Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Block Songs Ext

Created: 07 Oct 2012 • Updated: 07 Oct 2012 | 6 comments
This issue has been solved. See solution.

As i have seen a lot of unwanted mp3 songs and video songs found in systems. So i want to block to copy/play the same?

Any policy to do this change?

Comments 6 CommentsJump to latest comment

honey_jack's picture

Find the attach download which can help to disable the Extension. Eg- .mp3 , .mp4

https://www-secure.symantec.com/connect/downloads/block-access-extension-mp3-mp4-mpg-mpeg-flv

Use the link and disable all type of extension

Thanks & Regard

Honey Jack

If your issue has been solved, please use the "Mark as Solution" for the valid thread.

SOLUTION
Ashish-Sharma's picture

HI,

You can use ADC

Best Practices for Deploying Symantec Endpoint Protection's Application and Device Control Policies

 http://www.symantec.com/docs/TECH181679

Symantec Endpoint Protection Manager - Application and Device Control - Policies explained

http://www.symantec.com/docs/TECH104431

https://www-secure.symantec.com/connect/downloads/block-access-extension-mp3-mp4-mpg-mpeg-flv

Thanks In Advance

Ashish Sharma

.Brian's picture

You can also use the custom IPS feature. See this doc:

https://www-secure.symantec.com/connect/sites/default/files/Steps_to_create_a_custom_IDS_signature_0.pdf

Please click the "Mark as solution" link at bottom left on the post that best answers your question. This will benefit admins looking for a solution to the same problem.

Mithun Sanghavi's picture

Hello,

Please check these threads - 

https://www-secure.symantec.com/connect/forums/how-block-mp3-extension

https://www-secure.symantec.com/connect/forums/block-extension-mp3-flv-mp4-etc

Also, Check this Article as well

How to use Symantec Endpoint Protection to block or log legitimate but unauthorized software usage

 
I hope it will help you.

Mithun Sanghavi
Senior Consultant
MIM | MCSA | MCTS | STS | SSE | SSE+ | ITIL v3

Don't forget to mark your thread as 'SOLVED' with the answer that best helped you.

Chetan Savade's picture

Hi,

The best way to use SEP to block unwanted software is to block the main .EXE of the program. To confirm you always block the correct file you will want to make an MD5 hash of that file.

NOTE: When a program is updated to a new version a new MD5 will need to be created and added, additionally you will need to make MD5s for all versions of the .EXE that may be in use.

Generate an MD5 hash:

There are many different ways to generate an MD5 hash, here are two of the easiest methods:

You may submit a file to http://www.threatexpert.com and the generated report will contain the hash value. This report will be emailed to your chosen email address and made available on the site.

Microsoft has a freely available utility called the File Checksum Integrity Verifier.
The utility is discussed in great detail in Microsoft's KB 841290.
http://support.microsoft.com/kb/841290

Chetan Savade
Sr.Technical Support Engineer, Endpoint Security
Enterprise Technical Support
CCNA | CCNP | MCSE | SCTS |

Don't forget to mark your thread as 'SOLVED' with the answer that best helps you.<