Video Screencast Help
updated discussion 19 Apr 2015
hi everyone, Good day i need help, how to run remotely liveupdate in silent ( user cant see a windows of live update) using psexec. can help me exact script that i will be use a. all wokstation in DOmain (active directrory) b. windows 7 and  XP c. SEP 12.1.5 installed d.GUP is inplace ( but i want to force to liveupdate of the client) thanks
new discussion 19 Apr 2015
hi everyone, please enlight me with setup of 1 SMG 8340 (inbound and oubtound filtering), what are the network adjustment needed specially in firewall; we plan the SMG will be install behind firewall. Please see detail below if the configuration are correct? a.1 private each for (inbound and outbound) and 1 public Ip---  Do i request to firewall admin to create NAT 1 public address to 2 ...
new discussion 18 Apr 2015
Hello Guyz Hope you are fine.i was facing issue upgrading dlp 12.5 from 12.0.i am following major setps to upgrading which are as mentioned below. 1.firstly i have a jar file of 12.0.1 to upgrade 12.5. but when i upload this file it wil take 1 minute process and it shows some error.i am also attaching snapshots whichi will be easily to understand this issue.PFA.i am waiting your best response.
updated discussion 19 Apr 2015
hi everyone, Good day i need help, how to run remotely liveupdate in silent ( user cant see a windows of live update) using psexec. can help me exact script that i will be use a. all wokstation in DOmain (active directrory) b. windows 7 and  XP c. SEP 12.1.5 installed d.GUP is inplace ( but i want to force to liveupdate of the client) thanks
new discussion 19 Apr 2015
hi everyone, please enlight me with setup of 1 SMG 8340 (inbound and oubtound filtering), what are the network adjustment needed specially in firewall; we plan the SMG will be install behind firewall. Please see detail below if the configuration are correct? a.1 private each for (inbound and outbound) and 1 public Ip---  Do i request to firewall admin to create NAT 1 public address to 2 ...
new discussion 18 Apr 2015
Hello Guyz Hope you are fine.i was facing issue upgrading dlp 12.5 from 12.0.i am following major setps to upgrading which are as mentioned below. 1.firstly i have a jar file of 12.0.1 to upgrade 12.5. but when i upload this file it wil take 1 minute process and it shows some error.i am also attaching snapshots whichi will be easily to understand this issue.PFA.i am waiting your best response.
updated article 16 Apr 2015
For this demonstration, I will be using Symantec Endpoint Encryption 11.0.1 on Windows Server 2012 R2 Datacenter, 64-bit. This demonstration assumes that you have a compatible database already created for use with the product.  System requirements and compatible versions of MSSQL can be found here: http://www.symantec.com/docs/TECH224478 This demonstration also assumes that you have ...
updated article 16 Apr 2015
For this demonstration, I will be preparing a Windows Server 2012 R2 Datacenter, 64-bit system for hosting Symantec Endpoint Encryption Management Server 11.0.1. This demonstration also assumes that you have a compatible database already created for use with the product.  System requirements and compatible versions of MSSQL can be found ...
updated article 14 Apr 2015
Before we begin, I would like to let the reader know that the product for standalone drive encryption installations is Symantec Encryption Desktop.  This guide is intended for managed environments already using Symantec Endpoint Encryption who have a need for a small number of standalone clients that are outside of their domain or for hardware testing.  If you have the need for a ...
updated article 13 Apr 2015
FakeAV is a detection for Trojan horse programs that intentionally misrepresent the security status of a computer. These programs attempt to convince the user to purchase software in order to remove non-existent malware or security risks from the computer. The user is continually prompted to pay for the software using a credit card. Some programs employ tactics designed to annoy or disrupt ...
article comment 13 Apr 2015
new blog entry 17 Apr 2015
A few weeks ago, Microsoft launched a new addition to their Bing Webmaster Tools which allows website operators to monitor their web domains to help insure there are no improperly issued SSL certificates. This is a great benefit to those owners because: It’s easy to use and Microsoft monitors this for free The Certificate Authorities do not need to do anything special. Certificates are ...
updated blog entry 17 Apr 2015
A newly patched vulnerability in Windows has set alarm bells ringing because it can be used to remotely execute code on unpatched computers. Unsuccessful attempts may result in a blue screen of death (BSoD) condition, which could be used as a means to perform denial-of-service (DoS) attacks against computers running Microsoft Internet Information ...
