Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
new discussion 23 Nov 2014
Hi, I encrypted a file using the Symantec Encryption Desktop - File Share Encryption and by mistake a deleted the key that is assigned to an encrypted file that I'm using for tests.. Now, if I go to "File Share Encryption" I can't remove it the file from there.. it says the message that is presented below in the image: If I don't have the key how can I remove this folder or re-assign a new key ...
updated blog entry 23 Nov 2014
  An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its ...
new discussion 23 Nov 2014
Hi, I am using PGP 10.2 command line on Windows-2008 and my client is using PGP 10.2 command line on Linux. We shared public keys and at both sides key imported and signed with our private keys. I am able to decrypt the file sent by my client and don't see any issues. But when my client tries to decrypt the file sent by me, he is able to decrypt but see a message 3079:signing ...
updated discussion 22 Nov 2014
My 11.0.5 SEPM has stopped downloading just the 64-bit antivirus definition updates with the last good one on 11/19/14!  After I manually fire off a Download in my SEPM, I don't even see an x64 AV entry in the list which seems to indicate it's not posted on Symantec's website.  I've seen situations where the 64 or 32-bit defs don't update although they're still both listed in ...
new discussion 23 Nov 2014
Hi, I encrypted a file using the Symantec Encryption Desktop - File Share Encryption and by mistake a deleted the key that is assigned to an encrypted file that I'm using for tests.. Now, if I go to "File Share Encryption" I can't remove it the file from there.. it says the message that is presented below in the image: If I don't have the key how can I remove this folder or re-assign a new key ...
new discussion 23 Nov 2014
Hi, I am using PGP 10.2 command line on Windows-2008 and my client is using PGP 10.2 command line on Linux. We shared public keys and at both sides key imported and signed with our private keys. I am able to decrypt the file sent by my client and don't see any issues. But when my client tries to decrypt the file sent by me, he is able to decrypt but see a message 3079:signing ...
updated discussion 22 Nov 2014
My 11.0.5 SEPM has stopped downloading just the 64-bit antivirus definition updates with the last good one on 11/19/14!  After I manually fire off a Download in my SEPM, I don't even see an x64 AV entry in the list which seems to indicate it's not posted on Symantec's website.  I've seen situations where the 64 or 32-bit defs don't update although they're still both listed in ...
updated article 19 Nov 2014
Hello All, Follow the below steps and you are ready to scan for Heartbleed vulnerability: 1. In the CCSVM Console Web interface, click Administration from the top menu. Under the Scan Options Section on the administration page, click the manage link for Templates.     2. Find the scan template named “Full audit” and select the Copy scan template icon at the ...
updated blog entry 23 Nov 2014
  An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its ...
updated blog entry 21 Nov 2014
In the previous installment we examined default Apache logging. Now let's pump up the default Apache combined log format in order to supercharge forensic capability! We'll utilize the "LogFormat" directive in order to define the "enhanced" log format within the /etc/apache2/apache2.conf configuration file: LogFormat "%{[%a %D @ %I:%M:%S.}t%{msec_frac}t %{%p %Z]}t [%h (%{X-Forwarded-For}i) > ...
updated blog entry 21 Nov 2014
Like big brother Apache, default Tomcat logging leaves a little something to be desired, especially in regard to forensics. And you know what they say: When Tomcat forensic logging is away, the hackers will play! Well fine, maybe nobody ever said that, but you get the point. In any case, let's play cat and mouse with those wily hackers and bolster default Tomcat logging! For this blog post ...
updated blog entry 21 Nov 2014
As Americans gear up for another holiday shopping season, the threat posed by point-of-sale malware remains high. More than a year after the discovery of the first major attacks against POS networks, many US retailers are still vulnerable to this type of attack and are likely to remain so until the complete transition to more secure payment card technologies in 2015.  While some retailers ...
