Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
updated blog entry 3 hours 56 min ago
De acordo com o relatório da Agência de Justiça e Estatísticas de Vítimas de Roubo de Identidade, cerca de 16,6 milhões de americanos com mais de 16 anos foram vítimas de pelo menos um incidente de roubo de identidade em 2012. A perda econômica direta de roubo de identidade foi de cerca de US$ 1,000 por pessoa e as perdas totais diretas e indiretas foi de aproximadamente 24,7 bilhões de ...
updated blog entry 3 hours 57 min ago
Según un informe de la Oficina de Justicia y Estadísticas de Víctimas de Robo de Identidad, alrededor de 16,6 millones de estadounidenses mayores de 16 años han sido víctimas de al menos un incidente de robo de identidad en 2012. Las pérdidas económicas directas por robo de identidad fueron alrededor de $ 1.000 por persona y las pérdidas totales directas e indirectas fueron de aproximadamente ...
new blog entry 4 hours 38 sec ago
Most of you reading this will immediately connect the acronym “RSA” with the encryption algorithm invented in 1977 by Rivest, Shamir and Adleman and which is still today the most-adopted in Public Key Infrastructure (PKI) systems, such as SSL. Through a mathematical process that remains ingenious even by modern standards its merits are strong, but the world changes very quickly in technology ...
updated event 4 hours 55 min ago
Please join us for the next Twin Cities Data Loss Prevention User Group meeting on September 24th from 9am to 2pm at the Symantec Roseville Office.   Lunch will be served!   Agenda: Welcome & Introductions Customer Discussion IT Analytics and DLP Roadmap by Mark Deardurff, Symantec Discussions/Roundtable Lunch, prize drawings and conclusion   Location Symantec Roseville Office ...
updated discussion 6 hours 41 min ago
Dear Support team My computer used windows 8 and installed Symantec Endpoint 12.1. If I turn Enbale Firewall" I could not ping other machine else I can ping all I want enable firewall and can ping other machin. What do I need setting ? BR/Duy  
updated article 08 Sep 2014
Problem Statement: DLP 12.5 Endpoint Agent Stops Triggering Any Incidents after deploying HIPAA and HITECH (including PHI) policy. Agens triggers incidents when HIPAA and HITECH (including PHI) is disabled. Solution: Enable IE channel in agent configuration if not already enabled. Trigger any policy using Internet Explorer. Set logging level to FINEST on an agent using agent management ...
updated blog entry 3 hours 56 min ago
De acordo com o relatório da Agência de Justiça e Estatísticas de Vítimas de Roubo de Identidade, cerca de 16,6 milhões de americanos com mais de 16 anos foram vítimas de pelo menos um incidente de roubo de identidade em 2012. A perda econômica direta de roubo de identidade foi de cerca de US$ 1,000 por pessoa e as perdas totais diretas e indiretas foi de aproximadamente 24,7 bilhões de ...
updated blog entry 3 hours 57 min ago
Según un informe de la Oficina de Justicia y Estadísticas de Víctimas de Robo de Identidad, alrededor de 16,6 millones de estadounidenses mayores de 16 años han sido víctimas de al menos un incidente de robo de identidad en 2012. Las pérdidas económicas directas por robo de identidad fueron alrededor de $ 1.000 por persona y las pérdidas totales directas e indirectas fueron de aproximadamente ...
new blog entry 4 hours 38 sec ago
Most of you reading this will immediately connect the acronym “RSA” with the encryption algorithm invented in 1977 by Rivest, Shamir and Adleman and which is still today the most-adopted in Public Key Infrastructure (PKI) systems, such as SSL. Through a mathematical process that remains ingenious even by modern standards its merits are strong, but the world changes very quickly in technology ...
updated blog entry 7 hours 20 min ago
Hay muchos que ya no recuerdan los días en que el HTML era codificado a mano de la misma manera que hay hackers que no recuerdan cuando un exploits debía ser construido desde cero. El proceso de hackear no ha dejado de ser ilegal, pero parece haberse simplificado para el usuario. Combine eso con un número cada vez mayor de transacciones que se hacen por Internet y tendrá un terreno fértil ...
updated blog entry 7 hours 24 min ago
Há muitos que não se lembram da época em que o HTML era codificado manualmente, da mesma forma que existem hackers que não se lembram que as ameaças precisavam ser construídas a partir do zero. O processo de hackear ficou mais simplificado, mas nem por isso deixou de ser ilegal. Combine isso com um número crescente de transações que são feitas online e terá um terreno fértil para desenvolver ...