updated blog entry 17 Apr 2015
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing 11 bulletins covering a total of 26 vulnerabilities. Thirteen of this month's issues are rated ’Critical’. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required ...
updated blog entry 17 Apr 2015
An international law enforcement operation against the Simda cybercrime botnet (detected by Symantec as Trojan.Rloader.B) has resulted in the seizure of infrastructure owned by its controllers, including a number command-and-control (C&C) servers. Interpol estimated that Simda has infected more than 770,000 computers in total worldwide. The operation took place last Thursday and Interpol this ...
updated blog entry 17 Apr 2015
It’s often said that the only constant in life is change. This certainly rings true in the realm of internet security, where the struggle between those who are trying to protect the digital world and those who are trying to exploit it remains a long-standing game of cat-and-mouse. Volume 20 of Symantec’s Internet Security Threat Report (ISTR) reveals that cyberattackers are infiltrating ...
new blog entry 16 Apr 2015
Symantec’s just released Internet Security Threat Report shows that cybercriminals have been busier than ever. And social engineered attacks are one vector that continue to see growth due to the likelihood of success. Although the attacks come in different forms, one approach fools unsuspecting users to click a link which takes them to a “look-a-like” website. That imitation site is typically ...
new blog entry 15 Apr 2015
On 14th July 2015, Microsoft will end support for all versions of Windows Server 2003, meaning that Microsoft will no longer offer the following: Security patches that help protect PCs from harmful viruses, spyware, and other malicious software Assisted technical support from Microsoft Software and content updates Symantec Endpoint Protection 12.1 customers who are on up-to-date maintenance ...
new blog entry 14 Apr 2015
I've tried below step in a machine & it worked fine. But we have around 250-275 machine in our network, in which nearly 100 machines(including Servers) this files are getting generated. Is there any solution for stopping it from centralized manager? Please let me know 1) Disable Tamper Protection. 2) Open a Command Prompt window. 3) del "C:\ProgramData\Symantec\Symantec ...
updated blog entry 14 Apr 2015
Security at the speed of need. Imagine that. Let’s come back to that thought in a moment. The modern data center has come a long way from the “server room” of twenty-plus years ago. Today, data centers might be hiding inside large, football-field-sized industrial areas, protected by fences and secure physical access. With that size and utilization, companies are working to run their data ...
new blog entry 14 Apr 2015
All the major browsers provide “security user interface”, meaning visual elements to inform the user of the security of their connection to the web page they’re visiting. Up until now, those interface elements were tied to the use of SSL/TLS certificates served by the web site. For example, if you went to http://www.example.com, no special elements would be displayed, but if you visited ...
updated download 08 Jan 2015
To build on my last IR article: How to utilize SEP 12.1 for Incident Response - PART 6 I'm attaching a custom IPS policy which will detect the download of various filetypes via HTTP and HTTPS. The signatures are in Allow mode and set to write to the Packet log for detailed information. As of now, this policy will detect 37 different filetypes. I will update it as I add more. Feel free to use ...
download comment 05 Dec 2014
updated event 13 Apr 2015
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Symantec Data Loss ...
updated event 13 Apr 2015
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Symantec Endpoint ...
updated event 09 Apr 2015
Please note: This meeting has been rescheduled to a week later on Friday, April 17th! Due to an illness, Mike will be unable to attend and present tomorrow. We apologize for the short notice and any inconvenience this may have caused. We hope to see you there next week! Please join us for the next Twin Cities Data Loss Prevention User Group meeting on Friday, April 17th from 11:00am to 3:00pm ...
new event 10 Mar 2015
Presented by: Pete Lindstrom, Director, Security Products, IDC Research Nico Popp, Vice President Information Protection, Symantec   Webcast Summary: The cloud has changed the way we do business and is forcing us to rethink security in new ways. The fact that information flows freely outside of the enterprise walls and back again means we need to consider how we secure that information ...
updated event 09 Mar 2015
Please join us for the next Philadelphia Security & Compliance User Group meeting on Wednesday March 11th from 9:00am to 12:00pm at Dave & Buster's. The meeting will feature presentations on SEP and DLP from Symantec. Lunch will be served! Agenda: Welcome, Announcements & Introductions Roadmap of Security Solutions by Neil Christie, Symantec SEP DLP Planning, Prizes and ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
updated video 09 Apr 2015
This video shows how groups are created and used within the Symantec Endpoint Protection Small Business Edition management console. ************************************************************************************************************* SCRIPT: Welcome to this program on creating and using groups in your Symantec Endpoint Protection Small Business Edition account. In this video, you will ...
