Endpoint Protection

 View Only
Expand all | Collapse all

SEPv11 - DoS from IPS logs after upgrading clients to RU6

Migration User

Migration UserMay 17, 2010 10:31 AM

Migration User

Migration UserAug 03, 2010 05:36 AM

Migration User

Migration UserAug 03, 2010 10:35 AM

Migration User

Migration UserAug 03, 2010 11:57 AM

Migration User

Migration UserAug 17, 2010 05:05 AM

ℬrίαη

ℬrίαηNov 27, 2010 12:03 AM

  • 1.  SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 14, 2010 10:41 PM
    Anyone else notice DoS messages "Denial of Service "UDP Flood Attack" attack detected. Description: An excessive number of User Datagram Protocol (UDP) packets are being generated on this computer causing 100% CPU utilization"

    This started after I started upgrading clients from RU5 to RU6. The details show the traffic to be inbound from our internal DNS servers. Is it possible that RU6 introduced a change to cause a false positive or maybe RU 5 DoS protection wasn't working correctly. As crazy as it may sound this message doesnt appear until I upgrade to RU6.


  • 2.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 15, 2010 05:06 AM
    We haven't seen or heard of that from both our internal and external beta customers.

    Can you easily reproduce?


  • 3.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 15, 2010 06:19 AM

    Attach the Logs. So that we can understand

    Regards...
    Ramji Iyyer



  • 4.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 15, 2010 08:17 AM
    Yes, I saw this as well immediately after upgrading to RU6 on one of my test boxes. Traffic from two different machines in remote locations were blocked. One machine was not even on at the time, the other was on. The machine that was on had been infected with Conficker (not anymore though)

    As I take a look at the logs, I can see a reference to W32.Downadup.B, C in there so I'm guessing it has something to do with those being infected at some point in the past. I can only speculate as to why a machine that was already turned off would be blocked. I would attach logs but I don't see an export button in the particular log view (Client Management Logs - Security Log)


  • 5.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 15, 2010 04:00 PM
    Which logs do you want me to attach? i've got a case open with Symantec as well.


  • 6.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 16, 2010 12:34 AM
    Can you post your case number? This is an issue that we definitely want to follow up on. Is it possible that you could post some steps to get this to easily reproduce the issue so we can replicate it in our tests boxes? So far I have been unable to do so.

    Thanks
    Grant


  • 7.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 16, 2010 10:21 AM
    Case number 411-949-901. I was out of my office yesterday so I missed the call from support. I'm following up with them today. I will need to get a system experiencing this issue to try and reproduce it. What's interesting is that I've upgraded XP, and Win 7 (x86, x64) clients to RU6 and so far only the XP clients are triggering this IPS detection. All are using the same shared IPS policy.


  • 8.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 16, 2010 01:50 PM
    Symantec support confirmed that the DoS protection was not working properly in RU5. RU6 resolved this issue and explains why we began seeing this issue. Resolution is to add our DNS servers to the host exclusion list and/or find out why these systems are receiving too many UDP packets from our DNS servers.


  • 9.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 17, 2010 06:10 PM
    I appreciate you coming back and letting us know. Very helpful for future users : )

    Grant-


  • 10.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 22, 2010 01:59 PM
    Please post any additional information regarding this issue.  Can threshholds be listed in this forum to know what we have to change on our DNS servers?  This will help to determine if we should focus on a DNS fix or just create an exception for our DNS servers.

    Anyone who reads this and comes up with a solution besides adding exceptions, please reply!


  • 11.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 22, 2010 02:30 PM
    Adding our DNS server IP's to the host exclusion for IPS stopped the issue internally but we started seeing the same issue for users at home. We use a different IPS policy for the home location and there's no way we can keep up with everyones home DNS/Gateway IP address. The home users are having their router detected as the DoS.

    We are looking at turning this feature off until we know why these DoS are occuring at home and on the corporate network.

    One of our testers noticed this happened when he had a Windows 7 system and was using XP mode although not all of our testers are using Windows 7.


  • 12.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 26, 2010 02:44 AM
    Same issue here:

    Denial of Service "UDP Flood Attack" attack detected.
    Description:
     An excessive number of User Datagram Protocol (UDP) packets are being generated on this computer causing 100% CPU utilization.
    On a XP SP3 machine when surfing to a Belgian newssite (www.standaard.be) with google chrome.
    Occured after migrating towards RU6.


  • 13.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 26, 2010 06:49 AM
    I had a policy applied to all 260 domain controllers that essentially disabled IPS (all boxes were unchecked) however after the servers rebooted Sunday morning following their WSUS updates, all 260 server's DNS server service failed to start which caused considerable headaches this morning....

