Video Screencast Help

Search

Search results

The script below is intended to detect data leakage in helthcare environments. Files detecting by this script is widely used in a variety of medical diagnostic systems and may include personal information. ...
Download by xand | 17 Jul 2015 | 0 comments
To build on my last IR article: How to utilize SEP 12.1 for Incident Response - PART 6 I'm attaching a custom IPS policy which will detect the download of various filetypes via HTTP and HTTPS. The signatures are in Allow mode ...
Download by Brɨan | 05 Jan 2015 | 2 comments
Here is my presentation from 1.15.2014 Chicago security and compliance user group meeting.  Along with this powerpoint deck are some sample policies to try in your own environment. Symantec UG ADC 1.2014.pptx Sample Policies.zip ...
Download by RichBagurdes | 15 Jan 2014 | 1 comment
This is an Application Control Policy used to block psexec.exe.  This policy will block psexec.exe based on: - fingerprint -services/processes -filename The action is block and notification is set to display a pop up. There is a ...
Download by Philly Flyer | 16 Aug 2012 | 2 comments
USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.  For each USB device, extended information is displayed: Device name/description, device type, ...
Download by Aniket Amdekar | 24 May 2012 | 9 comments
Hello, On March 13, 2012, Microsoft released its scheduled patch update for March 2012. This month's update included a critical Remote Desktop Protocol (RDP) patch (MS12-020) that can be exploited for remote unauthenticated code-execution. ...
Download by Mithun Sanghavi | 26 Mar 2012 | 1 comment
I found on MS Technet this useful script that help to perform a disk cleanup temp files on Windows Xp, Vista and 7 computers. It deletes all User and System Temp files & Internet Explorer files. Note: we have one subroutine called ...
Download by riva11 | 02 Mar 2012 | 1 comment
Hello, W32.Sality is a file infector that spreads by infecting executable files and by replicating itself across network shares. Infected hosts join a peerto-peer network used to propagate malware on the compromised computer. Typically, those ...
Download by Mithun Sanghavi | 07 Oct 2011 | 1 comment
Hello, W32.Xpaj.B is one of the most complex and sophisticated file infectors Symantec has encountered. Given this level of complexity, it was decided to conduct a deep analysis of this threat. The analysis revealed IP addresses for the command ...
Download by Mithun Sanghavi | 07 Oct 2011 | 0 comments
This tool is awesome on the fight against W32.Downadup on large networks. Use this tool to quickly identify infected systems and machines. If you find infected machines, you should MS-patch KB958644 and reboot them to cleanup the system. ...
Download by FbacchinZF | 06 Oct 2011 | 5 comments