Video Screencast Help
new discussion 27 Feb 2015
I have files that backed up from another SEE laptop. The files were loaded asXML files. How can I restore the files to original MS Word, Excel and Power point and decrypt them.  Do I have to purchase the software and load it into my laptop? Please help! Thanks Davendra
new discussion 27 Feb 2015
 I have files that backed up from another SEE laptop onto my external drive and personal laptop. These files were loaded asXML files. How can I restore the files to original MS Word, Excel and Power point and decrypt them.  Do I have to purchase the software and load it into my laptop? Please help! Thanks Davendra
updated discussion 27 Feb 2015
Trying to write an SQL query What is the Database Table and Column for  1. Virus and Spyware Protection date 2. Proactive Threat Protection date 3. Network Threat Protection date Thanks!
new discussion 27 Feb 2015
I have files that backed up from another SEE laptop. The files were loaded asXML files. How can I restore the files to original MS Word, Excel and Power point and decrypt them.  Do I have to purchase the software and load it into my laptop? Please help! Thanks Davendra
new discussion 27 Feb 2015
 I have files that backed up from another SEE laptop onto my external drive and personal laptop. These files were loaded asXML files. How can I restore the files to original MS Word, Excel and Power point and decrypt them.  Do I have to purchase the software and load it into my laptop? Please help! Thanks Davendra
updated discussion 27 Feb 2015
Trying to write an SQL query What is the Database Table and Column for  1. Virus and Spyware Protection date 2. Proactive Threat Protection date 3. Network Threat Protection date Thanks!
updated article 27 Feb 2015
In Symantec Critical System Protection, you can use command line arguments to assign executables to their own Custom Process Sets and to activate certain rules or exceptions.  This purpose of this document is to lay out the command line matching process, the syntax of the wildcards, and how to troubleshoot an apparent mismatch in the argument. The command line matching process is fairly ...
updated article 27 Feb 2015
Introduction This is the seventh of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using SEPM Alerts and Reports to Combat a Malware Outbreak, demonstrated how to use reporting features of SEP 12.1's SONAR component to identify Suspicious ...
updated article 24 Feb 2015
#Updated: 17th Oct'14  Hi, This article will demonstrate how to install Symantec Endpoint Protection on Red Hat Linux machine. The enterprise version of Symantec Endpoint Protection now includes the Symantec Endpoint Protection client for Linux. The Symantec Endpoint Protection client for Linux replaces the Symantec AntiVirus client for Linux and supports a greater range of ...
updated article 23 Feb 2015
The importance of orchestrated “cloud” security In today’s digital world, the area of security and safety has become paramount. Cybercrimes are on the rise and are becoming more sophisticated. We could be experiencing “a new era in cybercrime”. In 2015 we already had some interesting cases: This week it was revealed that the Carbanak malware used by the cyber-criminals proved to be very ...
updated article 22 Feb 2015
Content: What is vShield-enabled Shared Insight Cache? Software requirements and prerequisites Installing vShield Endpoint on ESXi hosts Configuring the Symantec Endpoint Protection Security Virtual Appliance installation settings file Installing a Symantec Endpoint Protection Security Virtual Appliance Installing the EPSEC driver on GVMs Enabling Symantec Endpoint Protection clients to use a ...
updated blog entry 26 Feb 2015
欧州刑事警察機構(ユーロポール)が主導し、シマンテックや Microsoft 社、その他多数の業界パートナーが協力した法執行作戦によって、Ramnit ボットネット(シマンテックでは W32.Ramnit.B として検出)の背後にいるサイバー犯罪グループが所有するサーバーなどのインフラが押収されました。このグループは 5 年以上にわたって活動を続ける間に大規模な犯罪組織に発展しています。これまで 320 万台以上のコンピュータを侵害し、多数の被害者を生み出してきました。今回の作戦によって犯罪グループのリソースと能力に大きな打撃を与えたと見込まれています。 Ramnit を使って被害者のコンピュータに侵入すると、攻撃者は複数の方法で詐欺を実行することができます。Ramnit は、Web ...