    With the Firewall, withdrawing the policy disables the firewall completely, does the same apply for IPS? Only I was under the impression that you need to apply an IPS policy with nothing ticked in order to disable that componant? Nothing like a bit of regularity in a product huh!!


  • 14.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 26, 2010 10:50 AM
    It definitly sounds like we have a bug or issue with DoS and RU6. I was originally told by support that DoS detection didn't work correctly in RU5 but was fixed in RU6... I'm not so sure now...


  • 15.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 26, 2010 11:07 AM
    I'm seeing this issue on a Windows 7 64-bit machine (unmanaged) with RU6 as well, never saw it on RU5.  I can't imagine that all our DNS servers are sending excessive UDP packets and that this new behavior is a "fixed" version of IPS in RU6.  I'm only getting the DoS warning from DNS servers, nothing else.

    I'm also seeing a lot of blocked IPv6 traffic in the firewall log, probably due to broadcast traffic in Windows 7.  Even when I disable the two default IPv6 rules it still reports blocked traffic.  If I disable IPv6 on the adapters it looks OK, but again I never had to do this in RU5.

    What's the story here?


  • 16.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 26, 2010 07:23 PM

    I am very careful with the IPS policy setting that blocks an "attackers" IP address for X amount of seconds.
    Seems like a perfect way to block all of your critical servers if there is a false positive.

    That setting to me has too much associated risk for server based systems.
    In an outside network location I have it enabled but interally it is turned off by default.

    Z



  • 17.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 27, 2010 04:19 AM
      |   view attached

    I have the same issue with the ru6. I've attached the security log.

    Attachment(s)

    txt
    Security Log.txt   1 KB 1 version


  • 18.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 29, 2010 01:46 AM
    Still no feedback from Symantec? Excluding one or another IP-address isn't a real solution in my opinion.


  • 19.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 29, 2010 08:58 AM

    Does anyone have any idea of the threshold of UDP packets that causes this to be triggered¿¿¿¿¿  I've contacted Symantec Support and they couldn't answer this!  All they wanted to do was connect to my computer to see the pop-ups!

    I need some idea of how to adjust this one DoS Attack instead of unchecking the box to turn off all DoS attacks.  Any assistance would be GREATLY appreciated.



  • 20.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 29, 2010 09:45 AM
    This has also been confirmed in RU6a.  If anyone needs it, I have a case number of 412-090-904.

    Any additional information on this is stil appreciated!


  • 21.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 29, 2010 10:55 PM
    Is it possible to remove the "solved" designation on this thread?  It's clearly not solved since it looks like we have a bug.

    RU6a only looks to address a migration issue and the reported problem with the Java console.


  • 22.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 30, 2010 04:02 AM
    I've done a wireshark trace and noticed that when a site does lots of DNS requests in a short time (here 18 DNS request in 1,5s) the DOS feature of SEP comes in.
    So I suppose Symantec should increase the number of requests/sec before potential DOS is detected or we should have the possibility to control this value ourselves through the console.



  • 23.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 30, 2010 07:21 AM

    So it sounds like for now, DoS protection should be disabled ?? or a host exclusion list put in place ?


  • 24.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 30, 2010 10:46 AM
    Host exclusion will only work internally as soon a laptop goes out to the rest of the world, the host exclusion is useless,
    We can't disable DOS protection because of this new feature 
    This feature needs to be looked at and fixed by Symantec prior to us rolling ru6a


  • 25.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Apr 30, 2010 01:27 PM

    I'm checking with Security Response to see if they have any info.

    Thanks for your patience.


  • 26.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 01, 2010 01:12 AM

    I'm getting this even plugged into a Linksys router at home, certianly my laptop shouldn't be doing enough DNS requests to trigger this, seems like the threshold for the new IPS is set way too low.


  • 27.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 01, 2010 09:13 AM
    This seems to be happening a lot when computers go off their corporate network and seems like a bigg issue with Comcast DNS servers. How many are experiencing it on their corporate network?

    Granted, it's an issue but seems to happen more so off network than on.


  • 28.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 01, 2010 01:26 PM
    Like I mentioned before we started seeing this on our corporate network and then our home users started complaining about similar issues. After looking at the logs I was finding users home gateways/routers being blocked because they act as their DNS server.

    This is a big issue in my opinion and needs to be patched asap.


  • 29.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 02, 2010 01:40 AM

    Agreed, while we can set policy as a work-around for in office use, once they're outside the corporate network it's just not realistic to handle it this way.  I've had to disable IPS entirely, not what I wanted to do but the only option until a patch is released.  I just don't understand how this wasn't found during testing, did no one take a laptop with RU6 on it home?


