ServiceDesk - Process Automation - Rulesets - INCIDENT-MGMT
Admin | Process Automation | [Choose Service] | Service DashboardManage RulesetsTo learn how to add/amend these Rules see the Rulesets Article.INCIDENT-MGMT...
View ArticleWorkflow - Tools
Symantec Workflow comes with a number of tools.These are explained in the User GuidesSymantec™ Workflow 7.5 User Guide [DOC5941]Symantec™ Workflow 7.6 User Guide [DOC8047]Symantec™ Workflow 8.0 User...
View ArticleUse Symantec’s FIDO-Compliant VIP Security Keys to Authenticate Both On and...
FIDO stands for "Fast Identity Online"The Symantec VIP Security Key follows the U2F (Universal 2nd Factor) standard, a FIDO protocol that allows for a single security key to authenticate to all your...
View ArticleMinimum privileges to scan Oracle 12c
For scanning Oracle DB, CCS requires privileges to import and scan CCS Oracle asset. When requesting DBA to create a user for CCS, answering their question on what are the permissions required takes a...
View ArticleSetting up CCS-VM using a remote SQL Database
Setting up CCS-VM using a remote SQL DatabasePurposeThe purpose of this article is to help guide people who may get a little stuck on the setup of CCS-VM when using a remote Database.When setting up an...
View ArticleSteps after installing Data Centre Security 6.7 With DCS AD/sign in fix &...
Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix & Agent installer troubleshooterPurpose The purpose of this article is to help others who have installed DCS 6.7 troubleshoot...
View ArticleWorkflow - CCS - Components
Symantec Control Compliance Suitehttps://www.symantec.com/products/control-compliance-suiteAssess. Remediate. Comply. Identify security gaps and pinpoint vulnerabilities to prioritize remediation and...
View ArticleWorkflow - DeepSight - Components
DeepSight™ Intelligencehttps://www.symantec.com/services/cyber-security-services/deepsight-intelligenceDeepSight™ Intelligence Extend your teams with actionable cyber threat intelligence. Make sharper...
View ArticleWorkflow - DLP - Components
Symantec Data Loss Preventionhttps://www.symantec.com/products/dlpDLP Products Get visibility of sensitive data leaving your network Discover, monitor and protect your corporate data with the...
View ArticleWorkflow - SWG - Components
Symantec Secure Web Gateway: ProxySG & ASGAdvanced proxy architecture for complete enterprise network security ProxySG and Advanced Secure Gateway (ASG) solutions are an advanced set of...
View ArticleWorkflow - SEP - Components
If you create a new Project and add the Integration Library "Symantec.Components.SEP.dll"[Install Drive]:\Program Files\Symantec\Workflow\Shared\components\Symantec.Components.SEP.dllThis will then...
View ArticleTLS 1.3: It's out there. Are you ready?
TLS 1.3: Embrace the new encryption standard, we got your back.A leading analyst firm once predicted, “half of malware campaigns in 2019 will use some type of encryption to conceal malware delivery,...
View ArticleConfiguring ProxySG to work with Symantec CAS and Symantec DLP
Configuring ProxySG to work with Symantec CAS and Symantec DLPPurposeThe purpose of this document is to help other successfully integrate CAS and DLP with ProxySG. This article will help you configure...
View ArticleICT - CLI Exit Codes
ICTCLI Exit CodesThe ICT CLI is a useful way of automating the tagging of file. Unfortunately when developing for this tool, there is limited access to the output of the application. Sometimes all you...
View ArticleSSLV 4.3.1 is now available
Symantec SSL Visibility (SSLV) release 4.3.1 is now available, extending the company's position as a market leader in Encrypted Traffic Management. The newest release delivers enhanced visualization,...
View ArticleWho Killed Symantec Endpoint Protection?
IntroductionThis is the twenty-second in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleTake our survey and you could win some Symantec Swag!
At Symantec we are always looking for ways to improve our communication with you – our fantastic user community. With that in mind, we have a short survey we’d like you to complete so that we can...
View ArticleSymantec Enforce Recovery || Reinstall
Please follow the steps listed below:Recently I have done the enforce recovery by uininstalling and recovering back to original one.1. Backup your config folder located at Symantec DLP\protect.2....
View ArticleDLP Detection Server setup and manual Upgrade
DLP Detection Server setup and manual UpgradePurposeThe purpose of this walk through is to help others install a DLP detection server and then manually upgrade the agent version. After trying to find...
View ArticleWorkflow - DLP - Components
Symantec Data Loss Preventionhttps://www.symantec.com/products/dlpDLP Products Get visibility of sensitive data leaving your network Discover, monitor and protect your corporate data with the...
View Article