Video Screencast Help
new article 08 Feb 2016
Using ADC to block Chrome extensions There may be situations where you wish to block end-users from utilizing a specific Google Chrome browser extension. This can be accomplished, fairly easily, via Application and Device Control in Symantec Endpoint Protection. The first part of this process is identifying not just the extension to block, but more importantly the unique ID associated with the ...
updated article 08 Feb 2016
Hi All, As I am working on Symantec Endpoint Protection 12.1.since more than year, I went through different issues on Symantec Manager and client and most important different Viruses, Worms and Trojans. Here I am sharing some best practices which I have learned during such threat incident management. Virus A computer virus is a program designed to harm or cause harm on an infected computer. ...
new article 04 Feb 2016
Real Use Case: An Apache Web Server was compromised and the following folders were used to store malware code.                                                 /home/XXX/public_html/XXXX/                         ...
new blog entry 11 Feb 2016
今月のマイクロソフトパッチリリースブログをお届けします。 今月は、13 個のセキュリティ情報がリリースされており、そのうち 6 件が「緊急」レベルです。 いつものことですが、ベストプラクティスとして以下のセキュリティ対策を講じることを推奨します。 ベンダーのパッチが公開されたら、できるだけ速やかにインストールする。 ソフトウェアはすべて、必要な機能を使える最小限の権限で実行する。 未知の、または疑わしいソースからのファイルは扱わない。 整合性が未知の、または疑わしいサイトには絶対にアクセスしない。 特定のアクセスが必要な場合を除いて、ネットワークの周辺部では重要なシステムへの外部からのアクセスを遮断する。 マイクロソフトの 2016 年 2 ...
new blog entry 11 Feb 2016
この記事を公開した時点では、ボットソフトウェア Hearthbuddy の購入・ダウンロードページの画像を載せていました。これは、利用可能なボットの一般的な例を示しただけであり、Hearthbuddy 自体がマルウェアである、もしくはマルウェアを含んでいるとシマンテックが示唆した(あるいは示唆しようと意図した)わけではありません。万一にも混乱がありましたら、お詫びいたします。 『ハースストーン』は、『ワールド オブ ...
updated blog entry 11 Feb 2016
The Symantec team has some great presentation proposals for the Newton summit.  Please vote to help us share this information with the community! Check out the talks and vote here: Ansible - Beyond Playbooks & OpenStack Deployment Application of Cloud Policies Bookmarking your Favorites: A Group-based Image Sharing Mechanism Creating a Hybrid Cloud - Openstack + Public Cloud ...
new blog entry 11 Feb 2016
Autor: Lionel Payet A popularidade do Netflix tem crescido de forma acentuada desde a sua criação em 1997. A empresa lançou recentemente seu serviço de streaming globalmente. Agora o serviço está disponível em mais de 190 regiões em todo o mundo. Este sucesso tem atraído a atenção de grupos de ataques. Temos observado campanhas de malware e phishing tendo como alvo as informações de usuários ...
new blog entry 11 Feb 2016
Netflix’s popularity has sharply grown since its creation in 1997. The company recently launched its streaming service globally. It is now available in more than 190 regions around the world. This success has attracted the attention of attackers. We have observed malware and phishing campaigns targeting Netflix users’ information. The details are then added to a growing black market that ...
updated blog entry 10 Feb 2016
A previous edition of this blog featured an image of the Hearthbuddy bot software purchase and download page. This was just shown to provide a general example of an available bot. Symantec did not suggest (nor intend to suggest) that Hearthbuddy itself is or contains malware. Symantec apologizes for any confusion. Hearthstone, a free-to-play card game based on World of Warcraft, has ...
updated blog entry 10 Feb 2016
金融詐欺をしかけるトロイの木馬 Dyre を操るサイバー犯罪集団が、去る 11 月、ロシアの法執行機関による取り締まりによって、かなりの打撃を被ったようです。シマンテックの遠隔測定でも、このグループの活動が実質上停止していることが確認されました。Dyre(シマンテックでは、Infostealer.Dyre として検出されます)は、メールによるスパム活動を通じて拡散しますが、Dyre に関連するスパムの活動は 11 月 18 日以降、確認されていません。Dyre とそれに関連するマルウェアの検出数も、同月なかばから大幅に少なくなっています。 スパム活動が突然停止 Dyre は、主にスパムメールによって拡散し、そのほとんどはビジネス文書、音声メール、FAX メッセージなどに偽装しています。Dyre のグループは、平日のほとんど、1 日に 1 種類から 15 ...
updated blog entry 09 Feb 2016
t Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing 13 bulletins, six of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid handling files ...
updated blog entry 09 Feb 2016
We’re excited to announce that in the newly released 2016 Gartner Magic Quadrant for Data Loss Prevention, Symantec has been named a leader for the ninth straight year, scoring higher in execution and further in vision than ever before. The Magic Quadrant is a culmination of research in a specific market, providing insights on how well technology providers are executing their stated ...
updated blog entry 09 Feb 2016
On February 3rd 2016, Gartner published its 2016 edition Gartner Magic Quadrant for Endpoint Protection Platform (EPP). Symantec hit another milestone by being a Gartner Magic Quadrant Leader for the 14th year in a row. In addition, we’re once again positioned the highest in the Ability to Execute. It is our belief that Symantec’s Magic Quadrant leadership position is an indication of a ...
updated download 13 Nov 2015
new event 10 Feb 2016
Live CyberStrike Event!  Remediate Today's Threats Fast with Symantec ATP Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt.  With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network.  It’s no longer a matter of if you’ll suffer ...
