Endpoint Protection

 View Only
  • 1.  Block Songs Ext

    Posted Oct 07, 2012 05:14 AM

    As i have seen a lot of unwanted mp3 songs and video songs found in systems. So i want to block to copy/play the same?

    Any policy to do this change?



  • 2.  RE: Block Songs Ext
    Best Answer

    Posted Oct 07, 2012 05:16 AM

    Find the attach download which can help to disable the Extension. Eg- .mp3 , .mp4

    https://www-secure.symantec.com/connect/downloads/block-access-extension-mp3-mp4-mpg-mpeg-flv

    Use the link and disable all type of extension



  • 3.  RE: Block Songs Ext

    Posted Oct 07, 2012 05:24 AM

    HI,

    You can use ADC

    Best Practices for Deploying Symantec Endpoint Protection's Application and Device Control Policies

     http://www.symantec.com/docs/TECH181679

     

    Symantec Endpoint Protection Manager - Application and Device Control - Policies explained

    http://www.symantec.com/docs/TECH104431

    https://www-secure.symantec.com/connect/downloads/block-access-extension-mp3-mp4-mpg-mpeg-flv



  • 4.  RE: Block Songs Ext

    Posted Oct 07, 2012 06:43 AM

    Helpful Inofrmation. :)

     



  • 5.  RE: Block Songs Ext

    Posted Oct 07, 2012 09:23 AM


  • 6.  RE: Block Songs Ext

    Trusted Advisor
    Posted Oct 07, 2012 01:53 PM

     

    Hello,

    Please check these threads - 

    https://www-secure.symantec.com/connect/forums/how-block-mp3-extension

    https://www-secure.symantec.com/connect/forums/block-extension-mp3-flv-mp4-etc

    Also, Check this Article as well

    How to use Symantec Endpoint Protection to block or log legitimate but unauthorized software usage

     
    I hope it will help you.


  • 7.  RE: Block Songs Ext

    Broadcom Employee
    Posted Oct 08, 2012 03:33 AM

    Hi,

    The best way to use SEP to block unwanted software is to block the main .EXE of the program. To confirm you always block the correct file you will want to make an MD5 hash of that file.

    NOTE: When a program is updated to a new version a new MD5 will need to be created and added, additionally you will need to make MD5s for all versions of the .EXE that may be in use.

    Generate an MD5 hash:

    There are many different ways to generate an MD5 hash, here are two of the easiest methods:

    You may submit a file to http://www.threatexpert.com and the generated report will contain the hash value. This report will be emailed to your chosen email address and made available on the site.

    Microsoft has a freely available utility called the File Checksum Integrity Verifier.
    The utility is discussed in great detail in Microsoft's KB 841290.
    http://support.microsoft.com/kb/841290