Video Screencast Help
updated discussion 03 Sep 2015
We have been told by an external contact that emails sent to us is often returned with the message "You are not allowed to connect". I found the connection IP from one of the emails that were accepted and tried to look it up under Reputation Tools > Find Sender, but got "The sender does not belong to any sender group.". Then I tried IP Reputation Lookup and got the following: I cannot ...
new discussion 03 Sep 2015
I have installed the SEP 11 and symantec protection engine 7.0 to my Windwos server 2008 R2. I have run the command of "etup-iu.bat enable" under c:\program files (x86)\symantec\scan engine\definitions\antivirus. As the antivirus definitation of SEP 11 is updated by my company's server, the antivirus definitation of symantec protection engine 7.0 will be updated. However, after I have updated ...
new discussion 03 Sep 2015
Hi All, I have a problem applying a manual update patch for virus definition on Mac OSX. Btw, SEP client is 12.1.6. Kindly see image below. Thanks and regards.
updated discussion 03 Sep 2015
We have been told by an external contact that emails sent to us is often returned with the message "You are not allowed to connect". I found the connection IP from one of the emails that were accepted and tried to look it up under Reputation Tools > Find Sender, but got "The sender does not belong to any sender group.". Then I tried IP Reputation Lookup and got the following: I cannot ...
new discussion 03 Sep 2015
I have installed the SEP 11 and symantec protection engine 7.0 to my Windwos server 2008 R2. I have run the command of "etup-iu.bat enable" under c:\program files (x86)\symantec\scan engine\definitions\antivirus. As the antivirus definitation of SEP 11 is updated by my company's server, the antivirus definitation of symantec protection engine 7.0 will be updated. However, after I have updated ...
new discussion 03 Sep 2015
Hi All, I have a problem applying a manual update patch for virus definition on Mac OSX. Btw, SEP client is 12.1.6. Kindly see image below. Thanks and regards.
updated article 31 Aug 2015
Summary Many times, a Data Center Security (DCS) administrator needs to be notified when a critical system is offline.  While it is possible to capture and alert on these events in the DCS console, it is not a default setting.  In this article we will examine step-by-step the necessary settings that need to be configured, and a short tutorial on how to construct the alert. Items ...
updated blog entry 01 Sep 2015
As everybody know the top 10 dangerous web app security risks: Injection flaws Cross - site scripting broken authentication and session management insecure direct object reference cross site request forgery security misconfiguration insecure cryptographic storage failure to restrict URL access insufficient transport layer protection Invalidated redirects and forwards Being an new techie to ...
new blog entry 31 Aug 2015
新しく発見されたマルウェアグループが、225,000 件の Apple アカウントログイン情報の盗難をはじめ、ほかにも多くの機密データの盗難に関与していたと報道されています。このマルウェアは KeyRaider と呼ばれています。ジェイルブレイクされた iOS デバイスを標的にし、ジェイルブレイクされたデバイス用のソフトウェアを専門に扱うサードパーティのアプリストアを通じて拡散します。盗まれた Apple ID は、「無料」アプリを提供するときや、他のユーザーに対するアプリ内課金に悪用されています。KeyRaider の影響を受けているのは、主に中国のユーザーです。 レイダース/失われたアカウント KeyRaider マルウェアの存在が明らかになったのは、人気のある iPhone コミュニティ、Weiphone のユーザーから、自分の Apple ...
new blog entry 31 Aug 2015
As software defined data centers grow more complex, security becomes more important – and tougher to implement. Symantec Data Center Security 6.6, which is being announced at VMWorld and will be generally available in Fall 2015, supports the speed of business by delivering dynamically adaptive and agile security for the data center. Always-on antimalware and threat protection are critical for ...
new blog entry 31 Aug 2015
A new malware family has been discovered that is reportedly responsible for the theft of 225,000 Apple account credentials, as well as a host of other sensitive data. The malware, dubbed KeyRaider, targets jailbroken iOS devices and is distributed through third-party app stores that specialize in software for jailbroken devices. The stolen Apple IDs are being used to provide “free” apps and ...
updated blog entry 28 Aug 2015
Scammers have moved quickly to take advantage of the Ashley Madison data breach and Symantec telemetry shows a spike in spam email campaigns mentioning the infidelity website. The breach and subsequent leak of user data has created a market opportunity for scammers seeking to take advantage of people affected by the breach. Immediately after the leak of a database of the site’s customers on ...
