Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Regarding adding process rgtpt.exe in exclusion list

Created: 02 Apr 2013 | 15 comments

I am trying to add a process rgtpt.exe in centralized exception list in SEPM 11.0 conosle.

After adding the process as Truscan proactive threat scan, it is showig as action LOG only.

Due to this a huge traffic is generating for SEPM. I have tried to edit it, but I am not getting the option for IGNORE.

Could someone suggest me for this.

Comments 15 CommentsJump to latest comment

.Brian's picture

In your Exception policy, go to Add >> Windows Exceptions >> Application

A new windows will come up and you can search for this .EXE. Highlight the name, and under Action, set it to "Ignore". Click OK and OK again to save the policy

Please click the "Mark as solution" link at bottom left on the post that best answers your question. This will benefit admins looking for a solution to the same problem.

Kumar K's picture

THanks Brian,

Sorry, In our organization, we have SEPM 11 version.

The options you have mentioned are for SEPM 12.1.

Regards

KK

.Brian's picture

Sorry.

Go into your Exception policy

Click Add >> Windows Exceptions >> Truscan Proactive Threat Scan Exceptions >> Detect Processes

Highlight exe and set the Action to Ignore

Click OK twice to save

Please click the "Mark as solution" link at bottom left on the post that best answers your question. This will benefit admins looking for a solution to the same problem.

Mithun Sanghavi's picture

Hello,

In case of SEPM 11.x, Try to enable Network Application Monitoring:

  1. Login to the manager and go to Clients
  2. Choose the group and Select the Policies tab
  3. Under Policies Click Network Application Monitoring
  4. Check the box that says, "Enable Network Application Monitoring."
  5. From here, you can set the default policy when Endpoint Protection detects changes in an executable. Choose between Ask, Block the Traffic, or Allow and Log.

Creating Centralized Exceptions Policies in the Symantec Endpoint Protection Manager 11

http://www.symantec.com/docs/TECH104326

How to set up learned applications in the Symantec Endpoint Protection Manager

http://www.symantec.com/docs/TECH102994

In case of SEPM 12.1Creating an Exception for an Application

  1. Login to the Symantec Endpoint Protection Manager (SEPM) and go to the Policies page.
  2. On the Exceptions Policy page, click Exceptions.
  3. Click Add > Windows Exceptions > Application.
  4. In the View drop-down list, select All, Watched Applications, or User-allowed Applications.
  5. Select the applications for which you want to create an exception.
  6. In the Action drop-down box, select Ignore, or Log only.
  7. Click OK.

Reference: 

How to create an application exception in the Symantec Endpoint Protection Manager

http://www.symantec.com/docs/HOWTO61213

Creating exceptions for Symantec Endpoint Protection

http://www.symantec.com/docs/HOWTO80919

Hope that helps!!

Mithun Sanghavi
Senior Consultant
MIM | MCSA | MCTS | STS | SSE | SSE+ | ITIL v3

Don't forget to mark your thread as 'SOLVED' with the answer that best helped you.

Rafeeq's picture

If you pull the detected applications you can select that and add to centrallized exception

When a proactive threat scan on the client computer logs the detection, the detection becomes part of a list of known processes. You can select from the list when you create an exception for proactive threat scans. You can set a particular action for the detection. You can also use the proactive detection log under the Monitors tab in the console to create the exception.

Kumar K's picture

Hi Rafeeq and Brian,

I have tried to add the process from dectected process list. For each machine, this application is generating a different hash algorithm or File finger print. and In our organization we have 35K clients machines, so unable to do so.

Mithum,

Sorry, Network application is not enable to in our organization.

Any other suggestions friends

Regards

KK

Mithun Sanghavi's picture

Hello,

If the File being detected by Symantec Endpoint Protection, check these Articles:

About managing false positives detected by TruScan proactive threat scans

 
Again, Before you contact Symantec Tech Support, We would recommend you to submit the Files to the Symantec Security Response Team.
 

You would have to Submit the Files to the Symantec Response Team on  the Following Sites:

https://submit.symantec.com/false_positive/

https://submit.symantec.com/essential

http://www.threatexpert.com/submit.aspx

Note: ThreatExpert is owned by Symantec.

Hope that helps!!

Mithun Sanghavi
Senior Consultant
MIM | MCSA | MCTS | STS | SSE | SSE+ | ITIL v3

Don't forget to mark your thread as 'SOLVED' with the answer that best helped you.

.Brian's picture

If you add as an exception from the TruScan PTP Detected Process list, than you immediately can can set a specific action (Log Only, Ignore, Quarantine, Terminate)

If you add as a Process exception (by .exe name), than the Action is set for you as "Log Only" and you don't have the ability to change.