updated blog entry 26 Feb 2015
The OCSP (Online Certificate Status Protocol) is one of the two ways for obtaining the revocation status of X.509 digital certificate (e.g. SSL & code-signing certificates) and hence maintains the security of a server or other network resource. The other older mechanism, which OCSP has superseded, is known as “CRL (Certificate Revocation List).” OCSP overcomes the chief limitation of CRL: the ...
updated blog entry 26 Feb 2015
Uma operação de forças de segurança liderada pela Europol e assistida pela Symantec, Microsoft e uma série de parceiros do setor, confiscou hoje servidores e outras peças de infraestrutura do grupo cibercriminoso por trás do botnet Ramnit (detectado pela Symantec como W32.Ranmnit.B). Ele atua há pelo menos cinco anos e, neste período, se tornou uma grande iniciativa criminosa, infectando ...
updated blog entry 26 Feb 2015
Una operación policiaca liderada por la Europol y apoyada por Symantec, Microsoft y otros socios de la industria, incautó servidores e infraestructura perteneciente al grupo de cibercrimen que se encuentra detrás del botnet Ramnit (detectado por Symantec como W32.Ramnit.B). Este grupo ha operado por aproximadamente cinco años y en este lapso ha evolucionado hacia una organización criminal ...
updated blog entry 26 Feb 2015
2015 年 2 月 20 日、シマンテックは、侵入防止システム(IPS)定義パッケージ「20150220.001」を適用すると 32 ビット版の Internet Explorer がクラッシュするという報告を受けました。この定義パッケージにより、次のシマンテック製品またはノートン製品がインストールされているコンピュータ上で 32 ビット版の Internet Explorer で問題が発生することが確認されています。 Symantec Endpoint Protection 12.1 Symantec Endpoint Protection Small Business Edition 12.1 Symantec Endpoint Protection Small Business Edition 2013 ノートン セキュリティ ノートン セキュリティ with ...
updated blog entry 25 Feb 2015
On February 20, 2015, Symantec received reports stating that 32-bit versions of Internet Explorer had been crashing after the application of the Intrusion Prevention System (IPS) 20150220.001 definition package. We can confirm that this definition package impacted 32-bit versions of Internet Explorer on computers with the following Symantec and Norton products installed:  Symantec ...
updated blog entry 25 Feb 2015
A law enforcement operation led by Europol and assisted by Symantec, Microsoft,  and a number of other industry partners, has today seized servers and other infrastructure owned by the cybercrime group behind the Ramnit botnet (detected by Symantec as W32.Ramnit.B). The group has been in operation for at least five years and in that time has evolved into a major criminal enterprise, ...
updated download 08 Jan 2015
To build on my last IR article: How to utilize SEP 12.1 for Incident Response - PART 6 I'm attaching a custom IPS policy which will detect the download of various filetypes via HTTP and HTTPS. The signatures are in Allow mode and set to write to the Packet log for detailed information. As of now, this policy will detect 37 different filetypes. I will update it as I add more. Feel free to use ...
download comment 05 Dec 2014
new event 24 Feb 2015
Presented by: Matt Georgy, Senior Technical Director, Symantec Global Security Operations Al Cooley, Director, DeepSight Cyber Intelligence   Webcast Summary: The threat environment has become increasingly hostile to enterprises.  The volume of attacks has grown dramatically, along with the sophistication of attackers.  At the same time the potentially enormous consequences ...
new event 24 Feb 2015
Presented by: Richard Hall, Director, Product Management Webcast Summary: As of January 2014, with Java 7 update 51 (7u51) Oracle requires authors and vendors of Rich Internet Applications (RIA) to sign code with certificates issued from a trusted Certification Authority. This mandate was driven by the need to enhance authentication and authorization in light of escalating cybercrime.  ...
