Video Screencast Help
updated blog entry 28 Aug 2014
Leveraging Waiting Room Time      Organizations can continue to rely solely on their security vendors to provide the miracle drug or antidote for the digital disease pathogen, or they can take more of a hands-on surveying approach to improve security. Relying on the security vendor is the traditional practice which is normally followed by applying pressure on the security ...
updated blog entry 28 Aug 2014
Epidigitalogy Survey Study Types      In the field of epidemiology there are two study types that I think would be beneficial to the epidigitalogist. The first type of study is a retrospective cohort study. A retrospective cohort study looks to the past for comparison of a known group “cohort” against other groups to identify differences. If we have a known diseased group ...
updated discussion 28 Aug 2014
Hi my friends, Could you help me? I need a Data identifier specific for  Credit Cards Diners and another specific for  Credit Cards Amex . I need that because the default rule of DLP does not see those at my enviroment. Thank you so much!! Lopes~
updated discussion 28 Aug 2014
Hi my friends, Could you help me? I need a Data identifier specific for  Credit Cards Diners and another specific for  Credit Cards Amex . I need that because the default rule of DLP does not see those at my enviroment. Thank you so much!! Lopes~
new discussion 28 Aug 2014
Hi, I have a customer with DLP 12.5 and Prevent Web installed. I need to create a rule for monitoring all posts and chat on Facebook. How can I do this?   Thanks!
updated article 27 Aug 2014
This article presents an introduction to publicly available solutions and knowledge-base for Symantec Liveupdate Administrator (LUA) product - latest  available LUA version is 2.3.3.20. KB listing has been split in several categories to allow you for fast browsing and search of interesting topics. Both Symantec official KB resources and Symantec Connects resources included. Please look ...
updated article 22 Aug 2014
Issue The SEPM server needs to be reinstalled and reconnected to its existing SQL Database. Solution Note: Only the screen shots for the most important steps are shown. Note: The Database username and password is needed during the reinstallation. Make sure to know it before performing the below steps. This is not the same account as the SA account. ############## (!) IMPORTANT: Make sure to ...
updated article 15 Aug 2014
What is vShield-enabled Shared Insight Cache? Virtual clients in a VMware vShield infrastructure can use a vShield-enabled Shared Insight Cache to reduce scan loads. A vShield-enabled Shared Insight Cache runs in a Symantec Endpoint Protection Security Virtual Appliance. You must install the appliance so that Windows-based Guest Virtual Machines (GVMs) can use VMware vShield Endpoint to access ...
updated article 14 Aug 2014
Introduction This is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using SEPM Alerts and Reports to Combat a Malware Outbreak, demonstrated how to use reporting features of SEP 12.1's SONAR component to identify Suspicious ...
updated blog entry 28 Aug 2014
Leveraging Waiting Room Time      Organizations can continue to rely solely on their security vendors to provide the miracle drug or antidote for the digital disease pathogen, or they can take more of a hands-on surveying approach to improve security. Relying on the security vendor is the traditional practice which is normally followed by applying pressure on the security ...
updated blog entry 28 Aug 2014
Epidigitalogy Survey Study Types      In the field of epidemiology there are two study types that I think would be beneficial to the epidigitalogist. The first type of study is a retrospective cohort study. A retrospective cohort study looks to the past for comparison of a known group “cohort” against other groups to identify differences. If we have a known diseased group ...
updated blog entry 28 Aug 2014
Security Response is aware of an alert from US-CERT regarding a threat they are calling Backoff. This threat family is reported to target Point of Sale machines with the purpose of logging key strokes and scraping memory for data (like credit card info) and then exfiltrating the data to the attacker. Symantec Security Response is currently investigating this threat family and is working to ...
new blog entry 28 Aug 2014
At least five U.S. banks have been targeted in a sophisticated cyberattack this month. New York Times reported that hackers breached the network and stole gigabytes of sensitive information, including checking and savings account information. The F.B.I. is involved in the investigation and is conducting forensics, but it isn’t yet clear who originated the attacks. The attack is not unexpected. ...
