Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Hi, It would be nice for the AV, when the heuristic engine detect suspicious file or behavior to upload the file itself, and not just the log and MD5/SHA-1/2/3 to your file analysis system. Multiple vendor offer now this features and it it ...
Idea by MHinse | 20 Oct 2014 | 0 comments
On September 15, 2014, Symantec issued a SONAR release via Live Update definitions, which erroneously detected some low prevalence files as malicious. The false positive was reported as a SONAR.SuspLaunch detection. Symantec discovered the issue and ...
Blog Entry by Christopher Johnson | 16 Sep 2014 | 0 comments
Could you please help change "Support ESS SEP Information Update" Templates as below? =========================================  お名前: {!Case.Contact} シマンテックテクニカルサポートセンターにお問い合わせいただきありがとうございます。お問い合わせ内容 ( {!Case.Subject} ) について CASE ...
Idea by Maggie_Cui | 09 Sep 2014 | 0 comments
Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, ...
Article by Chetan Savade | 08 Sep 2014 | 1 comment
Security Response is aware of an alert from US-CERT regarding a threat they are calling Backoff. This threat family is reported to target Point of Sale machines with the purpose of logging key strokes and scraping memory for data (like credit card ...
Blog Entry by Brandon Noble | 01 Aug 2014 | 0 comments
Following Security Bulletins have been released in July 2014:   Microsoft Microsoft Security Bulletin Summary for July 2014 https://technet.microsoft.com/library/security/ms14-jul Symantec product detections for ...
Blog Entry by SebastianZ | 17 Jul 2014 | 0 comments
Symantec Security Dashboards Need complete visibility into your environment?  Do you find yourself reactive to breaches or always behind intrusions?  MetriX dashboards can provide ...
Blog Entry by ryanschoenherr | 08 Jul 2014 | 0 comments
Hi, PowerShell script to validate that all machines in your OU have Symantec Endpoint Protection (SEP) anti-virus client installed and started. Generates a color-coded Excel report highlighting problematic nodes. Refer this link and download the ...
Blog Entry by Chetan Savade | 21 May 2014 | 1 comment
I would like to see you offer the ability to leverage AD groups when adding "Administrators" to the SEPM console. This will allow: Organizations to better manage user access via their provision / de-provision process when users leave the ...
Idea by BigDogRockies | 02 May 2014 | 0 comments
A Symantec está ciente dos relatórios de vulnerabilidade de Dia Zero, Vulnerabilidade de Execução de Código Remoto para Microsoft Internet Explorer (CVE-2014-1776), que afeta todas as versões do Internet Explorer. A Microsoft publicou um ...
Blog Entry by Christian Tripputi | 30 Apr 2014 | 0 comments