Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.
new discussion 26 Apr 2015
Hi I'm new to this website. I have a USB with Symantec Endpoint Encryption (I have no idea which version). I only used the USB once and it was 2 months ago. I  can't rememebr the password. What is the process for resetting/removing the password?
updated discussion 25 Apr 2015
Hello, Where can I find Symantec Documentation on exactly what gets created on the database during SEPM installation/configuration? Thank you.
new discussion 25 Apr 2015
Hi All, I have client(Win7) on which Symantec Data Center Security 6.5 agent is installed. I want to detect and log port scan (using NMAP/Zenmap) activity on that agent machine and after that need to prevent that machine from being port scanning (or if attacker scan that machine will not provide port status.) Baseline: 1) Need to make Detection Policy , 2) Need to make Prevent ...
new discussion 25 Apr 2015
Hello Guyz. Can any one share the Snap shots of installation of Data insight.
new discussion 26 Apr 2015
Hi I'm new to this website. I have a USB with Symantec Endpoint Encryption (I have no idea which version). I only used the USB once and it was 2 months ago. I  can't rememebr the password. What is the process for resetting/removing the password?
updated discussion 25 Apr 2015
Hello, Where can I find Symantec Documentation on exactly what gets created on the database during SEPM installation/configuration? Thank you.
new discussion 25 Apr 2015
Hi All, I have client(Win7) on which Symantec Data Center Security 6.5 agent is installed. I want to detect and log port scan (using NMAP/Zenmap) activity on that agent machine and after that need to prevent that machine from being port scanning (or if attacker scan that machine will not provide port status.) Baseline: 1) Need to make Detection Policy , 2) Need to make Prevent ...
new discussion 25 Apr 2015
Hello Guyz. Can any one share the Snap shots of installation of Data insight.
updated article 23 Apr 2015
Creation of Certificate for SEE RME to encrypt new file(Encryption Method) From the CA Machine Open the hyper link  http://localhost/cersrv Select Request a Certificate Click “Submit an Advanced Certificate Request” Check the details selected, add a Friendly Name and Click Submit Select Install After it is done will get a message the Certificate is successfully installed. From ...
updated article 16 Apr 2015
For this demonstration, I will be using Symantec Endpoint Encryption 11.0.1 on Windows Server 2012 R2 Datacenter, 64-bit. This demonstration assumes that you have a compatible database already created for use with the product.  System requirements and compatible versions of MSSQL can be found here: http://www.symantec.com/docs/TECH224478 This demonstration also assumes that you have ...
updated article 16 Apr 2015
For this demonstration, I will be preparing a Windows Server 2012 R2 Datacenter, 64-bit system for hosting Symantec Endpoint Encryption Management Server 11.0.1. This demonstration also assumes that you have a compatible database already created for use with the product.  System requirements and compatible versions of MSSQL can be found ...
updated article 14 Apr 2015
Before we begin, I would like to let the reader know that the product for standalone drive encryption installations is Symantec Encryption Desktop.  This guide is intended for managed environments already using Symantec Endpoint Encryption who have a need for a small number of standalone clients that are outside of their domain or for hardware testing.  If you have the need for a ...
updated blog entry 24 Apr 2015
1994 tehtiin ensimmäinen verkko-ostos: iso pepperonipizza herkkusienillä ja extrajuustolla, Pizza Hutista. Seuraavien 20 vuoden aikana verkkokauppatalous on ollut vilkasta ja 2013 myynti ylitti 1,2 biljoonaa Yhdysvaltain dollaria. Verkkokaupankäynnin kasvu perustuu luottamukseen. Kuluttajat luottavat sivustojen pitävän kirjaa rahavirrasta, ja että ostosten tekeminen on turvallista ja ...
updated blog entry 24 Apr 2015
Every day, cybercriminals develop new ways to use malicious code (malware) to avoid detection while infecting networks, software and devices – from enterprise level to personal. The newly released Symantec Internet Security Threat Report Vol 20 found non-targeted attacks still make up the majority of malware, which increased by 26 percent in 2014. In fact, according to the report, there were ...
updated blog entry 24 Apr 2015
A newly patched vulnerability in Windows has set alarm bells ringing because it can be used to remotely execute code on unpatched computers. Unsuccessful attempts may result in a blue screen of death (BSoD) condition, which could be used as a means to perform denial-of-service (DoS) attacks against computers running Microsoft Internet Information ...
new blog entry 23 Apr 2015
ランサムウェアは当初欧州に出現し、その後世界中に拡がった脅威です。これまでは世界中の裕福な英語圏地域を主に標的としてきました。しかし、サイバー犯罪者は、極東地域の各国への関心を高めているようです。 極東市場に標的を移そうとする場合には、いくつかの問題が生じます。住民の多くは英語を理解しないため、英語で書かれた脅迫文の内容を理解できないかもしれません。このため、身代金を奪い取る巨大なチャンスが韓国や日本に存在することを認識したサイバー犯罪者は、ランサムウェアを各地域の言語にローカライズするようになってきています。たとえば、2014 年 12 月には日本のユーザーを標的として設計された初のランサムウェアが確認されました。これは TorLocker の亜種であり、シマンテック製品では Trojan.Cryptolocker ...
updated blog entry 22 Apr 2015
Enterprises and consumers are embracing the emergence of cheaper and readily accessible Internet-connected technologies. The Internet of things (IoT) are embedded computing devices with internet connectivity which includes a wide range of devices: digital home thermostats, smart TVs, car systems (navigations, entertainment and engine management computers), networking devices, smart watches ...
