Symantec Endpoint Encryption
I need a solution I need to find out how to decrypt a file encrypted with Symantec Endpoint Encryption in a computer without the encryption software?
View Articleadd exclusions in SEP
I need a solution HelloI have question is it supported to add exclusion using environment variable such as %TMP% or %USERPROFILE%?I would like use it for folder exclusion in security risk in...
View ArticleAdd MAC address to client search criteria
SEPM allow to search clients by various criteria but for some reason MAC address is missing from this list although this parameter can be seen in client properties.Please add this search criteria.
View ArticleTransfer PGP WDE form Win 7 PC to Win 8 PC
I need a solution Hi. How do I transfer / upgrade PGP WDE 10.2.1, installed on a Windows 7 PC, and no longer used, to a version compatible with the Windows 8.1, 64-bit PC and install it on the...
View ArticleI need to merge firewall rules in NTP and Windows firewall
I need a solution We are trying to merge firewall rules in NTP and Windows and then are wanting to disable NTP. I think we have the disable script down but need to figure out how to pull off the...
View ArticlePreventing devices from emailing externally
I need a solution We're using MessageLabs for spam and message filtering. We have devices internally that we use to send documents to users internally such as scanned documents. When the user scans...
View ArticleSystem infected Spygate RAT activity detected
I need a solution Good evening,Since 2 hours I'm getting this popup "Symantec Endpoint Protection [SID27950] System Infected Spygate RAT Activity detected".I have looked on different forums but I...
View ArticleOn-premise Active Directory synchronization to the cloud
I do not need a solution (just sharing information) Hello –Our Product Team is currently conducting research for a future cloud-based security product from Symantec. We would like to understand how...
View ArticleOn-premise Active Directory synchronization to the cloud
I do not need a solution (just sharing information) Hello –Our Product Team is currently conducting research for a future cloud-based security product from Symantec. We would like to understand how...
View ArticleTrojan.Poweliks: A threat inside the system registry
Trojan.Poweliks is a unique threat because it is located in a registry key on compromised computers.Read more...
View ArticleInstalled Windows on an SSD and now the encrypted HDD won't boot
I need a solution Here is the story: I have a laptop with a HDD encrypted by Symantec whole disk encryption. I knew that I shouldn't try messing with it with dual boot etc, so I bought an mSATA SSD...
View ArticleChoose to export fields shown in SEPM Client Properties Window
It would be nice if the two fields (Unique ID & Serial Number) viewed from the individual client properties window in the SEPM could also be exported to a report or log format. Almost all the...
View ArticleWhat are the possible event log entries are and their definition.
I need a solution I found TECH article # 186925 (http://www.symantec.com/docs/TECH186925) that the Symantec Endpoint Manager 12.1 writes to the Application Log. However, it has been my experience...
View ArticleIT Analytics for Data Loss Prevention - Custom Attribute Utility
IT Analytics DLP pack offers several predefined cubes out-of-the-box. As part of the DLP pack, the custom attribute name and custom attribute value dimension are included. These two dimensions...
View ArticleI've locked the Auto Protect option on policy but staff can still disable...
I need a solution Hi. On Endpoint 12.1.4 I have modifed two policy element -- the first was to not allow staff on endpoint computers to modify exceptions. That worked.The second was to not allow...
View ArticleSEP 21.5 BROKE DELL KACE KBOX
THE NEW VERSION OF SEP 21.5 HAS CAUSED MANY OF OUR PCs FROM COMMUNICATING WITH THE DELL KACE KBOX SERVICE. SEP 21.5 SEES THE DELL KACE AGENT AS AN AV INTRUSION ATTEMPT SO THE PCs STOP CHECKING INTO...
View ArticleSEPM Policy Location: Time as a criterion
It would be very helpful to be able to use time of day, day of week, day of month, etc, as criteria for determining Location in policies. This would allow us to, for example, have one policy during...
View ArticleSizing for SDCS:SA
I need a solution How many agents can 1 management server handle? Is there a way for 2 or more management servers to forward events to a management server that is connected to the SQL DB so that...
View Articleblock downloads Symantec Web Gateway
I need a solution How can I block all downloads from website with SWG? , no matter whether harmful or not
View ArticleSymantec Identity: Access Manager (SAM) is available!
You need to stay competitive and allowing users to work anywhere, anytime is one of the ways your business keeps its edge. However, in some cases this means using personal devices to access data in...
View Article