updated blog entry 28 Aug 2014
Dizem que se algo está na internet pode ser invadido. Bem, hoje estamos conectando mais coisas do que nunca à internet e com a Internet das Coisas (IoT em inglês) tornando-se uma realidade, este número crescente de dispositivos é agora o principal alvo de ameaças de segurança. Antes de mergulharmos mais fundo no assunto da proteção, vamos dar um passo para trás e falar sobre o que a Internet ...
updated blog entry 28 Aug 2014
Embora as empresas gastem muitos anos na construção de sua rede de segurança para PCs, a maioria investe pouco tempo protegendo a rede para smartphones. Mas há mais dispositivos móveis do que computadores pessoais e o volume absoluto muda a forma como a segurança deve ser abordada. Ao mesmo tempo, a maioria dos usuários não estão cientes dos perigos que ameaçam os dispositivos móveis. O ...
updated blog entry 28 Aug 2014
Una amenaza cibernética descubierta recientemente ataca los puntos de venta (PoS) y ha afectado a más de mil negocios en Estados Unidos. Identificada como Trojan.Backoff  esta nueva amenaza es capaz de robar información de las tarjets de crédito y débito de las terminales infectadas. Los riesgos que puede generar Backoff han hecho que el Departamento de Seguridad Nacional de los Estados ...
new blog entry 27 Aug 2014
The healthcare industry has for years been the number one industry in reported data breaches.  But this dubious honor has been driven in some part because healthcare has the most stringent reporting requirements of any industry.  In other words, unlike other industries, they have to report a data loss.  If every industry had the same reporting requirements, things might look ...
updated blog entry 27 Aug 2014
Hace un año Symantec advirtió a los usuarios sobre una de las primeras apariciones de correo no deseado (spam) relacionado con webcams para adultos en Tinder,  aplicación que en aquel momento era la novedad para conocer a una pareja o buscar citas. También avisamos sobre una probable inundación de bots generadores de spam en la versión para el sistema Android que se lanzó posteriormente. ...
updated download 30 Jun 2014
Symantec Data Loss Prevention 11.5: Administration NOTES: This course is 5 days long. TK-DLP-0115 Symantec Data Loss Prevention 11.5: Administration [5-Day ILT]   Click on links below to download course materials:
updated download 27 Jun 2014
*Update available* Hi, I wrote a little Powershell script to update existing SEP 12.1 Installation Packages with the latest definitions for all modules. Instructions: On the SEPM 12.1 share the following folder for “everyone – read” Export Packages without ticking the box “Create a single .EXE file for this package” Ensure that the following .ZIP files exist in the 32Bit and 64Bit package ...
updated download 25 Jun 2014
I made a little tool that will create a new LU policy using a CSV or text file as the input.  The tool can use an existing LU policy as a template.  This will allow you to easily add new Explicit GUP settings or new Multiple GUP settings to an existing LU policy. Here are the steps to use the tool: Download and run tool below. Create a text file (see below for details). (optional) ...
updated download 09 Jun 2014
Hello guys, If you are noticing some problem with disk space after configuring GUP Monitor Tool, take a look below: "C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\apache\logs" = It should be your problem, right? In that folder, SEPM just save errors, by default! If you have configured GUP Monitor Tool, like me, you need to know that you have enabled the access.log as ...
new event 26 Aug 2014
Calling all United States DoD Security Experts and Enthusiasts to Compete with DoD Peers from Around the Globe The Symantec Cyber Readiness Challenge is an immersive, interactive "capture the flag" competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants ...
updated event 18 Aug 2014
Please join us for the next San Francisco Data Loss Prevention User Group meeting on September 9th at the offices of PayPal from 11 a.m. to 3 p.m. Lunch will be served!   Agenda: 11 AM – Introduction & User Group Mission, name the directors and advisory board leaders 11:30 AM to 12:30 PM – Lunch, Meet & Greet 12:30 PM 1:00 PM – DLP and Cloud 1:00 PM to 1:15 PM – Break  1:15 PM to ...
updated event 12 Aug 2014
Presented by: Matt Nelson Attorney and Legal Technology Expert, Information Governance Webcast Summary: Today’s era of technology and data growth presents new and unique challenges for businesses and corporate legal departments in particular. Some speculate that establishing a good “information governance” plan is the only way to address these challenges, yet the term “information ...
