Bounce Attack and InBound filtering only
Oui, j'ai besoin d'une solution I've a problem of Bounce Attack with a lot of NDR email messaging arriving and being delivered.I'd like to use this solution www.symantec.com/docs/HOWTO53629 but I...
View ArticleQuestion about SEP Manager Load Balancing/Failover - Content update
Oui, j'ai besoin d'une solution We are planning to put up additional SEP Managers with one database (load balance and failover), endpoints are assigned to specific SEP manager based on regions via...
View ArticleInstalling SEPM 11.0.7 on Virtual 2008 R2 Error thinks it is Vista
Oui, j'ai besoin d'une solution Hello everyone, my Symantec Endpoint 11.0.7 is currently installed on 2003 server, but is not aquiring new definitions.I am trying to move it to a Virtual 2008 R2...
View ArticleSEPM 12.1.4 - expired SEPM account - does it receive email?
Oui, j'ai besoin d'une solution Hello,Can anyone advise whether a registered SEPM admin account whose password has expired would continue to receive any email notifications setup against it?i.e. if...
View ArticleHelp with DB
Oui, j'ai besoin d'une solution Hi every one, I was wondering if there is a way to filter specific details about an incident from the Data Base, I don't know if you can make a query to search the...
View ArticleNeed Help to install SEPM...
Oui, j'ai besoin d'une solution We are having 1500 System in our Network. Right now we have SEP Unmanaged client in all the systems.Now we have planned to install SEPM in our network.Our problem is,1....
View ArticleSEP 12.1 RU5 Corrupting Yosemite
Oui, j'ai besoin d'une solution We have been running SEPM 12.1 RU5 for just over a month without any issues. Recently we opened our campus for testing of Mac OS-X Yosemite 10.10.1. In order support...
View ArticleHigh CPU - Google Chrome - Kjdnrppeguj.exe
Oui, j'ai besoin d'une solution Pease help. What is this? High CPU - Google Chrome - Kjdnrppeguj.exe It is chewing up CPU and I cannot figure out how to remove it. Google Chrome is not listed in our...
View ArticleSEPM replication partners partially connecting
Oui, j'ai besoin d'une solution I probably messed things up here, but just need to fix it now... SEPM 12.1, I have 2 sites (site F, site W), all was great and going well untill the other day with I...
View Articlesymantec DLP
DLP HiDoes Endpoint Protect Prevent works even when the Client machine has booted in safe mode.Requesting your replies on this.
View Article12.1.4 Errors due to intrusion prevention component.
Oui, j'ai besoin d'une solution Multipe un-managed servers getting the following errors with Symantec Endpoint Protection.Download Insight is not functioning correctly due to an intrusion prevention...
View ArticleData Center Security server advance integrate with LDAP authentication
Oui, j'ai besoin d'une solution Hi all.I have two questions about Symantec Data Center Security server advanced.1.Data Center Security server advance console login can integrate with Microsoft Active...
View ArticleUse command line to isntall SEP 12
Oui, j'ai besoin d'une solution Hi,Just installed MDT server for Windows deployment.I want to install SEP (exported exe files from SEPM) during deployment but command line is needed.Please advice.Thanks
View ArticleSEPM HI Policies
Oui, j'ai besoin d'une solution Hello all , I have created few HI polcies to check . I need to know do I also need SEP 12.1.5 for endpoints ? or HI policies will also work on SEP 12.1.4 or earlier...
View Articlehost integerated policy
Oui, j'ai besoin d'une solution What is the host integerated policy and how it be work on client systems?SNAC is require for the HI policy??SEPM 12.1.5 server and client 12.1.4/12.1.5
View ArticleCinco maneiras de reforçar o programa de segurança cibernética da empresa
Abaixo estão cinco elementos essenciais que todas as empresas devem considerar conforme avaliam continuamente sua programação de segurança. Twitter Card Style: summary Autor: Tarun Sondhi,...
View ArticleCinco maneras de reforzar el programa de ciberseguridad de su empresa hoy mismo
A continuación, se incluyen cinco elementos esenciales que todas las empresas deben considerar a medida que evalúan continuamente sus programas de seguridad. Twitter Card Style: summary Por Tarun...
View Article7 maneiras de proteger sistemas virtuais de um ataque digital
Quando o assunto é sistemas virtuais, a realidade nos mostra que as ameaças estão constantemente em evolução. Twitter Card Style: summary Autor: Danie D. TaylorQuando o assunto é sistemas virtuais, a...
View ArticleSiete maneras de proteger sus sistemas virtuales contra un ataque digital
En lo que se refiere a los sistemas virtuales, la realidad nos muestra que las amenazas están en constante evolución. Twitter Card Style: summary Por Danie D. TaylorEn lo que se refiere a los...
View ArticleMantendo os clientes e recuperando a reputação após uma violação de dados
Três grandes fatores são essenciais para ajudar na recuperação rápida de uma empresa: restauração da marca, gerenciamento construtivo de responsabilidades e prevenção da migração de clientes. Twitter...
View Article