Symantec Endpoint Security - configuring
38 videos • 2,749 views • by Symantec
1
Adding EDR privileges to your administrators
Symantec
Download
2
Discovering and Enrolling Unmanaged Devices
Symantec
Download
3
How to configure the language for SES reports and alerts
Symantec
Download
4
Synchronizing your Active Directory domain into Symantec Endpoint Security
Symantec
Download
5
Searching on the status of EDR queries and commands that you've run
Symantec
Download
6
Setting a default SES domain
Symantec
Download
7
Filtering your devices by their associated security status reason
Symantec
Download
8
Scheduled Scan support for Mac and Linux
Symantec
Download
9
Send an Email Notification When an Incident is Generated or Paused
Symantec
Download
10
Deny Non-PE Files from Launching on your Device Users Systems
Symantec
Download
11
Updated Web and Cloud Access Protection Policy
Symantec
Download
12
Cancelling an Antimalware Scan from your Cloud Console
Symantec
Download
13
Process and Full Dumps are Available as Actions for Incidents
Symantec
Download
14
The Device Integrity Computer Status Report
Symantec
Download
15
The Auto-Tune Task for Adaptive Protection
Symantec
Download
16
Prevent Agent Updates From Overloading Your Cloud Console
Symantec
Download
17
Manage Events Associated With Incident Rules
Symantec
Download
18
New Option to View Device Group Hierarchy
Symantec
Download
19
Provide Temporary Read-only Access for Technical Support Engineers
Symantec
Download
20
How to Disable Local Admin Account Creation
Symantec
Download
21
New Enforcement Options in the TDAD Policy
Symantec
Download
22
How to stream events to your cloud-platform data buckets.
Symantec
Download
23
Synchronization support of both on-premises AD and the cloud Azure AD in the same SES domain
Symantec
Download
24
Filter the top or bottom ten results from an event search
Symantec
Download
25
How to enable rate limiting of Incidents
Symantec
Download
26
How to view unmanaged devices in Group Hierarchy
Symantec
Download
27
Superior Threat Hunting by using Symantec Endpoint Security Complete.
Symantec
Download
28
How to find the Host Location and Build Number of your SES instance.
Symantec
Download
29
The four key ways to search for events in Symantec Endpoint Security (SES)
Symantec
Download
30
How to filter noisy or redundant events.
Symantec
Download
31
The most meaningful fields in an event to include in your analysis of events in SES?
Symantec
Download
32
Using Symantec Endpoint Security Incidents as a powerful tool in your Threat Hunting strategy.
Symantec
Download
33
Use Symantec Endpoint Security to expand the process tree of a suspicious process.
Symantec
Download
34
Identifying signs of a bad actor attempting to elevate their privileges.
Symantec
Download
35
The Hosting Location of your Symantec Endpoint Security instance in Symantec Enterprise Cloud (SEC).
Symantec
Download
36
Remediation actions available for an Incident or Event in Symantec Endpoint Security Complete.
Symantec
Download
37
How to verify the Hosting Location (Data Center) and the Build Number of my SES instance .
Symantec
Download
38
Stream events from your Symantec Endpoint Security instance.
Symantec
Download