Configuring an exception to force TruScan proactive threat scans to detect a process

Article:HOWTO27304  |  Created: 2010-01-08  |  Updated: 2010-01-15  |  Article URL http://www.symantec.com/docs/HOWTO27304

By following the above, once you create the exception, it will than show up in the list after some time. You will than need to go back into the list of detected processes and add the exception. Than you will have the option to "ignore" You will need to do this each time the hash changes and add the necessary exception.

Please click the "Mark as solution" link at bottom left on the post that best answers your question. This will benefit admins looking for a solution to the same problem.

Kumar K's picture

Hi Mithun,

It's an inhouse application built within  the organization.

I don't think, submitting a sample file to SRT will help me.

I am explaining it once again, where i am stucking,

In SEPM Console

Policie -> Centralized Excpetions -> Selec the sepecific policy where exlcusion need to be apply -> Edit the Policies -> windows -> Truscan Threat Protection  -> process -> type the name of the process rgtpt -> click ok

after that i am geting the action as Log only. There should be other options also like ignore terminate etc

If I am right

Regards

KK

.Brian's picture

When you add it by .exe name, Log Only will be the only option available. This is so SEP can detect it and add it to the Detected Processes list.

Once it shows up in the Detected Processes List, than you can add the exception and have the ability to change the Action.

It is a two-part process.

Every time the hash changes, an exception will need to be added. Since it is hash based, this is how it will need to work. The hash changing indicates the file changed in some way so PTP will catch it.

Please click the "Mark as solution" link at bottom left on the post that best answers your question. This will benefit admins looking for a solution to the same problem.

Mithun Sanghavi's picture

Hello,

For software developers, authors, and Independent Software Vendors (ISVs), the Symantec Software White-List program offers an opportunity to have their software added to a white-list of known good software maintained by Symantec to reduce the possibility of false positives.  Please note that Symantec offers this service to reduce false positives, but cannot guarantee that false positives will not occur.  Decisions made by Symantec are also subject to change depending on a variety of factors that include but are not limited to alterations in the software, distribution of the software, or vulnerabilities in the software to misuse by the publisher or others. Symantec may also change its classification criteria and policies over time to address the constantly evolving security landscape.  To submit software to participate in this program, please submit the candidate software to Symantec using the Software White-Listing Request form.

Software White-Listing Request Formhttps://submit.symantec.com/whitelist/

Note: If an application for white-listing is approved it can take a number of weeks for the software in question to be white-listed.  The applicant will be notified after the white-listing process for that software is completed.  The applicant will be notified if the application is not approved.

Check this Article:

Software developer would like to add his/her software to the Symantec White-List.

http://www.symantec.com/docs/TECH132220

In your case there are 3 things you could do- 

1) Report a Suspected Erroneous Detection and Report a Suspected Erroneous Detection (False Positive)

Your selections:

• Detection occurred: While using an application

• Using product: Symantec Endpoint Protection 11.x or Symantec AntiVirus Corporate Edition

• Type of detection: SONAR (Behavioral Heuristics Detection)

2) Sign your files with Class-3 digital certificates (X.509) from a Certificate Authority if you need to publish softwares/files.

3) Also participate in white-listing program if needed http://www.symantec.com/docs/TECH132220

Hope that helps!!!

Mithun Sanghavi
Senior Consultant
MIM | MCSA | MCTS | STS | SSE | SSE+ | ITIL v3

Don't forget to mark your thread as 'SOLVED' with the answer that best helped you.

Kumar K's picture

Thanks Brian,

It means I have to do it for all 35K machine.

What if I add the process as a file, with complete path.

Does PTP still scan this file.

Regards

KK

.Brian's picture

In 11.x, you can only add by process name. It will not take a directory exclusion.

In 12.1, you can add a directory to be excluded from SONAR scanning (SONAR replaces TruScan in 12.1)

My question is, how can the hash be different for 35k users? That is a lot of different versions of the software...

Please click the "Mark as solution" link at bottom left on the post that best answers your question. This will benefit admins looking for a solution to the same problem.

Kumar K's picture

Thanks Brian,

I don't know, why this application is generating different hash for each machine.

As per my knowledage, there should be only two or three hases maximum for an application.

Thanks Mithum,

I will contact SRT team.

Regards

KK

.Brian's picture

Correct. Each version should have a different hash, but 35k is a bit much wink

Please click the "Mark as solution" link at bottom left on the post that best answers your question. This will benefit admins looking for a solution to the same problem.