Security Analytics Support Tip: What does that pink banner mean - Or what is...
Security Analytics systems are constantly monitoring for possible hardware problems. There is a daemon which provides an interface between the software side of the application and the hardware. When...
View ArticleInformation Centric Analytics Best Practices - Configuring Organizational...
Once Symantec Information Centric Analytics (ICA) is installed and integrated with the various data sources within the environment, there are some additional configurations which should be completed to...
View ArticleInformation Centric Analytics Best Practices - Risk Vectors
Creating and Configuring Risk Vectors and Risk ScoresThis article deals with how Symantec Information Centric Analytics (ICA) incorporates Risk Vectors to improve and display Risk Scores. In ICA,...
View ArticleInformation Centric Analytics Best Practices - Using the Integration Wizard
Integration Wizard Best PracticesWith the Integration Wizard in Symantec Information Centric Analytics, users have the flexibility to import almost anything and everything from different data source....
View ArticleInformation Centric Analytics Best Practices - Integration Wizard...
Troubleshooting Integration Wizard Data Import Issues into Staging TablesThis article will provide you with the SQL necessary to troubleshoot the IW_DataSourceQuery that will pull data in from the...
View ArticleInformation Centric Analytics Best Practices - Risk Optimization
Risk Optimization in Information Centric AnalyticsThe mission of Symantec Information Centric Analytics is to allow enterprises to make the most of their limited resources by automating as much of the...
View ArticleSEP - Scripts
Following on from an excellent Article 'Handy SQL Queries for SEPM v14' from Tony Sutton I thought it would be useful to create a site to collate all this information in an easy to use format.This...
View ArticleProtect Symantec DCS agent
Good day to all Symantec DCS admins.I want to provide you with a solution to one problem.I hope that my decision is correct and will be useful.Sincerely.DimaRecently, I came to the client to solve a...
View ArticleAndroid malware - “Agent Smith”
A new android malware, ‘Agent Smith’ recently infected over 25 million android mobile devices worldwide. The malware exploits android vulnerabilities to replace legitimate apps with malicious...
View ArticleSymantec DeepSight App for Splunk
DeepSight-Splunk IntegrationThe purpose of this document is to help customers integrate Symantec Deepsight Intelligence into Splunk Enterprise using the sample integration code provided.
View ArticleManaging Private Kubernetes Clusters with Secure Access Cloud
Kubernetes (commonly stylized as k8s) is an open-source container-orchestration system for automating application deployment, scaling, and management.It was originally designed by Google, and is now...
View ArticleEndpoint Security- Best Practices for Companies and Employees
What Is Endpoint Security? Any device that is connected to an organization’s network systems is known as an endpoint. Endpoint security is the protection and monitoring of end-user devices, such as...
View ArticleNew CA Certificate coming for CloudSOC Gateway
For Customers on the Global CloudSOC tenant with Gateway using gw.elastica.net and mgw.elastica.net, the CA certificate used for the Symantec CloudSOC Gateway will expire 12/12/2019.Due to this...
View ArticleHow to use Symantec Custom Inventory to report on Microsoft Office 365 Update...
Open SMP Console - > Settings -> All Settings -> Discovery and Inventory -> Inventory Solution -> Manage Custom Data Classes -> New data class -> Office 365 Update Channels Create...
View ArticleBatch file to delete corrupt SEP definitions
Hi All,Please find the script to delete corrupt defs using batch ( Use at your own risk). Tamper protection need to be turned off to delete defs or else you will receive Access Denied message@echo off...
View ArticleClean Duplicate machines from SEPM console
Many users found issues while removing duplicate entries in SEPM console, mainly in Citrix non-persistent VDI estate -Here, is the script which may help many to remove duplicate entries from SEPM...
View ArticleSQL Query for machines with Outdated Agents
I wanted to share a SQL query that can be used to list machines with outdated Altiris Agents select vc.Domain ,vc.name [Computer Name] ,vc.[OS Name] ,ah.[Last Configuration Request]...
View ArticleSEPM Dashboard Malfunctioning
Hello All,Many times SEPM dashboard is malfunctioning means showing incorrect values of "out of date, Up to date, Disabled" system count on Home screen.Please refer below solution - Issue: Incorrect...
View ArticleUsing the new End User Notification Task in 8.5 RU2
8.5 RU2 – New Feature: End User Notification Task This new feature introduces a new Plugin installed with the “Core-SMA” on the Client Computer called End User Notification Agent. The End User...
View ArticleSEP v14 client & macOS 10.15 Catalina
With the new macOS 10.15 (Catalina) released recently, the current Mac SEP client may or may not work with the current SEP 14 versions.You will be pleased to know that macOS 10.15 Catalina will be...
View Article