new event 02 Feb 2016
Get a complimentary Expo Hall Pass & come visit our booth! Register for the RSA Conference and use this registration code to get your free expo hall pass: XSSYMNTC16. Symantec is pleased to be a Platinum sponsor of the 25th edition of RSA Conference and we invite you to join this Silver Anniversary with us! Come check out our keynote "Peek into the Future: The Security Operations ...
updated event 28 Jan 2016
LIVE CYBRESTRIKE EVENT! REMEDIATE TODAY'S THREATS FAST WITH SYMANTEC ADVANCED THREAT PROTECTION (ATP). Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt.  With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network.  It’s no longer a ...
new event 25 Jan 2016
Live CyberStrike Event!  Identify, Prioritize and Remediate Today's Threats with Symantec Advanced Threat Protection! Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt.  With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. ...
new event 25 Jan 2016
Live CyberStrike Event!  Identify, Prioritize and Remediate Today's Threats with Symantec Advanced Threat Protection! Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt.  With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. ...
new event 25 Jan 2016
Live CyberStrike Event!  Identify, Prioritize and Remediate Today's Threats with Symantec Advanced Threat Protection! Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt.  With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. ...
new event 25 Jan 2016
Live CyberStrike Event!  Identify, Prioritize and Remediate Today's Threats with Symantec Advanced Threat Protection! Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt.  With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. ...
new event 25 Jan 2016
Live CyberStrike Event!  Identify, Prioritize and Remediate Today's Threats with Symantec Advanced Threat Protection! Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt.  With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. ...
new video 08 Feb 2016
This demonstration steps through exporting and importing policy templates and creating a policy. This video is part of a larger series on the administration of Data Loss Prevention 14. The entire series can be found on this index page: Data Loss Prevention 14: Administration – Training Videos.
new video 08 Feb 2016
This video will help new customers to provision their domains and inbound routes once they have access to the administration portal.
new video 05 Feb 2016
This lesson covers policy management including creating policy groups, using policy templates, building policies, and policy development best practices. This video is part of a larger series on the administration of Data Loss Prevention 14. The entire series can be found on this index page: Data Loss Prevention 14: Administration – Training Videos.
new video 04 Feb 2016
This demonstration is on incident remediation, including adding a role to the system. This video is part of a larger series on the administration of Data Loss Prevention 14. The entire series can be found on this index page: Data Loss Prevention 14: Administration – Training Videos.
new video 04 Feb 2016
This module covers incident remediation and workflow, including managing roles and users. This video is part of a larger series on the administration of Data Loss Prevention 14. The entire series can be found on this index page: Data Loss Prevention 14: Administration – Training Videos.
updated video 04 Feb 2016
This video will show you how to use a customized Win PE CD to recover a drive encrypted by Symantec Encryption Desktop. This video is part of a larger PGP Quick Series. The entire series can be found on this index page: PGP - Symantec Encryption Desktop. Quick Series - Training Videos.
new video 04 Feb 2016
This video will show you how to take root access of Symantec Encryption Management Server from a Mac. This video is part of a larger PGP Quick Series. The entire series can be found on this index page: PGP - Symantec Encryption Desktop. Quick Series - Training Videos.
new video 04 Feb 2016
This video will show you how to use PGP viewer on OS X. This video is part of a larger PGP Quick Series. The entire series can be found on this index page: PGP - Symantec Encryption Desktop. Quick Series - Training Videos.
new video 04 Feb 2016
This video will show you how to create a smart card key pair in SED. This video is part of a larger PGP Quick Series. The entire series can be found on this index page: PGP - Symantec Encryption Desktop. Quick Series - Training Videos.
new idea 11 Feb 2016
Atualmente nas Políticas do Endpoint Protection Cloud podemos possibilitar aos usuários de determinada política/grupo desativarem o antivírus, porém penso que deveria haver a possibilidade de habilitarmos este recurso porém a desativação seria possível somente mediante o uso de uma senha, tal como é na versão on-promise. A senha deveria ser diferente da senha de desinstalação do ...
updated idea 08 Feb 2016
Hopefully there have been many requests for what I see as a serious gap in the DLP product.  Symantec really needs to provide us the ability to perform network discovery of Linux/UNIX file systems over SSH.  File discover is an area the regulators are emphasizing regardles of the file system.
updated idea 07 Feb 2016
As many virus are getting into the system through USB drives, it should be the best feature if usb gets auto scan and virus can be eliminate. And user can also get awareness about the virus in his/her usb. It can be benefit both the user and administrator.
updated idea 04 Feb 2016
Using a separate un-installer to upgrade Macs is cumbersome. Please add the ability to upgrade a currently installed agent using the newest build only. We have 100s of Macs to upgrade. Also, we should have the ability to upgrade via the SEPM console. This has been promised for many version now. When will this feature be available? Thanks.
updated idea 03 Feb 2016
one of our competitive product have the encryption virus blocking tool. why our product not available these kind of feature.! my sugestion is please implement the it on next release. if attacker every time they change the signature our data every time will loose. please think about this feature.
new idea 03 Feb 2016
Since cmdmatchv2.exe is not public anymore , could you create a tool that can be used by Partner Consultants in order to troubleshoot Data Center Security command line matching issues? Is very common to find issues with arguments , if that requires to open a ticket with Support to verify means a cost for Symantec and Partners. Or at least that DCS can verify the argument and give an ...
new idea 03 Feb 2016
Add sav functionality or provide parsing tool to read all SEP client logs in human readable form from the command line on supported Unix platforms
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
AravindKM
293
1
Mithun Sanghavi
1252
60
SMLatCST
403
1
jjesse
66
24
ℬrίαη
2158
21

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.