updated download 11 Aug 2015
I created this scrpt to address systems that have run our of disk space for various reasons and are no longer updating AV definitions. The only external utility you need is Psexec to remotely execute one of the scripts. To clean a single system you would use: CleanMark2.cmd Systemname To clean multiple systems, place all the systemnames in the BatchClrMk2.lst file and run the BatchClrMk2.cmd ...
updated download 11 Aug 2015
We encountered a problem at one point where a problem in our configuration caused a number of updates to sit on the manager unable to be posted using the BCP utility to the SQL database. The result of this was the details the console was showing us didn't represent what the reality was, clients loagging behind vastly on their updates when we knew that they were updating properly. I put ...
updated download 17 Jul 2015
The script below is intended to detect data leakage in helthcare environments. Files detecting by this script is widely used in a variety of medical diagnostic systems and may include personal ...
updated download 18 Jun 2015
updated download 18 Jun 2015
updated event 02 Sep 2015
Please join us for the next New York Metro Data Loss Prevention User Group meeting on Tuesday, September 15, 2015, from 1 p.m. to 5:30 p.m at Goldman Sachs. Lunch will be served and Happy Hour to follow! Agenda Lunch & Networking DLP Go Forward Strategy & Roadmap Michael Lin, Vice President of Product Management for Enterprise Security DLP Panel Discussion (Select Customers & Symantec ...
updated event 02 Sep 2015
Please join us for the next Western NY Security User Group Meeting on Friday, October 23rd, 2015, from 12:00pm to 4:30pm at the new Dave & Buster's in the Walden Galleria - Buffalo, NY! You will have an opportunity to network with your peers and learn more about SEP Integration with Advanced Threat Protection-Endpoint as well as security design principles and key controls that make it ...
updated event 31 Aug 2015
Please join us for the next Midwest Data Loss Prevention User Group Meeting on Thursday, September 24, 2015, from 12:00pm to 4:00pm at Maggiano's. Lunch will be served! AGENDA Customer Lunch & Networking Session Symantec DLP Senior Technical Product Manager - Thomas Cooper DLP Roadmap What's New In DLP 14 Q&A Session Customer Roundtable Conclusion, Feedback Survey, & Prize ...
updated event 17 Aug 2015
Please join us for the next Twin Cities Data Loss Prevention User Group meeting on September 17th from 11am to 3pm at Target Plaza Commons. Lunch will be served! Agenda: Welcome & Introductions Lunch & Networking Presentations  How Target Uses Symantec DLP - Ligia Forgaciu, Target DLP Consultant Roundtable Conclusion, Prize Drawings & Feedback Location Target Plaza ...
new event 11 Aug 2015
Getting ready to rollout Strong Authentication? Consider these 3 key elements! Thursday, August 20 at 11 a.m. (est) Are you implementing with Compliance in mind, aiming to protect information? Will it go beyond VPN and embrace the mobile workforce? How do you avoid burdening the IT staff or end users?   The consequences of inadequate security are pretty well understood ...
updated event 11 Aug 2015
Attention members of Symantec Security & Compliance User Groups! There is a webinar coming up on Wed, April 18 at 11:00 am (PDT) that you may be interested in. Get the inside scoop on how best to implement Symantec’s new Endpoint Protection 12.1. This 1-hour technical webinar will be delivered by Symantec’s Support Backline Engineers as well as Systems engineers. Topics: The new ...
updated event 11 Aug 2015
Presenter: Kevin Stultz, Sr. Product Manager This session will focus on utilizing asset inventory to create highly relevant CCS dashboards and reports as well as automating CCS rights management. Learn the tips and tricks on configuring this integration, to get the most out of it. We will demonstrate: Configuring integration with an inventory spreadsheet and/or CMDB   Configuring ...
updated event 11 Aug 2015
Wednesday, September 21, 2011 @ 10:00 AM PT / 1:00 PM ET Advanced Persistent Threats:  Cutting Through the Hysteria Presented by: Kevin Rowney, Director of Breach Response   We’ve all seen the term Advanced Persistent Threat or APT splashed across the headlines this year.  Major corporations claim that they were the victim of APTs.  Many companies have used the ...
updated event 11 Aug 2015
This session focused on deploying and configuring the integration connector between Symantec™ Control Compliance Suite (CCS) and Symantec™ Data Loss Prevention (DLP). The integration provided by this connector helps customers implement differentiated configuration standards based on the information Data Loss Prevention finds on the asset.  Information on data protection ...
updated event 11 Aug 2015
Join us on Thursday, June 9th for the third installment of the bimonthly compliance webinar series. This session will focus on deploying and configuring the integration connector between Symantec Control Compliance Suite (CCS) and Symantec Data Loss Prevention (DLP). The integration provided by this connector helps customers to implement differentiated configuration settings base on ...
