cancel
Showing results for 
Search instead for 
Did you mean: 
North America
cancel
Showing results for 
Search instead for 
Did you mean: 

Discussion Posts

ITMS Software Manager Field

I have the ability to create custom data classes related to hardware assets in ITMS, but would also like to create custom data classes related to software and also would like the ability link that data class to a software software resource. Please ad...

guilloryg by Not applicable
Partner Accredited
  • 535 Views
  • 0 replies
  • 0 kudos

Integration CCS with DLP

Hi!! I need integrate Symantec CCS with DLP, i try do connection between this two product however i can't do the connection and appears the next issue: Connection to the Symantec Data Loss Prevention Enforce Server failed. Error in deserializing body...

Monitoring machines

Good morning,  It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration?  Would not it be nice to send this log to the administrator so that it has real science of what ...

Resolved! svchost.exe

There are some method to identify and fix svchost exe problems?

StevenN by Level 3
  • 1141 Views
  • 5 replies
  • 1 kudos

Forum discussions

Dear, good day. Some situations created for the forum discussions were not disclosed And is marked in red someone can tell me why? hugs

You design your system

For better be your antivirus, two problems occur frequently: Lack of update. Inefficiency to block changes in the registry keys or writing to the system folder. For malware to install itself on the system successfully it needs basically two thin...

Resolved! Phrases that scare security professionals

Given the findings of some practices and routines, it is easy to know what the problems are with the security companies. It is your case? The scenes are classic. A child with chocolate smeared shirt says, categorically: "It was not me." Or the phone ...

IT security policies need to change

IT security policies need to change Mobility, cloud and advancement of social networks are becoming obsolete the traditional rules, say industry leaders IT and information security managers will not be able to directly control or adequately protect ...

Resolved! I was invaded, who's to blame?

This paper presents the thoughtful side of some teams after serious mistakes made by those who, after hiring some solutions in order to relax a little more concerned for their jobs, in order to relax so much that tend to change as the only solution c...

Resolved! Serious Error

Dear, good morning. I would like to make clear in this discussion, the importance that we give the integrity of our data, in particular our emails. We constantly see people everywhere reporting infections on their desktops and applications, but I do ...

Labels