

    Advanced threat protection levels represent a fundamental role in securing the volume of information in companies in such a competitive market businesses are constantly looking to improve security...

View Article

Symantec SOC View ICDx App for Splunk

Symantec™ Integrated Cyber Defense Exchange SOC View App and TA for Splunk Installation and Configuration GuideThe Symantec SOC View App for Splunk gives Security Operations Analysts a cohesive view of...

View Article

In the UK? Register for our Endpoint protection user group in London May 30th!

Using SEP, come join us at the SEP user group in London May 30thProduct Management will be in attendance to give the latest roadmap, hear from other customers about their SEP implementation, and our...

View Article
Browsing all 1863 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>