updated video 17 Aug 2015
Learn how to install Symantec Endpoint Protection Manager (SEPM), activate your SEPM license, and create groups for deploying software to Symantec Endpoint Protection clients.
updated video 17 Aug 2015
Learn how to ensure that your Symantec Endpoint Protection Manager (SEPM) server meets installation requirements, locate and register your Symantec Endpoint Protection software license, and download the Symantec Endpoint Protection software. Check next videos of this series: Video 2# Title: Install Symantec Endpoint Protection Manager Description: Learn how to install Symantec Endpoint ...
updated video 17 Aug 2015
Learn how to prepare client computers for deployment, deploy Symantec Endpoint Protection client software using the Client Deployment Wizard, and ensure that clients are communicating with Symantec Endpoint Protection Manager (SEPM).
updated video 10 Aug 2015
This is the first of a series of three videos about IT Analytics for SEP v2.1. In this episode we discuss the benefits and features of ITA. 
updated video 10 Aug 2015
This is the last episode in a serie of 3 videos about IT Analytics for SEP. In this video we discuss the first configuration you need to make to retrieve envents from a SEPM. We also cover how to create custom reports using report builder and the cube view.
updated video 10 Aug 2015
This is the second episode of a series of 3 videos about IT Analytics for SEP. This episode covers the system requirements, implementation and initial configuration of ITA. 
updated video 27 Jul 2015
This training module aims to walk you through how to setup a new business partner in the Encryption module of the Management Portal. Watch more Videos in the Self-serve TLS video series: Self-serve TLS: Moving domains from one Business Partner to another Self-serve TLS: Getting visibility into your enforcements Self-serve TLS: Enforcing TLS encryption between you and the Email Security ...
updated video 27 Jul 2015
In this video you will be walked through the on-screen administration of Self-serve TLS, paying particular attention to configuring enforcements between your own domains and Symantec.cloud. The video will then show you how to test the domain to ensure that all is working as expected.
updated video 27 Jul 2015
This training module aims to walk you through configuring your services to ensure that all emails sent between you and the Email Security Service pass through an encrypted TLS channel.
new idea 03 Sep 2015
We need to be able to distribute virus definitions to our Linux clients the same way our Windows clients get the definitions. Our system is completely locked down, No Internet Access. I know this is a foreign concept to Symantec but our system is not connected to the Internet. We manually move the jdb files to the SEPM server and it distributes the definitions to the Windows SEP clients. We ...
new idea 03 Sep 2015
Hello,   in current version of Symantec Encryption Server 3.3.2 it is not possible to send user certificate for encryption when sending signed emails. Only certificate that will be sent to recipient when sending signed email is signing certificate that cannot be used by recipient to encrypt emails. This behavior is new since several releases. Earlier there was only one user certificate ...
new idea 02 Sep 2015
I was talking with a tech and they mentioned that the GUP bandwidth setting unlimited not actually unlimited and is somethink like 1Mb/s.   My suggestion is to rename the unlimited setting to Default (1Mb/s), keep the "Up to" as is and add an unlimited setting that is actually unlimted.  
updated idea 31 Aug 2015
Our company use Data Loss Prevention - while viewing incidents in either Network or Endpoint we highlight in yellow any sensitive data like SSN, credit cards numbers, etc.. My question is - Can you add a feature that will continue to allow the yellow highlighting of data but can you add a feature that will allow users to blackend sensitive data as well? I attached a file as an ...
new idea 28 Aug 2015
Hello SMG-SP doesn't support the "custom filter" module that allows us to block some undesired emails based on a spefic conditions like headers, subject, body, , "Envelope to", etc. Thus, can you please add this missing module in your future SMG-SP updates Regards Daniel Dawalibi
updated idea 27 Aug 2015
Hi All, I have been supporting Symantec Endpoint Protection for few years now, having said that, I have always felt it hard to identify the location that a client uses, from the SEPM Console. I know that this is fetchable from "Client Activity" logs or so, however, this is not very useful as this does not help us get the "Location" information for all clients. So, I would be, as an ...
new idea 26 Aug 2015
We tested the Disarm function in SMG 10.5.1 and every email coming in with a PDF attachment was flagged with "PDF Other". Since we don't really know what that removes from the file we were not able to use the Disarm feature for PDF all together. Would it be possible to make it a choice to enable this disam or not but leave the other PDF content types as an option?
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
AravindKM
293
1
Mithun Sanghavi
1245
60
SMLatCST
400
1
jjesse
61
24
ᗺrian
1965
19

A Message From Your Community Manager: Turls

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.