Scanning a file with a competitor's antivirus program detects a virus, but scanning with Symantec Endpoint Protection does not

Article:TECH98929  |  Created: 2000-01-06  |  Updated: 2014-02-14  |  Article URL http://www.symantec.com/docs/TECH98929
Article Type
Technical Solution

Product(s)

Environment

Issue



You use a currently supported version of Symantec Endpoint Protection (SEP) with the most recent virus definitions. A competitor's antivirus program detects a virus, but SEP does not detect a virus. You want to know why.


Solution



Why was this file not detected?

The first and most likely situation is that, even if you have the latest build and latest virus definitions installed, you have a new, undetected threat in your network. Virus makers can take a known threat and manipulate the code in such a way that it no longer matches the definition signatures available in any antivirus program.  Current estimates (2013) are than nine new variants are released into the wild every second.  A constant stream of new malware is a truth of today's threat landscape.

This can be limited in many cases by an advanced heuristics detection such as SEP's optional Proactive Threat Protection (PTP). Threat traffic may be blocked from entry by SEP's IPS signatures or by SEP's optional firewall component, Network Threat Protection (NTP).  In SEP 12.1, Insight technologies can block unknown files without the need of AV signatures.  To greatly increase SEP's effectiveness against today's threats, ensure that these optional components are deployed and enabled rather than just relying solely upon SEP's traditional signature-based AntiVirus component.

Another possibility for why SEP may have missed a detection is that the antivirus on a given system could have been tampered with, turned off or simply have not updated its definitions. Certified virus definitions are presently released by Symantec up to three times per day. If a computer is found to be out of date, it should be updated as quickly as possible (with Rapid Release definitions, if there is an outbreak underway) and a full system scan run.

Also note that different computer security vendors have different criteria for what files and behaviors are considered malicious or suspicious.  Symantec, for example, will only detect and remediate files that are in themselves harmful.  Threat artifacts, autorun files and similar are not universally detected.  This is by design.  (For more information, please see Why Symantec Endpoint Protection does not remove AT, INF, INI, and registry keys related to infections.)  The article Symantec's Antispyware Approach may help clarify why certain products are or are not detected by SEP. 

 

What to do next?

The first line of defense for every antivirus manufacturer is the submission and collection of suspicious files whenever possible. When you encounter a threat that has not been detected, there are steps that should be taken to minimize the impact and expedite recovery. We offer a submission service which analyzes any files you submit for known and unknown threats and variants. It is by these submissions that we can create a new definition set that will detect and remove those threats. If the issue must be resolved before a Certified definition file is available, we offer Rapid Release definitions that can be manually applied to the affected machines or network. For an explanation of the submission process using https://submit.symantec.com/basic, please see the document How to Use the Web Submission Process.


We also offer a self-service site to analyze files, at http://www.threatexpert.com, which can give you more information on the files you submit to it. This could provide enough information to allow you to create firewall rules preventing the threat from downloading additional threats or contacting a third party. You could also use the threat's unique MD5 hash value to block the process from running with SEP's optional Application and Device Control (ADC) component which may help prevent it from spreading. (See How to use Application and Device Control to limit the spread of a threat.) This hash value is included in the email response from Threat Expert. For more information on blocking a process, please see Chapters 33 and 34 of the SEP Administration Guide.


Symantec Endpoint Protection detects and removes millions of known threats. By working with our customers to troubleshoot a virus infection we assist the customer to:

  • Identify the threat and submit any undetected files that look suspicious.
  • Identify the computers infected.
  • Quarantine the computers infected.
  • Clean the computers infected using Rapid Release definitions based on file submissions..
  • Determine the infection vector and take steps to prevent recurrence.


These steps are outlined in the document Best practices for troubleshooting viruses on a network 

For additional troubleshooting steps and information, please follow the directions in the document What to do when you suspect that a Symantec antivirus product is not detecting viruses.

One important note: many threats function by exploiting known vulnerabilities. This vulnerable software can include the operating system as well as any component running on it (such as an internet browser, email software or other program). To remain invulnerable to these threats, it is very important to make sure that all vendor software patches are applied to installed applications and the OS as soon as they become available.  Additional recommendations for how protect an organization with SEP can be found in the article Symantec Endpoint Protection – Best Practices




Legacy ID



2000100610314948


Article URL http://www.symantec.com/docs/TECH98929


Terms of use for this information are found in Legal Notices