  • 30.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 03, 2010 11:28 AM
    You may want to leave your IPS on, but disable the Denial of Service Detection.  This is a check box in the IPS settings.


  • 31.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 03, 2010 11:31 AM
    I have gotten information from a Symantec source that the threshold is set to 15.  This is definitely a low setting.

    Also, I notice that Internet Explorer seems to have less DNS traffic than Firefox or Chrome (at least in our environment).


  • 32.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 03, 2010 11:32 AM
    I agree. You can disable this feature while leaving IPS enabled for the other protections. In my opinion the DoS detection feature based on thresholds offers very little value


  • 33.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 03, 2010 12:15 PM
    I hope this link works.  I've entered a suggestion in the Symantec Ideas site.  Please vote on this so that it will get a higher visibility and be addressed.

    https://www-secure.symantec.com/connect/idea/increase-denial-service-udp-flood-attack-threshold-0


  • 34.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 03, 2010 01:57 PM
    DoS was working as designed in RU5. I got that straight from support and development. I've had two cases open for over a month, they were just closed due to "working as designed".
    Cass was helping me - cases 320-239-573 and 411-752-839
    What was happening - servers were reporting DoS attacks from our own computers, more specifically, this was happening constantly with DCs.
    I had the "block traffic for xxxx" TURNED OFF. Found out that SEP STILL blocks ALL pings of all sorts from all sources for several seconds REGARDLESS of if that's enabled or not. It was enabled and folks couldn't even get logged in and policies would not apply, etc. - because XP machines PING the DCs several times, and if they can't ping, you have trouble. 10 minutes was a huge amount of time, so I decided to uncheck that and have it not block at all.
    That's when I learned that it will block regardless of that setting, for roughly 15 seconds or so. When it sees a DoS it blocks ALL pings, period. I could prove it by setting up two computers with a ping -t dcaddress and monitor. Every so often, the pings would drop for like 5 or 6 tries. When I checked in wireshark, there was a large number of FRAGMENTED packets and pings coming through in like 1 second. Most from a single computer, but when that combined with similar pings from other computers within that 1 seconds, SEP reacted blocking traffic for several "pings" and I saw the pings drop from both of my test computers.
    So the solution - move the DCs into a sub-group and disable DoS detection. I still run full IPS, but uncheck DoS detections.
    We've been ok since that time.
    Symantec if you need to post info from the above cases, feel free to do so, just remove names if you would.
    Otherwise if my case info is helpful to anyone, feel free to share it.

    LOL - as a government agency, even my salary is public record  ;-)

    15 detections in 1 second, any source - it blocks for several seconds - EVEN WITH that 10 minute block feature NOT checked. Check how XP uses pings to check domain speeds, gets policies, etc. and you'll see what I went through.

    BTW - Cass is a super tech to work with!!!!!!!! He was always helpful, patient, and did everything he could to get me information.


  • 35.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 03, 2010 04:46 PM
    I just read another post that someone working with Symantec support stated Symantec will release a new IPS signature to fix this in a few days. The user said Symantec acknowledged that the IPS signature is applied differently in RU6 compared to RU5.

    Anyways, I thought this was interesting since I was first told that DoS was not working in RU5 and was fixed in RU6. This came from Symantec support. I also experienced strange ping issues after upgrading to RU6 and had to move my ping firewall rules to the top.


  • 36.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 03, 2010 04:56 PM
    Interesting in that it was working fine in RU5, at least "as designed" as confirmed by weeks of testing here.
    So far I've seen no ill effects on IPS for having move to RU6 for some testing.
    All quiet so far.


  • 37.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 04, 2010 08:12 AM
    We have found that the DNS prefetching of most browsers can cause this trigger\threshold to be met more often than not.  By disabling DNS prefetching in web browsers, this alert is almost non-existent.

    Feel free to try this as a solution to help your environment if you like, otherwise, we'll continue to wait for Symantec.


  • 38.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 04, 2010 08:28 AM
    Uh, guess I've never seen nor heard of that in a browser.......... I sure have never seen such settings in what I use anyway.
    Our issue with RU5 had zero to do with browsing. The computer was just sitting there and it blocked pings and traffic.


  • 39.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 04, 2010 08:34 AM
    Hi ShadowsPapa,

    That sounds like a separate issue.  I'd recommend checking the SEP traffic logs on the actual client machine (not from the SEPM) to see what may be blocking the pings and traffic.  If you see one of the strangely-named "GUI%GUICONFIG#" rules, then it's something set locally on that machine (probably through a simple checkbox in SEP).

