Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
new discussion 29 Dec 2014
Hello,  I want to give access to the console DataInsight for a client, But I would like the customer can see  the permissions of the file and folder , not the event files (delete, change, etc) On existing roles in DataInsight not allow me to view separate  "permissions" and "events". Is there a possibility to create a new  custom roles ? ...
updated blog entry 29 Dec 2014
新年假期即将来临,每个人都在为赠送什么样的礼物而伤透脑筋。 作为 IT 人员,我们可以借此机会为我们的用户送上一份好礼。而实际上,我们也会从这份礼物中获得更大的回赠,因为它能引导用户养成良好的习惯,使我们的工作更轻松。 请把耐心这一厚礼赠予用户,当然还有本文提供的实用建议,让您远离借用 IT 名义行骗的威胁。 安全性 建议 1:在有自称来自本公司 IT 团队的人员联系您的部门时,知道该联系 IT 团队的哪位成员进行验证,或指派一名部门人员去了解该联系哪位 IT 团队成员进行验证。 鱼叉式网络钓鱼诈骗分子仅将客服代表、销售人员及其他人员作为目标,这些人员每天会收到无数个自称 IT 人员打来的外线电话,而其目的是在目标机器上安装恶意软件,或是从电话中获取便于日后实施攻击的相关信息。 建议 2:保护公司机密信息,避免知识产权外泄。 ...
updated discussion 28 Dec 2014
There is shortcut file which is not been clean and scan by symantec antivirus. Antivirus defintion is updated but it not be search as a virus. How i can remove it? What the action i can taken?
new discussion 29 Dec 2014
Hello,  I want to give access to the console DataInsight for a client, But I would like the customer can see  the permissions of the file and folder , not the event files (delete, change, etc) On existing roles in DataInsight not allow me to view separate  "permissions" and "events". Is there a possibility to create a new  custom roles ? ...
updated discussion 28 Dec 2014
There is shortcut file which is not been clean and scan by symantec antivirus. Antivirus defintion is updated but it not be search as a virus. How i can remove it? What the action i can taken?
updated article 19 Dec 2014
Before we begin, I would like to let the reader know that the product for standalone drive encryption installations is Symantec Encryption Desktop.  This guide is intended for managed environments already using Symantec Endpoint Encryption who have a need for a small number of standalone clients that are outside of their domain.  If you have the need for a small number of unmanaged ...
updated article 15 Dec 2014
by Tony Bautts Worms, worms are everywhere! The recent and prolific spread of Internet worms has yet again demonstrated the vulnerability of network hosts, and it's clear that new approaches to worm containment need to be investigated. In this article, we'll discuss a new twist on an under-utilized technology: the tarpit. The Worms In a nutshell, worm technology works by infecting a host ...
updated blog entry 29 Dec 2014
新年假期即将来临,每个人都在为赠送什么样的礼物而伤透脑筋。 作为 IT 人员,我们可以借此机会为我们的用户送上一份好礼。而实际上,我们也会从这份礼物中获得更大的回赠,因为它能引导用户养成良好的习惯,使我们的工作更轻松。 请把耐心这一厚礼赠予用户,当然还有本文提供的实用建议,让您远离借用 IT 名义行骗的威胁。 安全性 建议 1:在有自称来自本公司 IT 团队的人员联系您的部门时,知道该联系 IT 团队的哪位成员进行验证,或指派一名部门人员去了解该联系哪位 IT 团队成员进行验证。 鱼叉式网络钓鱼诈骗分子仅将客服代表、销售人员及其他人员作为目标,这些人员每天会收到无数个自称 IT 人员打来的外线电话,而其目的是在目标机器上安装恶意软件,或是从电话中获取便于日后实施攻击的相关信息。 建议 2:保护公司机密信息,避免知识产权外泄。 ...