updated blog entry 11 hours 59 min ago
For years now, malware has attempted to evade detection by security software using many different methods. Functions such as ending processes and services and deleting files and registry keys related to security products are commonly included in many of today’s malware. We recently noticed a simple, but interesting, trick used in an attempt to prevent the installation of a security product. A ...
updated blog entry 14 hours 30 min ago
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回は代表的なWebアプリケーション脆弱性であるクロスサイトリクエストフォージェリについて解説をしています。 ※なお、内容に関しましてはHASHコンサルティング株式会社の徳丸 浩様に監修いただいています。   +++++++++++++++++++++++++++++++++++++++++++++++   クロスサイトリクエストフォージェリ(CWE-352)   ■概要 Webは、サイトからサイトに遷移することが通常の動作であるため、悪意のあるサイトからの遷移に対して、利用者の意図に反する要求をアプリケーションが受け付けてしまう場合があります。その結果、利用者が知らないうちに掲示板等への投稿、物品購入、パスワー ...
updated blog entry 14 hours 48 min ago
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回は代表的なWebアプリケーション脆弱性であるディレクトリトラバーサルについて解説をしています。 ※なお、内容に関しましてはHASHコンサルティング株式会社の徳丸 浩様に監修いただいています。   +++++++++++++++++++++++++++++++++++++++++++++++ ディレクトリトラバーサル(CWE-22) の解説   ■概要 Webアプリケーションの中には、外部からファイル名を指定して、そのファイルに対する閲覧や書き込みをする実装になっているものがあります。この際、ファイル名を巧妙に細工して指定することにより、本来読み書きを許可していないファイルを指定されてしまう場合があります。このような攻撃 ...
updated download 30 Jun 2014
Symantec Data Loss Prevention 11.5: Administration NOTES: This course is 5 days long. TK-DLP-0115 Symantec Data Loss Prevention 11.5: Administration [5-Day ILT]   Click on links below to download course materials:
updated download 27 Jun 2014
*Update available* Hi, I wrote a little Powershell script to update existing SEP 12.1 Installation Packages with the latest definitions for all modules. Instructions: On the SEPM 12.1 share the following folder for “everyone – read” Export Packages without ticking the box “Create a single .EXE file for this package” Ensure that the following .ZIP files exist in the 32Bit and 64Bit package ...
updated download 25 Jun 2014
I made a little tool that will create a new LU policy using a CSV or text file as the input.  The tool can use an existing LU policy as a template.  This will allow you to easily add new Explicit GUP settings or new Multiple GUP settings to an existing LU policy. Here are the steps to use the tool: Download and run tool below. Create a text file (see below for details). (optional) ...
updated download 09 Jun 2014
Hello guys, If you are noticing some problem with disk space after configuring GUP Monitor Tool, take a look below: "C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\apache\logs" = It should be your problem, right? In that folder, SEPM just save errors, by default! If you have configured GUP Monitor Tool, like me, you need to know that you have enabled the access.log as ...
updated event 4 hours 55 min ago
Please join us for the next Twin Cities Data Loss Prevention User Group meeting on September 24th from 9am to 2pm at the Symantec Roseville Office.   Lunch will be served!   Agenda: Welcome & Introductions Customer Discussion IT Analytics and DLP Roadmap by Mark Deardurff, Symantec Discussions/Roundtable Lunch, prize drawings and conclusion   Location Symantec Roseville Office ...
updated event 15 Sep 2014
Presented by: Kevin Haley, Director, Product Management, Response Jeff Barto, Trust  Advocate Webcast Summary: Vendors are priming a great future when the Internet of Things (IoT) becomes a reality.  The reality is that the Internet of Things is here today. IoT has been with us in various incarnations over the last ten years or so. To protect yourself, ...
updated event 08 Sep 2014
Please join us for the next San Francisco Data Loss Prevention User Group meeting on September 9th at the Symantec Office from 11 a.m. to 3 p.m. Lunch will be served!   Agenda: 11 AM – Introduction & User Group Mission, name the directors and advisory board leaders 11:30 AM to 12:30 PM – Lunch, Meet & Greet 12:30 PM 1:00 PM – Symantec DLP Roadmap - Cloud by Mike Lindsay, Symantec 1:00 PM ...
