Endpoint Protection

 View Only
  • 1.  How sepp works: or not

    Posted Mar 09, 2010 12:30 PM
    Hi,
    Can anybody elaborate on the internal workings of sepp? We see more and more infections by the Backdoor.Trojan at customers all over the country. Sepp lacks the ability to scan and delete the virus as it is copied to multiple (32) different locations on the computer. Its only detected after is had the opportunity to run itself and copy itself to other parts of the computer.

    We also have difficulty finding the source of the infection. As the files are found in the IE cache among other places I suspect social networking sites that are not blocked by the firewall.

    One customer had installed a free AVG scanner instead of SEPP, wich did catch the virus and deleted it before it got copied all over the place. I installed the full product on all clients, applied the SBS 2003 policies from this site but still virusses can install itself without many counterforce of SEPP. Even more inconvienient is   the fact that SEPP cannot fully delete the bugger, even after system restore is disabled and a scan in safe mode gave the big OK after deleting even more virusses.

    QUESTIONS
    1. I want to know how the trojan manages to get on the computer. this is a questions for my peers, if they also suspect netlog and facebook spreading the stuff. although I do not know how.
    2. how does sepp handle these files once being 'downloaded' or opened on that site, and why it can get around sepp so easily
    3. It seems Sepp is unable to delete any recent threat without rebooting in safe mode and scanning there. Do you guys have the same experience. You really cant expect IT admins walking around SMB's kicking users of machines, reboting in safe mode, and scan the cmputer for an hour or two...
    4. A request for the Security response write-up team. It would help a great deal if the technical papers also include possible infection sources like, sites or emaildomains etc, surely symantec know where there coming from
    5. A request for the developers. Try cathing the buggers before the get written to disk and can execute itself. Try harder removing the threat like free AV products do!

    Any shared experience much appreviated, I need some reassurance SEPP is a good endpoint product, and that the trouble we experience is soon over :)


  • 2.  RE: How sepp works: or not

    Posted Mar 09, 2010 12:33 PM

    Title: 'Best practices for responding to active threats on a network'
    Document ID: 2010011510455048
    > Web URL: http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2010011510455048?Open&seg=ent


    Title: 'Does Symantec Endpoint Protection protect me from fake anti-virus programs?'
    Document ID: 2010020116202748
    > Web URL: http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2010020116202748?Open&seg=ent



  • 3.  RE: How sepp works: or not

    Posted Mar 09, 2010 01:12 PM

    Security Response recommendations for Symantec Endpoint Protection settings

    http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2010020308592948

    Title: 'Scanning a file with a competitor's antivirus program detects a virus, but scanning with Symantec AntiVirus or Symantec Endpoint Protection does not'

    Document ID: 2000100610314948

    > Web URL: http://service1.symantec.com/support/ent-security.nsf/docid/2000100610314948?Open&seg=ent