updated blog entry 26 Dec 2014
何かと IT 関連のトラブルが発生しやすいこの時期、トラブルを未然に防ぎ IT 部門担当者の負担を軽くするためには、従業員を教育することが重要です。トラブル発生を回避するために、従業員が心得るべき 12 のヒントを以下に示します。実際にトラブルが発生した際、IT 部門がスムーズに対応できるように従業員への教育を徹底しましょう。 「セキュリティ」に関するヒント その 1: IT 部門の担当者が誰なのかを事前に把握しておきましょう。IT 担当者を名乗る不審人物が自分の部署に連絡してきた場合に、どこに問い合わせたらよいかを確認しておくことも重要です。スピアフィッシングでは、コンピュータ上にマルウェアをインストールしたり、将来の攻撃に必要な情報を収集するために、IT 担当者を名乗る人物がカスタマーサービス担当者や営業担当者など、外部からの着信が多い人を標的にします。 その ...
updated blog entry 24 Dec 2014
Ransomware is nothing new to Japan. Symantec’s research has found that Japan ranks among the regions that are the most affected by global ransomware attacks. However, no attacks specifically targeting Japanese users have ever been confirmed. That is, until now. In the recent weeks, Symantec has observed a ransomware variant in the wild that was designed to target users who speak ...
updated blog entry 24 Dec 2014
Two of our customers were sharing the same problem, which we solved meanwhile. As I could imagine that others will face the same problem, here is what happened and how we solved it. Symtoms: Definitions on some clients located on remote offices using GUPs did not get updated. Customers at remote locations moan about slower VPN link to headquater as usual. Investigation: By analyzing router ...
updated blog entry 22 Dec 2014
As the end of the year approaches and we look ahead to 2015, many start to think about New Year’s resolutions. While getting in shape or quitting smoking are popular options, have you considered making some data security resolutions for your business? The New Year is a perfect time to refresh and restart. Consider using this time to take a critical eye to your security processes, practices and ...
updated blog entry 19 Dec 2014
Um malware avançado conhecido como Regin foi utilizado em campanhas sistemáticas de espionagem contra uma variedade de alvos internacionais desde, pelo menos, 2008. Considerado um Cavalo de Tróia do tipo Backdoor, o Regin é um malware complexo, cuja estrutura exibe um grau de competência técnica raramente encontrado. Customizável através de uma ampla gama de capacidades, dependendo do alvo, ...
updated blog entry 19 Dec 2014
As the largest security software company in the world, Symantec has earned the trust of consumers, businesses and governments alike to secure and manage their information and identities. We place the highest priority on maintaining this trust and believe it is imperative to be transparent about our business positions as questions arise across the globe on data security and privacy. We have ...
updated blog entry 19 Dec 2014
이번 크리스마스 시즌에 쇼핑객들은 가장 저렴한 가격에 최고의 선물을 구입하기 위해 인터넷을 샅샅이 뒤지고 있습니다. 이맘때 할인 행사를 찾아다니는 이들은 일반 소비자만이 아닙니다. 수많은 사이버 범죄자들도 다른 누군가의 돈으로 쇼핑을 즐기고 지하 경제 시장에서 불법 상품과 서비스를 사고팝니다. 거래 장소만 안다면 불법 유출된 데이터와 온라인 계정, 맞춤형 악성 코드, 공격 서비스와 인프라스트럭처, 사기 상품권 등 온갖 품목을 구매할 수 있습니다. 불법 상품 및 서비스의 가격은 그 내용에 따라 천차만별이지만, 예산이 빠듯한 사이버 범죄자라도 형편에 맞게 구매할 수 있습니다. 훔친 데이터와 계정은 1달러 미만에 구매 가능합니다. 공격 인프라스트럭처와 같은 큰 규모의 서비스는 백 달러에서 수천 달러짜리도 ...
updated blog entry 18 Dec 2014
If you use SSL certificates on intranet sites with internal server names, they may not work from 1 November 2015. For companies with complex infrastructures, the change may be challenging but now is the time to start getting ready. If you use SSL certificates on intranet sites with internal server names, they may not work from 1 November 2015. For companies with complex infrastructures, the ...