updated video 09 Apr 2015
This program includes captions. This video shows how groups are created and used within the Symantec Endpoint Protection Small Business Edition management console. ************************************************************************************************************************* SCRIPT: Welcome to this program on creating and using groups in your Symantec Endpoint Protection Small ...
updated video 09 Apr 2015
You must download Agents before your Symantec Endpoint Protection Small Business Edition services will work. This video demonstrates how to download agents using any of the three download methods:     Directly to a computer; or     As a redistributable package; or     As download invitations to up to 50 users More details about "Installing and ...
updated video 09 Apr 2015
You must download Agents before your Symantec Endpoint Protection Small Business Edition services will work. This video demonstrates how to download agents using any of the three download methods: Directly to a computer; or As a redistributable package; or As download invitations to up to 50 users More details about "Installing and managing Agents" can be seen in the Online Help. Click here ...
video comment 17 Mar 2015
updated video 19 Feb 2015
This is lesson 7 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelilgence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 5 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated idea 17 Apr 2015
It would be really a Good Idea if could add a separate column "Machine Serial Number" in the computer status logs. At present,we are only able to view individual machine "Serial Number" detail inside clients properties template(GUI).
new idea 17 Apr 2015
Microsoft  asks to exclude from antivirus scans some outlook related folder located in user profiles, to do this iot is necessary the  %USERPROFILE% variable that actually is not included in Endpoint Protection variables.
new idea 16 Apr 2015
Since the upgrade of our windows clients (from XP to Windows 7), some of our applications utilize the specific logged on user's appdata area that require to be excluded.  So as an example of an expected exclusion might be the following; %USERPROFILE%\AppData\Local\eScription\ However this option is not available within endpoint version 12.1.5.
new idea 16 Apr 2015
I think within the USB Device control it would be good idea to have a logging facilty where it logs against the computer name what are the file names put onto the USB stick to allow a complete auditing of what users within a company are taking off the internal network and whether they acturally have authorisation to do so.  I think there should also be a button to which you can suddenly ...
new idea 16 Apr 2015
The computer groups on the Computers Tab in the hosted portal it would be an excellent idea to be able to have Sub-Groups as organisations such as myself with mutilple sites it's really important will have a drill down option like the on premise version has so it looks a little like Active Directory on the structure.  Is this something which can be easly added to the portal ? Kind ...
new idea 15 Apr 2015
As detailed on the support thread here: https://www-secure.symantec.com/connect/forums/inc... DLP Network inidents can be sorted by Sender or Domain.  However they cannot be sorted based on the Recipient field.  This field is available for a filter with specific criteria, but cannot be used for listing and summarizing all incidents by recipient field. Current workarounds are to ...
new idea 15 Apr 2015
Ola, Seria interessante que nos relatorios de 'Incident Quarantine' fossem exibidas informações de ações tomadas (Reject, Approve, Custom) aplicadas em mensagens encaminhas de regras de spam e malware, além das regras de conteúdo. Hoje o relatório exibe somente ações tomadas (Reject, Approve, Custom) para mensagens que estão relacionadas a filtro de conteudo. Para quem trabalha com ...
updated idea 14 Apr 2015
Hi Symantec, as you should have noticed in "Case: 08518930 - Unwarranted disk activity [ ref:_00D30jPy._50050beQZa:ref ]", the Outlook Scanner accesses all disks in certain situations, such as when you attach a file located on disk C to my mail. If a disk is sleeping (as my second disk D always is), this means that Outlook totally freezes for a couple of seconds until the disk have spun ...
new idea 14 Apr 2015
Would be useful as we have some pretty large estates with multiple GUPs for a notification or something on machine if anyone tries to rebuild it to say this is a GUP do you really want to rebuild this machine?  We have had a few instances now where other departments have rebuilt servers not knowing they are GUPs and not notifying us so all we can see is the GUP offline and takes alot of ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
AravindKM
293
1
Brɨan
1814
19
Mithun Sanghavi
1239
59
SMLatCST
379
1
jjesse
58
24

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.