updated blog entry 22 Apr 2015
Ransomware was a phenomenon that first emerged in Europe and then spread throughout the world. Primarily, the focus had been on affluent and English-speaking regions of the world. But increasingly we have seen cybercriminals turn their attention to countries in the Far East. Moving to target a Far Eastern market does present some problems. Many citizens of the Far East do not understand ...
new blog entry 22 Apr 2015
Click below for our full detailed description and learn about how, why and where Contextual Access can save you time, money and headaches.
updated blog entry 21 Apr 2015
We’ve all been there. You’re in the middle of reading or watching the latest edge-of-your-seat cyber-thriller, only to have it ruined for you when you hit a plot point that makes you scream “come on, that would never happen in the real world!” Whether the plot includes ridiculously simple GUIs, the ability to upload a virus to a super-advanced alien spaceship, or the ability to gain control ...
updated download 08 Jan 2015
To build on my last IR article: How to utilize SEP 12.1 for Incident Response - PART 6 I'm attaching a custom IPS policy which will detect the download of various filetypes via HTTP and HTTPS. The signatures are in Allow mode and set to write to the Packet log for detailed information. As of now, this policy will detect 37 different filetypes. I will update it as I add more. Feel free to use ...
download comment 05 Dec 2014
updated event 13 Apr 2015
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Symantec Data Loss ...
updated event 13 Apr 2015
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Symantec Endpoint ...
updated event 09 Apr 2015
Please note: This meeting has been rescheduled to a week later on Friday, April 17th! Due to an illness, Mike will be unable to attend and present tomorrow. We apologize for the short notice and any inconvenience this may have caused. We hope to see you there next week! Please join us for the next Twin Cities Data Loss Prevention User Group meeting on Friday, April 17th from 11:00am to 3:00pm ...
new event 10 Mar 2015
Presented by: Pete Lindstrom, Director, Security Products, IDC Research Nico Popp, Vice President Information Protection, Symantec   Webcast Summary: The cloud has changed the way we do business and is forcing us to rethink security in new ways. The fact that information flows freely outside of the enterprise walls and back again means we need to consider how we secure that information ...
updated event 09 Mar 2015
Please join us for the next Philadelphia Security & Compliance User Group meeting on Wednesday March 11th from 9:00am to 12:00pm at Dave & Buster's. The meeting will feature presentations on SEP and DLP from Symantec. Lunch will be served! Agenda: Welcome, Announcements & Introductions Roadmap of Security Solutions by Neil Christie, Symantec SEP DLP Planning, Prizes and ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
updated video 09 Apr 2015
This video shows how groups are created and used within the Symantec Endpoint Protection Small Business Edition management console. ************************************************************************************************************* SCRIPT: Welcome to this program on creating and using groups in your Symantec Endpoint Protection Small Business Edition account. In this video, you will ...
updated video 09 Apr 2015
This program includes captions. This video shows how groups are created and used within the Symantec Endpoint Protection Small Business Edition management console. ************************************************************************************************************************* SCRIPT: Welcome to this program on creating and using groups in your Symantec Endpoint Protection Small ...
updated video 09 Apr 2015
You must download Agents before your Symantec Endpoint Protection Small Business Edition services will work. This video demonstrates how to download agents using any of the three download methods:     Directly to a computer; or     As a redistributable package; or     As download invitations to up to 50 users More details about "Installing and ...
updated video 09 Apr 2015
You must download Agents before your Symantec Endpoint Protection Small Business Edition services will work. This video demonstrates how to download agents using any of the three download methods: Directly to a computer; or As a redistributable package; or As download invitations to up to 50 users More details about "Installing and managing Agents" can be seen in the Online Help. Click here ...
video comment 17 Mar 2015
updated video 19 Feb 2015
This is lesson 7 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelilgence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 5 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
new idea 23 Apr 2015
I would like a report or log that will tell me what device was moved from one group to another group? Under Monitors then Logs tab I can do a System, Administrative but it just tells me what admin moved a device from one group to another. I would like to know the device name and original group then what group it was moved to.
new idea 22 Apr 2015
We would like the ability to limit browser usage when connected to an outside network.  However, disabling the browser often stops the end user from being able to connect to a hotel web interface to establish their wifi connection, so that they may connect back to a company VPN. To do this, we would need a feature where we can put a time limit on how long an application can be ...
updated idea 22 Apr 2015
When user response (in User Cancel) is "Cancel", would be great to have the possibility to: - Not create incident / Delete automatically the incident Reason: there is no actual action/violation by the user (ex: email is not sent; print is not made, etc.)
new idea 22 Apr 2015
Hi, The company I work for has been using CCS since it was BindView. We've updated to each new version as it's been released since then and now we just recently upgraded to CCS 11.1. For some odd reason though version 11x has taken out the scheduling wizard features that were present in previous versions. Thus I'm writing this in hopes that it will get added back. I've inserted two images ...
new idea 21 Apr 2015
It's not possible to display message audit log information of connections rejected because of Symantec's Global Bad Sender list in SMG's message audit logs. This kind of SMTP connections logged as seen below. I think at least there has to be a "Reasonable Verdict" related with the Connection IP address and/or Domain name.
new idea 21 Apr 2015
It's very difficult to create a new explicit GUP policy mapping table especially if there are many C-class subnets in the network. It would be very nice and useful if there is an "import from file" (csv, txt etc.) option while creating the policy.
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
AravindKM
293
1
Brɨan
1826
19
Mithun Sanghavi
1241
59
SMLatCST
381
1
jjesse
59
24

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.