Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Security Analytics Support Tip: What does that pink banner mean - Or what is...

Security Analytics systems are constantly monitoring for possible hardware problems. There is a daemon which provides an interface between the software side of the application and the hardware. When...

View Article


Image may be NSFW.
Clik here to view.

Information Centric Analytics Best Practices - Configuring Organizational...

Once Symantec Information Centric Analytics (ICA) is installed and integrated with the various data sources within the environment, there are some additional configurations which should be completed to...

View Article


Image may be NSFW.
Clik here to view.

Information Centric Analytics Best Practices - Risk Vectors

Creating and Configuring Risk Vectors and Risk ScoresThis article deals with how Symantec Information Centric Analytics (ICA) incorporates Risk Vectors to improve and display Risk Scores.   In ICA,...

View Article

Information Centric Analytics Best Practices - Using the Integration Wizard

Integration Wizard Best PracticesWith the Integration Wizard in Symantec Information Centric Analytics, users have the flexibility to import almost anything and everything from different data source....

View Article

Image may be NSFW.
Clik here to view.

Information Centric Analytics Best Practices - Integration Wizard...

Troubleshooting Integration Wizard Data Import Issues into Staging TablesThis article will provide you with the SQL necessary to troubleshoot the IW_DataSourceQuery that will pull data in from the...

View Article


Image may be NSFW.
Clik here to view.

Information Centric Analytics Best Practices - Risk Optimization

Risk Optimization in Information Centric AnalyticsThe mission of Symantec Information Centric Analytics is to allow enterprises to make the most of their limited resources by automating as much of the...

View Article

Image may be NSFW.
Clik here to view.

SEP - Scripts

Following on from an excellent Article 'Handy SQL Queries for SEPM v14' from Tony Sutton I thought it would be useful to create a site to collate all this information in an easy to use format.This...

View Article

Protect Symantec DCS agent

Good day to all Symantec DCS admins.I want to provide you with a solution to one problem.I hope that my decision is correct and will be useful.Sincerely.DimaRecently, I came to the client to solve a...

View Article


Android malware - “Agent Smith”

A new android malware, ‘Agent Smith’ recently infected over 25 million android mobile devices worldwide. The malware exploits android vulnerabilities to replace legitimate apps with malicious...

View Article


Symantec DeepSight App for Splunk

DeepSight-Splunk IntegrationThe purpose of this document is to help customers integrate Symantec Deepsight Intelligence into Splunk Enterprise using the sample integration code provided.

View Article

Image may be NSFW.
Clik here to view.

Managing Private Kubernetes Clusters with Secure Access Cloud

Kubernetes (commonly stylized as k8s) is an open-source container-orchestration system for automating application deployment, scaling, and management.It was originally designed by Google, and is now...

View Article

Image may be NSFW.
Clik here to view.

Endpoint Security- Best Practices for Companies and Employees

What Is Endpoint Security? Any device that is connected to an organization’s network systems is known as an endpoint. Endpoint security is the protection and monitoring of end-user devices, such as...

View Article

New CA Certificate coming for CloudSOC Gateway

For Customers on the Global CloudSOC tenant with Gateway using gw.elastica.net and mgw.elastica.net, the CA certificate used for the Symantec CloudSOC Gateway will expire 12/12/2019.Due to this...

View Article


Image may be NSFW.
Clik here to view.

How to use Symantec Custom Inventory to report on Microsoft Office 365 Update...

Open SMP Console - > Settings -> All Settings -> Discovery and Inventory -> Inventory Solution -> Manage Custom Data Classes -> New data class -> Office 365 Update Channels Create...

View Article

Batch file to delete corrupt SEP definitions

Hi All,Please find the script to delete corrupt defs using batch  ( Use at your own risk). Tamper protection need to be turned off to delete defs or else you will receive Access Denied message@echo off...

View Article


Clean Duplicate machines from SEPM console

Many users found issues while removing duplicate entries in SEPM console, mainly in Citrix non-persistent VDI estate -Here, is the script which may help many to remove duplicate entries from SEPM...

View Article

SQL Query for machines with Outdated Agents

I wanted to share a SQL query that can be used to list machines with outdated Altiris Agents select    vc.Domain    ,vc.name [Computer Name]    ,vc.[OS Name]    ,ah.[Last Configuration Request]...

View Article


SEPM Dashboard Malfunctioning

Hello All,Many times SEPM dashboard is malfunctioning means showing incorrect values of "out of date, Up to date, Disabled" system count on Home screen.Please refer below solution - Issue: Incorrect...

View Article

Image may be NSFW.
Clik here to view.

Using the new End User Notification Task in 8.5 RU2

8.5 RU2 – New Feature: End User Notification Task This new feature introduces a new Plugin installed with the “Core-SMA” on the Client Computer called End User Notification Agent. The End User...

View Article

SEP v14 client & macOS 10.15 Catalina

With the new macOS 10.15 (Catalina) released recently, the current Mac SEP client may or may not work with the current SEP 14 versions.You will be pleased to know that macOS 10.15 Catalina will be...

View Article
Browsing all 1863 articles
Browse latest View live