new event 24 Feb 2015
Join Novacoast and learn how to protect your data! - Organizations can measurably reduce their risk of data loss by understanding where their data is going, how it’s being used, and how to prevent its loss or theft.  We’d love to have you join us for this Data Protection webinar and further discuss the risk of data loss and how customers can prevent these dangers in the environment. As ...
updated event 19 Feb 2015
Please Note: This meeting has been rescheduled from February 26th to March 12th! Please join us for the next Chicago Security & Compliance User Group meeting on Thursday, February 26 from 12:00pm to 4:00pm at Acxiom. Lunch will be served! Agenda Lunch, Welcome & Introductions Roadmap of SEP (via WebEx) by Josh Etsten, Sr. Product Manager, Symantec Mansoor Raza, Symantec SE, will be at ...
new event 02 Feb 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 28 Jan 2015
Presented by: Kevin Haley, Director, Security Technology and Response Kat Pelak, Senior Product Marketing Manager   Webcast Summary: Cybercrime remains prevalent and damaging threats from cybercriminals continue to loom over businesses and consumers. Since December 2013 thru November 2014 over 476 million identities have been exposed. Join Symantec for an in-depth look at the ...
updated event 27 Jan 2015
Attention: This User Group meeting has been canceled due to the recent snowstorm in the Philadelphia area. We will keep you posted on when this meeting is rescheduled. Apologies for any inconvenience this may have caused.
updated video 19 Feb 2015
This is lesson 7 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelilgence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 5 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 4 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 3 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as ...
updated video 10 Dec 2014
This is lesson 2 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 1 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as ...
updated video 05 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons: Lesson 1: DeepSight Intelligence Portal Overview - Discuss the variety of intelligence the portal provides - Set up your account and familiarize yourself with the portal - Review the analyst journals - Determine who to contact if you have a problem - ...
new idea 26 Feb 2015
Currently, SEP maanger sends ip address of msanager while sending report. For example: Report scheduled by: admin. Server name: sep01. IP address: 10.0.14.17,10.0.9.6. Report generated on: 13/02/2015 1:07:14 PM. Report type: Risk Report. Report description: Created automatically during product installation.. While working in environment where security policy prevents publishing IPS in ...
new idea 25 Feb 2015
Add a schedule and priority on which server is running the Sync. I would like to see a more detailed schedule to be able schedule the Synchonized Direcotry settings. Today you can add the servers and add the schedule. Then the sync is running comming days the time you configured this. I want to have my servers synchonized during night time, today I need to go up an configure this settings ...
new idea 24 Feb 2015
It would be nice if the SEPM console could remotely remove trouble SEP clients, clients where the definitions have become corrupt, or something has happened that will not allow re-insatllation of SEP.
new idea 24 Feb 2015
Additional Predfined Path Variables should be added to the custom exclusions.  My suggestions: PROGRAM_FILES_X86 = C:\Program Files (x86) or even better 1 variable that automatically includes both paths The COMMON_ set of variable need to include the C:\Users path for Win Vista+ operating systems USER_PROFILE = the path for the current logged in user's profile (C:\Users\username) There ...
new idea 24 Feb 2015
Allow people to customize dashboard. For example, we only use SMG for outbound filtering currently but the dashboard defaults to showing inbound stats.
updated idea 20 Feb 2015
Idea: Display information on the dashboard of SEPM about the latest available version of SEP / SEPM. Right now you need to login to fileconnect once in a while to see the latest version available.
updated idea 20 Feb 2015
When deleting a compter in a computer group on SEPM, notify the admin if the computer is a GUP or a Unmanaged Detector. Also, when SEPM delete computers that don't have contact him for x days, don't delete GUP or Unmanaged Detector, an send email to the admin to notify this abnormal situation.
new idea 20 Feb 2015
Symantec Endpoint Encryption Management Server should use JAVA OR any other better console than default MMC console.
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
AravindKM
293
1
Brɨan
1713
19
Mithun Sanghavi
1228
59
P_K_
1131
28
SMLatCST
376
1
jjesse
58
24

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.