Endpoint Protection

 View Only
Expand all | Collapse all

Understanding Insight

Migration User

Migration UserJan 22, 2012 10:04 AM

pete

peteJan 23, 2012 07:25 AMBest Answer

  • 1.  Understanding Insight

    Posted Jan 22, 2012 02:11 AM

    Hi Team,

     

    1. As I understand when fisrt time Scheduled/Manual scan strarts it connect to Symantec Reputation data and upload all hash (MD5) entries of all files, and during second or every scan it will again connect to Symantec Reputation data, verify all entries and scan only those files which are modified. Please correct me If am wrong anywhere.

     

    2. During each scanning when SEP clients connect to reputation data then how much bandwidth will be utilized.

     

    3. Does SEP store any information data of all MD5 entries into the same systems to verify and skipped files during scanning or SEP needed Internet connectivity to verify all MD5 entries from Symantec Reputation Data.

     

    4. What are the websites need to exclude from proxy so all clients can connect Symantec Reputation Data.

     

    5. Does Reputation Data verify all entries which are uploaded during my first scanned or it will only verify the known software files which are globally used in widows environment.

     

    6. I wanted to know what is the process behind insight technology.

     

    Note: The above query is not relates to Symantec Shared Insight Cache. And I need to understand how can we reduce the time of Schedule/Manual scanning to complete which takes long in SEP 11.x.

     

    Regards,

    M.R.



  • 2.  RE: Understanding Insight

    Posted Jan 22, 2012 10:04 AM

    Waiting response on above......



  • 3.  RE: Understanding Insight

    Posted Jan 22, 2012 08:54 PM


  • 4.  RE: Understanding Insight

    Posted Jan 22, 2012 10:40 PM

    The provided KB's not worth for my above queries......



  • 5.  RE: Understanding Insight

    Broadcom Employee
    Posted Jan 22, 2012 10:43 PM

    check these links

    Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec’s hundreds of millions of users to automatically discover and classify every single software file, good or bad, on the Internet. Based on advanced data mining techniques, Insight seeks out mutating code separating out risky, low-reputation files from those that are safe.

    To know more check this Whitepaper on Symantec Insight on 

    https://www-secure.symantec.com/connect/downloads/insight-deployment-best-practices-whitepaper

    Incase, you want to check the Symantec Download Insight, check this Video:

    https://www-secure.symantec.com/connect/videos/symantec-download-insight-symantec-endpoint-protection-121

    https://www-secure.symantec.com/connect/forums/insight-any-idea



  • 6.  RE: Understanding Insight

    Posted Jan 22, 2012 10:49 PM

    Thanks Pete for the info.

     

    Does Reputation Data verify all entries which are uploaded during my first scanned or it will only verify the known software files which are globally used in widows environment?



  • 7.  RE: Understanding Insight

    Broadcom Employee
    Posted Jan 22, 2012 11:11 PM

    it's only process exe's and binaries of unknown application. It could be any application, if we do not have any data , it will be submitted.

    \also check this link

    How does Insight Lookup work?

    http://www.symantec.com/business/support/index?page=content&id=TECH169282



  • 8.  RE: Understanding Insight

    Posted Jan 22, 2012 11:42 PM

    During every scan it will connect to reputation data and skipped highly trusted files?

     

    And how insight rate as low reputation bad files?



  • 9.  RE: Understanding Insight

    Broadcom Employee
    Posted Jan 22, 2012 11:54 PM

    During every scan it will connect to reputation data and skipped highly trusted files?

     Not necessarily, if there is new files that do not have reputation data  then yes it will submit the file.

    And how insight rate as low reputation bad files?

    The files which are checked by Symantec Security reposnse will tag the files with low reputation data or clean.



  • 10.  RE: Understanding Insight

    Posted Jan 23, 2012 01:39 AM

    Here I have cleared my some doubt about how scanning performance to get improve:

     

    When full scanning starts it compare the hash value of all files with definition signature and give a tag value to all and scan only those files which are modified. Please correct me.

    On every next scan If none of the files are modified but  here SEP will takes some to compare the hash values with definition. Please correct me.

     



  • 11.  RE: Understanding Insight

    Broadcom Employee
    Posted Jan 23, 2012 01:59 AM

    Not all files, only executables. If the files are trusted, it will not scan.



  • 12.  RE: Understanding Insight

    Posted Jan 23, 2012 02:33 AM

    You mean to say that all executable files will get compare with signature and  skipped If match right?



  • 13.  RE: Understanding Insight

    Broadcom Employee
    Posted Jan 23, 2012 02:44 AM

    yes, trusted files will be skipped..



  • 14.  RE: Understanding Insight

    Posted Jan 23, 2012 03:24 AM

    But it not might compare other than executable files?



  • 15.  RE: Understanding Insight

    Broadcom Employee
    Posted Jan 23, 2012 03:49 AM

    yes, only process executables like exe, msi, dll etc will be having reputation.



  • 16.  RE: Understanding Insight

    Posted Jan 23, 2012 03:58 AM

    Once scanning starts it will verify only all executable hash values and rest of all files will get automatically exclude from scanning. And its scan only modified executable files.

     

    And Reputation data mean definition signature which downloaded from internet and internet connectivity is not require on clients.



  • 17.  RE: Understanding Insight
    Best Answer

    Broadcom Employee
    Posted Jan 23, 2012 07:25 AM

    Reputation is only of process executables.