Critical System Protection

 View Only
213 Entries
 
 
8 years ago
Be the first person to recommend this.

Hello,

If you are planning to Install OR Manage Symantec DCS/CSP here are the few Quick Articles which may assist you with an Easy Process.

 

1) Logging into the DCS ...

8 years ago
1 person recommends this.

8 years ago
Be the first person to recommend this.

Problem
Your DCS setup is running behind a proxy and reputation lookups are not being completed.
Solution
The reputation data relies on the shasta data and not LiveUpdate.  ...

8 years ago
Be the first person to recommend this.

Problem

1) SCSP/DCS was setup on machine that is now below needed specifications.

OR

2) You would like to use a new SQL Server instance such as 2012 instead of 2008.

OR

3) ...

8 years ago
Be the first person to recommend this.

Problem


This happens when you do not understand why some events are red / blue / yellow / green, etc.

 

Solution

 

EVENT NOTIFICATION located under MONITOR ...

8 years ago
Be the first person to recommend this.

Problem

Unable to log in to DCS Managment console after install

Solution

This occurs because the information in the following Screenshot is often overlooked after install, ...

8 years ago
1 person recommends this.

Problem
DCS Agent cannot connect to Manager
 

Solution

Run the following on the agent machine:

1) su - sisips
2) ./sisipsconfig.sh -forcereg
3) //Symantec/scspagent/IPS/./sisipsconfig.sh ...

8 years ago
2 people recommend this.

Hello,

Symantec Data Center Security: Server Advanced (DCS:SA) is a flexible, multi-layer security solution for servers that detects abnormal system activities. It prevents and ...

8 years ago
Be the first person to recommend this.

On Wednesday, May 13, Crowdstrike researchers revealed a new zero-day vulnerability affecting a variety of virtualization platforms and cloud services. Dubbed VENOM, it allows attackers ...

8 years ago
1 person recommends this.

On Wednesday, May 13, Crowdstrike researchers revealed a new zero-day vulnerability affecting a variety of virtualization platforms and cloud services. Dubbed VENOM, it allows attackers ...