new event 12 Aug 2014
Presented by: Eric Schwake, Product Marketing Manager Webcast Summary: Increasingly complex, advanced threats are more prevalent than ever and even with the myriad of security tools available, the news is still filled with information about organizations getting breached. A better approach is needed. Register for this webcast and learn how to ensure your organization has the strongest ...
updated event 08 Aug 2014
The cyber security event provides rich content around cyber security. Guest speakers will address the legal, best practise, and industry issues for cyber security. It will demystify the obvious confusion of Information Security versus Cyber Security, and will explain why for instance Lloyds have moved cyber risk from 13th to 3rd place in its risk register. It will explain the new EU cyber laws ...
event comment 21 Jul 2014
new event 17 Jul 2014
Organizations are spending more on security and believe they’re adequately protected, yet data breaches continue to impact consumers, businesses and governments – the number of breaches jumped 62 percent in 2013. Overworked and understaffed, security teams are stitching together good enough security point products that weren’t designed to work together. Not only does this make organizations ...
new event 17 Jul 2014
Rolling out virtualization in the data center involves a lot of planning and unfortunately, leaves companies just as vulnerable to an attack as other systems. Taking a closer look at virtualized systems, Symantec research has uncovered some key security issues and threats to hit virtualized environments. Attend this live webcast to learn about: The challenges with virtual machines and ...
new event 23 May 2014
  Free Webcast from ITS   Thursday, June 5th at 2 p.m. (est) With the exponential increase in devices, point solutions, appliances, and other hardware in today’s industry, protecting that hardware has become a daunting challenge.  Combined with the evolution of targeted attack motivation from just bragging rights to massive profits, a new approach to IT security is ...
updated video 18 Aug 2014
How-to demonstration of the installation process for LUA (Live Update Administrator)
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated video 11 Jun 2014
You must download Agents before your Symantec.cloud services will work. This video demonstrates how to download agents using any of the three download methods: Directly to a computer; or As a redistributable package; or As download invitations to up to 50 users More details about "Installing and managing Agents" can be seen in the Symantec.cloud Help.   Click here for the video with ...
updated video 11 Jun 2014
You must download Agents before your Symantec.cloud services will work. This video demonstrates how to download agents using any of the three download methods:     Directly to a computer; or     As a redistributable package; or     As download invitations to up to 50 users More details about "Installing and managing Agents" can be seen in the ...
new idea 28 Aug 2014
An option to allow the following: After an Anti-Virus scan completes the computer automatically shuts down?
new idea 27 Aug 2014
The RBAC in DLP allows granting Administrator right but no granularity within that right. There is a specific requirement at several large customer to have an Endpoint Admin Role who can pull Ednpoint Status Reports and Carry out Endpoint Agents tasks/administration without having any other rights. Similary there is also a need to deligate administrator rights of individual detection ...
new idea 27 Aug 2014
Now that we have AD attribute based agent configuration assignment possible, it will be good to move the Endpoint Server including failover server configuration from agent package to agent configuration. This will help avoid the complication of having multiple agent packages for each endpoint server specially in large setups with several locations having thier own endpoint server. It will also ...
updated idea 27 Aug 2014
Hi, Symantec Endpoint Encryption (SEE) uses Microsoft management console (MMC). It would be nice to see Java console instead of MMC.
new idea 26 Aug 2014
Only NTLM v1 is supported for proxy authentication in External communication of Endpoint Protection for the purpose of submissions. This means proxy credentials are sent in clear text. This is not desirable. Please built support for Kerberos of NTLM v2 in the near future.
new idea 25 Aug 2014
We're finding Symantec Endpoint Protection to be too restrictive in how it presents data.  The MHT format is good for display, but we'd like to create data in XLSX (or CSV) format for data manipulation. Also more granularity.  A drop-down option lets me select one criterion.  But sometimes I want client reports on all server operating systems, or multiple client Windows ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1297
16
AravindKM
293
1
Mithun Sanghavi
1223
59
P_K_
1131
28
jjesse
51
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.