new event 04 Sep 2014
Join us on Monday, September 15th to learn about the next cutting egde step in managing access!         Register through the link below:                  http://hubs.ly/y04kt-0     Can't make the webinar, but want to learn more?  Check out the link to our data sheet below.  If you have any questions or ...
new event 03 Sep 2014
The explosion of data since 2008 has produced a new challenge for IT personnel who understand the value of data and the importance of empowering the team with the right information about that data in order to determine how to govern it. Let us bring “insight” as to who is really the owner of critical data in your organization. ITS would like to work with you to understand Symantec's Data ...
new event 26 Aug 2014
Calling all United States DoD Security Experts and Enthusiasts to Compete with DoD Peers from Around the Globe The Symantec Cyber Readiness Challenge is an immersive, interactive "capture the flag" competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants ...
updated event 12 Aug 2014
Presented by: Matt Nelson Attorney and Legal Technology Expert, Information Governance Webcast Summary: Today’s era of technology and data growth presents new and unique challenges for businesses and corporate legal departments in particular. Some speculate that establishing a good “information governance” plan is the only way to address these challenges, yet the term “information ...
new event 12 Aug 2014
Presented by: Eric Schwake, Product Marketing Manager Webcast Summary: Increasingly complex, advanced threats are more prevalent than ever and even with the myriad of security tools available, the news is still filled with information about organizations getting breached. A better approach is needed. Register for this webcast and learn how to ensure your organization has the strongest ...
updated event 08 Aug 2014
The cyber security event provides rich content around cyber security. Guest speakers will address the legal, best practise, and industry issues for cyber security. It will demystify the obvious confusion of Information Security versus Cyber Security, and will explain why for instance Lloyds have moved cyber risk from 13th to 3rd place in its risk register. It will explain the new EU cyber laws ...
event comment 21 Jul 2014
updated video 18 Aug 2014
How-to demonstration of the installation process for LUA (Live Update Administrator)
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated idea 7 hours 2 min ago
Because of our Company Security Policy we require Internet Explorer Enhanced Security Configuration to be enabled for all sites, when we try and do this with SEPM we lose a lot of the functionality in Home, Monitors and Reports.  We would like the option to turn this on. Currently we believe that having the option enabled is not supported as ...
updated idea 8 hours 48 min ago
Maintenance Patches (MPs) released on top of SEP some times don't get installed properly since older versions may not always be the most recent ones e.g. RU4 updates may get installed over RU2 version etc. That necessiates using 'cleanwipe' tool prior to successful installation of a new update.  Since manual usage of 'cleanwipe' tool is not always efficient for various reasons like ...
new idea 13 hours 34 min ago
How to submit a specimen quarantine files easily  The following sample image as (SEP)  
updated idea 14 hours 55 min ago
Hi,   All the necessary certificates to be part of the installation for SEP 121.RU4 MP1a and MP1b. As installation is getting failing on Win2k3 Sp2 standard, Windows Vista SP2 and Win2K8 Sp2 standard operating systems. If the Symantec suggested certificates are part of the installation ,automatically support calls/Service requests  will get reduce in installation front. So much ...
new idea 14 hours 56 min ago
It will be great that the exclusion policy was a sum of exclusion lists. Today, I must have as many lists as configuration. But, for instance, I would like to create those exclusion lists: - Standard Microsoft exclusion - Standard IIS exclusion - Standard Apache Exclusion - Standard MySQL exclusion - Standard SQL Server exclusion etc ... On each group, I will apply a set of ...
new idea 16 Sep 2014
whenever SP link is down & SMG brightmail is not receiving emails from internet, it should alert system admin. Whenever ISP link is down it should alert system admin when it is not allowing emails to relay to internet. There will be alert for number of emails in message queue in addition to queue size which option is already available.
new idea 15 Sep 2014
In windows 8.1 OS external/ internal  portable Hard disk is getting detected has SCSI disk , os we are unable to block the devices using ADC policy for USBSTOR*. in other OS ADC policy is workfine with USBSTOR* like (Windows 7 & Windows XP)   Request you to give me solution to make work in  Windows 8.1 OS.   Please refer the Attachement ...
new idea 15 Sep 2014
It would be great if an end user could mark a message as spam/not spam in their personal quarantine the same way an administrator can. Thanks! Matt
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1325
16
AravindKM
293
1
Mithun Sanghavi
1223
59
P_K_
1131
28
jjesse
51
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.