download comment 05 Dec 2014
updated event 15 Dec 2014
Attention: This User Group meeting has been rescheduled to January 28, 2015! Please join us for the next Philadelphia Security & Compliance User Group meeting on January 28, 2015 from 9:00 a.m. to 12:00 p.m at Dave & Buster's. Lunch will be served! Agenda: Welcome & Introductions Altiris Update and Overview Lunch Symantec Cloud Security Wrap up, Prize drawings & Conclusion Location: Dave ...
new event 04 Dec 2014
Presented by: Jon Oltsik, Senior Principal Analyst, Enterprise Security Group Kat Pelak, Senior Product Marketing Manager   Online activity and security threats are growing in volume, scale, and complexity.  Not a day passes that we don’t hear about another data breach.  From small and medium-size businesses to Fortune 500 companies, across every industry, no organization is ...
updated event 24 Nov 2014
Greetings Valued DLP Customers and Partners,   We respectfully request your participation at our upcoming Symantec DLP Feature Advisory Board (FAB).  We will be discussing the upcoming feature, Discover for Box Cloud Storage.  You will be among the first to see and hear about this new feature.  The meeting will be led by DLP Product Management and your feedback will shape ...
updated event 24 Nov 2014
Join Symantec at the Gartner Data Center, Infrastructure & Operations Management Conference 2014 in Las Vegas and get the information you need to deliver crucial IT services and drive improved levels of productivity and innovation at the same time. With a renewed focus on people, processes, technology and culture, you will learn how to select and prioritize I&O initiatives, manage ongoing ...
new event 13 Nov 2014
Presented by: Kevin Haley, Director, Security Technology And Response Webcast Summary: The true personal computer is in our pockets or purses today.  It’s the smart phone.  It is a computer with more processing power than in the first space capsule that sent men to the moon.  And it’s a very personal device - to work, play and share with our friends.  But like any ...
updated event 07 Nov 2014
Today, Healthcare organizations are at a crossroad.  Continue the struggle to strike balance between business reward and risk, or take the brave steps toward making IT security an offensive game?  The reality is that personal health information is worth more than credit cards and what's worse is that thieves know it!   Today’s threats are also more automated, more ...
updated video 10 Dec 2014
This is lesson 7 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelilgence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 5 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 4 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 3 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as ...
updated video 10 Dec 2014
This is lesson 2 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 1 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as ...
updated video 05 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons: Lesson 1: DeepSight Intelligence Portal Overview - Discuss the variety of intelligence the portal provides - Set up your account and familiarize yourself with the portal - Review the analyst journals - Determine who to contact if you have a problem - ...
new idea 18 Dec 2014
Wir haben seit kurzem Probleme mit der automatischen Connection Classification. Ein Kunde hat uns mitgeteilt, dass er uns keine eMails senden kann, da diese zurückgewiesen werden. Im Log wurden die Server des Dienstanbieters Mimecast mit "451 4.3.2 Please try later" abgewiesen. Nach längere Suche haben wir herausgefunden, dass die Ursache in der Connection Classification lag. Uns ist dabei ...
new idea 16 Dec 2014
We have a SIEM. We receive logs from SEP to SIEM. However, for the application and device control logs, we don't receive serial numbers of the USB devices. We were told that it is not possible/not designed. Please, consider additing the information.
new idea 16 Dec 2014
Sería interesante que se estudiara la posibilidad de que se pudieran programar informes en SEPM, y que en lugar de enviar correos a los administradores, se guardaran automáticamente dichos informes (los mismos archivos .mht que se envían al correo electrónico) en un directorio que se le indique en el servidor donde esté instalado SEPM. Esto sería de utilidad para entornos en los que no se ...
new idea 15 Dec 2014
Remove SEPM Java Console Timeout implemented in v12.1.5. Might be good to force a timeout for the Small Business version, but for Enterprise, we should be able to choose NEVER. 1 hour max is flat out ridiculous! If I'm monitoring or doing something else for a couple of hours, I don't want to have log back in to the console. This is especially annoying when monitoring client upgrades. I might ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1577
17
AravindKM
293
1
Mithun Sanghavi
1228
59
P_K_
1131
28
SMLatCST
366
1
jjesse
52
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.