Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Hi, It would be nice for the AV, when the heuristic engine detect suspicious file or behavior to upload the file itself, and not just the log and MD5/SHA-1/2/3 to your file analysis system. Multiple vendor offer now this features and it it ...
Idea by MHinse | 20 Oct 2014 | 0 comments
Please add option to disable triggered daily scans (when new definition arrive) in all SEP versions. This option must be user configurable, not with policy via SEPM. Many people over the world (my clients too) have problem with this ...
Idea by Procom69 | 18 Oct 2014 | 0 comments
Continue from Part-1 https://www-secure.symantec.com/connect/articles/whats-new-sepm-121-ru5-user-interface-differences Mac deployment through the SEPM console: Now it's possible to deploy the SEP client to remote Mac clients. ...
Article by Chetan Savade | 19 Sep 2014 | 2 comments
Hello, Symantec has released SEP 12.1 RU5 (12.1.5337.5000). Upgrade is supported from any prior release of SEP 11.x and SEP 12.1 version. Symantec Endpoint Protection 12.1.5xxx (RU5) can upgrade seamlessly over the following: Symantec ...
Article by Chetan Savade | 19 Sep 2014 | 3 comments
Maintenance Patches (MPs) released on top of SEP some times don't get installed properly since older versions may not always be the most recent ones e.g. RU4 updates may get installed over RU2 version etc. That necessiates using ...
Idea by hvrmurthy | 17 Sep 2014 | 0 comments
On September 15, 2014, Symantec issued a SONAR release via Live Update definitions, which erroneously detected some low prevalence files as malicious. The false positive was reported as a SONAR.SuspLaunch detection. Symantec discovered the issue and ...
Blog Entry by Christopher Johnson | 16 Sep 2014 | 0 comments
Could you please help change "Support ESS SEP Information Update" Templates as below? =========================================  お名前: {!Case.Contact} シマンテックテクニカルサポートセンターにお問い合わせいただきありがとうございます。お問い合わせ内容 ( {!Case.Subject} ) について CASE ...
Idea by Maggie_Cui | 09 Sep 2014 | 0 comments
Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, ...
Article by Chetan Savade | 08 Sep 2014 | 1 comment
The New York Times has reported that the Department of Homeland Security has expanded its estimate of businesses affected by the Trojan.backoff Point of Sale malware. Over 1000 total businesses in the U.S. are reported to have been affected, up ...
Blog Entry by Solange Deschatres | 22 Aug 2014 | 1 comment
Security Response is aware of an alert from US-CERT regarding a threat they are calling Backoff. This threat family is reported to target Point of Sale machines with the purpose of logging key strokes and scraping memory for data (like credit card ...
Blog Entry by Brandon Noble | 01 Aug 2014 | 0 comments