    Hope this helps!


  • 40.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 04, 2010 08:53 AM

    No, it was confirmed from external sources. SEP's DOS was blocking things - the DCs receive hundreds of pings from the clients constantly. Some of the traffic was fragmented (we're not sure what's going on there!) and it was confirmed - and Cass had us turn DoS detection off on the DCs and life is better now.
    We spent weeks diagnosing, with many dozens of tests and wireshark captures from clients, DCs, even ASAs.
    RU5 blocks traffic any time it senses a threat, even if the active response is disabled. Cass confirmed with development - this is a known thing.

    It was indeed RU5, and DoS detection doing it, and it was triggered by clients contacting the server.

    We've had NO issues with web browsing at all from any SEP version, including RU6a, which I use and have seen no issues with at all to this point. Running on a few servers, including the domain controllers and my own computers, and about a dozen clients - no issues with RU6. However, I don't think I'll turn DoS back on on those DCs as it will block traffic when clients start to turn on and log in and contact the DCs



  • 41.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 04, 2010 10:06 AM
    I missed the part about the issue being from the DC end.  I was thinking pings, etc. were being blocked on the client side.


  • 42.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 05, 2010 03:32 PM
    We are working on fixing this issue.  If anyone is having this issue in SEP 11 RU6 we recommend disabling the Denial of Service (DoS) feature.  You can disable the DoS feature from on the Intrusion Prevention policy on SEPM.  Disabling this feature will stop these events from occurring.


  • 43.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 06, 2010 03:24 PM
    Have customers that we are holding off on due to this issue.  6b soon?


  • 44.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 11, 2010 06:20 PM
    i do no so mach, bat. i use in the new .net framework ver. 4
    mybe this is Cause for that to hapen

    sori for my bad english!



  • 45.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 12, 2010 09:32 AM
    My user is getting this error too. Please advise when is the solution will release?




  • 46.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 14, 2010 03:27 AM

    And does anybody know if its possible to do the workaround fix, through a registry setting?


  • 47.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 14, 2010 07:58 AM
    Hi MPRS,

    I don't know of a registry entry currently, but one of the following options should be fairly ok to use until then.  Hope this helps!
    • Disable Denial of Service Detection (only this option, not the entire Network Threat Protection)
    • Disable DNS Prefetching through your web browser (since this seems to be the biggest cause of the DoS alerts for now, but I'm sure it's probably not the only cause).


  • 48.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 14, 2010 09:13 AM

    Yes I also confirm this problem as well.

    I found out that when using my Wireless LAN at home, SEP block the internet connection (black list the modem IP address due to DDoS !??!?!)

    has anyone face the same problem here as well ?

    This is confirmed under:
    Windows 7 Pro and XP Pro as well.


  • 49.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 17, 2010 07:50 AM
    I'd like to know where DNS prefetching is - it's not in any of our browser options........... I can't find it anywhere.


  • 50.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 17, 2010 10:10 AM

    I just had my first user complain about the DoS errors when connecting to his home Linksys router. I created a temp group and disabled the DoS protection. I am wondering what is the status of the fix? Also, this is a problem with the client not the SEPM correct? My thinking is...

    Keep the RU6 SEPM, and roll the user client back to RU5, if the user is having issues. This would keep the DoS protection running.

    Thanks,
    Mike



  • 51.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 17, 2010 10:14 AM
    Which browser are you currently using?  Chrome provides a check box (very nice of them).  Firefox makes you add in an additional boolean setting.


  • 52.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 17, 2010 10:19 AM
    Chrome is banned here due to many other Google hijinks. Nothing "google" is allowed for several reasons, not the least of which is privacy and security reasons.

    Firefox is used only by IT.

    "The masses" use IE for compatability with the inhouse and other apps and such..........
    There is no such setting in IE that I can see.


  • 53.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 17, 2010 10:31 AM
    Can versions be rolled back?


  • 54.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 17, 2010 12:44 PM

    @thatdude,

    I meant uninstalled. So, uninstall RU6 client, push out RU5 client.

    Mike



  • 55.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 17, 2010 01:04 PM
    Ok thanks. It would be nice if we could do a version roll back from the console for things like this. It would make deployment of new version go quicker if it could be rolled back easily when a problem is found


  • 56.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 18, 2010 04:21 PM
    I opened a case with Symantec when we started seeing this on campus.
    I was told it couldn't be a false positive unless our DNS server had extremely low latency because after te initial DNS response there would have to be 10 more DNS responses within 100ms to trigger it. They said this would be impossible unless our DNS servers had less than 5ms latency. This contradicts what others have been told on the trigger level I believe.

