Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 694 articles
Browse latest View live

ServiceDesk - Process Automation - Rulesets - INCIDENT-MGMT

Admin | Process Automation | [Choose Service] | Service DashboardManage RulesetsTo learn how to add/amend these Rules see the Rulesets Article.INCIDENT-MGMT...

View Article


Workflow - Tools

Symantec Workflow comes with a number of tools.These are explained in the User GuidesSymantec™ Workflow 7.5 User Guide [DOC5941]Symantec™ Workflow 7.6 User Guide [DOC8047]Symantec™ Workflow 8.0 User...

View Article


Image may be NSFW.
Clik here to view.

Use Symantec’s FIDO-Compliant VIP Security Keys to Authenticate Both On and...

FIDO stands for "Fast Identity Online"The Symantec VIP Security Key follows the U2F (Universal 2nd Factor) standard, a FIDO protocol that allows for a single security key to authenticate to all your...

View Article

Minimum privileges to scan Oracle 12c

For scanning Oracle DB, CCS requires privileges to import and scan CCS Oracle asset. When requesting DBA to create a user for CCS, answering their question on what are the permissions required takes a...

View Article

Setting up CCS-VM using a remote SQL Database

Setting up CCS-VM using a remote SQL DatabasePurposeThe purpose of this article is to help guide people who may get a little stuck on the setup of CCS-VM when using a remote Database.When setting up an...

View Article


Image may be NSFW.
Clik here to view.

Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix &...

Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix & Agent installer troubleshooterPurpose The purpose of this article is to help others who have installed DCS 6.7 troubleshoot...

View Article

Image may be NSFW.
Clik here to view.

Workflow - CCS - Components

Symantec Control Compliance Suitehttps://www.symantec.com/products/control-compliance-suiteAssess. Remediate. Comply. Identify security gaps and pinpoint vulnerabilities to prioritize remediation and...

View Article

Image may be NSFW.
Clik here to view.

Workflow - DeepSight - Components

DeepSight™ Intelligencehttps://www.symantec.com/services/cyber-security-services/deepsight-intelligenceDeepSight™ Intelligence Extend your teams with actionable cyber threat intelligence. Make sharper...

View Article


Image may be NSFW.
Clik here to view.

Workflow - DLP - Components

Symantec Data Loss Preventionhttps://www.symantec.com/products/dlpDLP Products Get visibility of sensitive data leaving your network Discover, monitor and protect your corporate data with the...

View Article


Image may be NSFW.
Clik here to view.

Workflow - SWG - Components

 Symantec Secure Web Gateway: ProxySG & ASGAdvanced proxy architecture for complete enterprise network security ProxySG and Advanced Secure Gateway (ASG) solutions are an advanced set of...

View Article

Image may be NSFW.
Clik here to view.

Workflow - SEP - Components

If you create a new Project and add the Integration Library "Symantec.Components.SEP.dll"[Install Drive]:\Program Files\Symantec\Workflow\Shared\components\Symantec.Components.SEP.dllThis will then...

View Article

TLS 1.3: It's out there. Are you ready?

TLS 1.3: Embrace the new encryption standard, we got your back.A leading analyst firm once predicted, “half of malware campaigns in 2019 will use some type of encryption to conceal malware delivery,...

View Article

Image may be NSFW.
Clik here to view.

Configuring ProxySG to work with Symantec CAS and Symantec DLP

Configuring ProxySG to work with Symantec CAS and Symantec DLPPurposeThe purpose of this document is to help other successfully integrate CAS and DLP with ProxySG. This article will help you configure...

View Article


Image may be NSFW.
Clik here to view.

ICT - CLI Exit Codes

ICTCLI Exit CodesThe ICT CLI is a useful way of automating the tagging of file. Unfortunately when developing for this tool, there is limited access to the output of the application. Sometimes all you...

View Article

SSLV 4.3.1 is now available

Symantec SSL Visibility (SSLV) release 4.3.1 is now available, extending the company's position as a market leader in Encrypted Traffic Management.  The newest release delivers enhanced visualization,...

View Article


Image may be NSFW.
Clik here to view.

Who Killed Symantec Endpoint Protection?

IntroductionThis is the twenty-second in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

Take our survey and you could win some Symantec Swag!

At Symantec we are always looking for ways to improve our communication with you – our fantastic user community. With that in mind, we have a short survey we’d like you to complete so that we can...

View Article


Symantec Enforce Recovery || Reinstall

Please follow the steps listed below:Recently I have done the enforce recovery by uininstalling and recovering back to original one.1. Backup your config folder  located at Symantec DLP\protect.2....

View Article

Image may be NSFW.
Clik here to view.

DLP Detection Server setup and manual Upgrade

DLP Detection Server setup and manual UpgradePurposeThe purpose of this walk through is to help others install a DLP detection server and then manually upgrade the agent version. After trying to find...

View Article

Image may be NSFW.
Clik here to view.

Workflow - DLP - Components

Symantec Data Loss Preventionhttps://www.symantec.com/products/dlpDLP Products Get visibility of sensitive data leaving your network Discover, monitor and protect your corporate data with the...

View Article
Browsing all 694 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>