    Found that a web page like www.nytimes.com or www.thestar.ca both reference content on more than 10 hosts on the one page alone so unless I am misunderstanding, simply visiting that page will do more than 10 DNS lookups and since our DNS servers are on campus and have less than 1ms latency.

    They asked me to send them network traces to confirm it was a false positive. I declined.

    I happened to send an FYI note to my Symantec rep and copied his technical guy and got an email back on short order that indicated "known problem in RU6 and fixed in RU6 MP1"

    Does anyone else feel like they are just wasting their time with Symantec and especially with Symantec support?


  • 57.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 18, 2010 11:11 PM
    I was probably one of the first ones to open a case regarding this issue. Symantec asked me for traces but I could never obtain any. That being said I dont feel im wasting my time with Symantec support but I would like to get a straight answer and an acknowledgment that this is a ISSUE and a fix will be released.


  • 58.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 31, 2010 03:45 AM
    Still not solved apparently. For me it's strange it takes such a long time to get a solution or at least a valid response from symantec.
    Disabling DOS is a workaround but not really a solution I think.


  • 59.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Jun 29, 2010 02:29 PM
    Just stood up a new SEPM with RU6A.  Problem is still rearing its ugly head.  Can't be that tough of a fix.  Can you say LiveUpdate?


  • 60.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Jul 26, 2010 02:47 PM

    I also confirm that using RU6a on a windows 7 64bit (Server 2008R2) machine unmanaged will produce this error consistantly.  I see it every so often when using FF but 100% of the time using chrome.

    stops internet traffic until you close the browser and reopen.


  • 61.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Jul 26, 2010 02:48 PM

    I also confirm that using RU6a on a windows 7 64bit (Server 2008R2) machine unmanaged will produce this error consistantly.  I see it every so often when using FF but 100% of the time using chrome.

    stops internet traffic until you close the browser and reopen.


  • 62.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Aug 03, 2010 05:36 AM

    Is there any update on the status of this problem?


  • 63.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Aug 03, 2010 10:20 AM
    I think were all waiting for SEPv11 RU6 MP1 to be released.


  • 64.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Aug 03, 2010 10:35 AM
    soon, very soon...



  • 65.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Aug 03, 2010 11:57 AM
    Define soon  :)


  • 66.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Aug 03, 2010 09:04 PM
    meanwhile the service can be stop manually (right click on the system tray icon assuming the policy is allowed) while at home to prevent unnecessary browsing disturbance :-|


  • 67.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Aug 17, 2010 05:05 AM



  • 68.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Aug 17, 2010 09:51 AM
    According to this thread (https://www-secure.symantec.com/connect/forums/endpoint-1106-false-denial-service-attacks-dns-servers).  It looks like RU6 MP1 hits this week!


  • 69.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Oct 14, 2010 06:30 PM

    Any reason why the updated bits are not available for regular downloading? My company has not decided if they want to upgrade or not, but I would like to download the update and patch my own system.

     

    TrevorK



  • 70.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Nov 26, 2010 11:57 PM

    Well I suppose this problem has been fixed already in the MR6 MP1.

    Has anyone still got problem with the latest version ?



  • 71.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Nov 27, 2010 12:03 AM

    It's fixed in RU6 MP1



  • 72.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Nov 30, 2010 09:00 AM

    we see something similar with an IT user is trying to remotely add a printer to another user's pc.  

    steps to reproduce:

    windows explorer - \\machinename - view remote printers - add a printer

    -add local printer - standard TCP/IP port - enter printer dns name

    at this point, it will usually fail to resolve the printer and get pop-up that traffic to the printer is now being blocked b/c of DOS.  

    Windows 7 32x, occurs on both 11.06a and 11.06mp1.  IPS working as designed?



  • 73.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted May 12, 2011 10:14 AM

    What is the version number of R6 MP1?  I have unmanaged at home with version 11.0.6000.550 installed.  This is a Windows 7 64bit machine and every time I open Firefox I get a DoS attack blocked by Symantec.

     



  • 74.  RE: SEPv11 - DoS from IPS logs after upgrading clients to RU6

    Posted Aug 26, 2011 03:07 PM

    Reports of a machine that can be online for a short while then taken offline because of Denial of Service attack from the default gateway.  Our dd-wrt SOHO firewall does not have any port forwarding of any kind enabled.  UPnP is disabled.  DMZ is disabled.  So was their a recent regression?

     

    Win7 64bit TabletPC