updated blog entry 21 Nov 2014
Baixe uma cópia de nosso estudo: O aumento contínuo dos ataques DDoS. Ataques distribuídos de negação de serviço (DDoS) não são um conceito novo, mas se mostraram eficazes. Nos últimos anos, apresentaram aumento em intensidade e número, enquanto a duração de um ataque muitas vezes caiu para apenas algumas horas. Estes ataques podem ser simples, mas podem ser devastadores para as ...
updated blog entry 21 Nov 2014
TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program. However, do not despair. This blog series will provide step-by-step instructions for cross compiling, installing, and running TCPDUMP on Android mobile devices. As Michael Buffer would say right before ...
updated blog entry 21 Nov 2014
In the previous installment we installed our mobile development toolchain. Let's keep the party rockin' and download the latest versions of LIBPCAP and TCPDUMP. LIBPCAP is the packet capture library required by TCPDUMP. First let's unpack LIBPCAP and move into the newly created LIBPCAP directory: root@debian $ tar zxvf ...
updated blog entry 21 Nov 2014
​In previous installments we installed our mobile development toolchain and cross compiled LIBPCAP and TCPDUMP. Now it's finally time to install and execute TCPDUMP! CyanogenMod includes a terminal emulator, however in my humble opinion it's much easier to type commands on a regular workstation keyboard. We can utilize the Android Debug Bridge (ADB) in order to connect to our CyanogenMod ...
updated blog entry 21 Nov 2014
In previous installments we constructed our mobile development toolchain and cross compiled, installed, and executed TCPDUMP on our CyanogenMod Mobile Device. Now it's time to complete our mission by forwarding packets captured by TPCDUMP on our CyanogenMod Mobile Device to Wireshark on our Debian Workstation in order to conduct realtime mobile device network traffic monitoring within a slick ...
updated blog entry 20 Nov 2014
If you're familiar with web application penetration testing and SQL injection then the classic SQL injection exploit string should ring a bell: This exploit string is utilized by attackers to modify the structure of a dynamic SQL query executed by the target web application. For example, consider the following Java code snippet that executes a SQL query against a backend MySQL database in ...
new event 13 Nov 2014
Presented by: Kevin Haley, Director, Security Technology And Response Webcast Summary: The true personal computer is in our pockets or purses today.  It’s the smart phone.  It is a computer with more processing power than in the first space capsule that sent men to the moon.  And it’s a very personal device - to work, play and share with our friends.  But like any ...
updated event 07 Nov 2014
Today, Healthcare organizations are at a crossroad.  Continue the struggle to strike balance between business reward and risk, or take the brave steps toward making IT security an offensive game?  The reality is that personal health information is worth more than credit cards and what's worse is that thieves know it!   Today’s threats are also more automated, more ...
updated event 05 Nov 2014
On Cyber Monday, your organization’s employees will return from the Thanksgiving weekend, ready to kick off the online holiday shopping season – from their desks and devices.  Last year over 500+ million identities were exposed via breaches. And with malware and phishing also in the news, join us to find out how you can protect not only your business but your employees’ personal ...
new event 20 Oct 2014
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 20 Oct 2014
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
updated event 20 Oct 2014
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
updated event 13 Oct 2014
The Symantec Data Loss Prevention 12: Administration course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for configuring Enforce server, detection servers, and DLP Agents as w ell as reporting, workflow , incident response management, policy management and ...
new event 13 Oct 2014
The Symantec Data Loss Prevention 12: Administration course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for configuring Enforce server, detection servers, and DLP Agents as w ell as reporting, workflow , incident response management, policy management and ...
updated video 14 Nov 2014
Regardless of the size of the organization, if you handle Personal Health Information (PHI) you have to follow the rules of HIPAA. This can be a daunting exercise of weeding through the various technology solutions and aligning processes and procedures. Now you have to expand this exercise to your Business Associates. How exhausting. At Novacoast we understand that a one-size-fits-all solution ...
updated video 14 Nov 2014
The application monitoring feature in Symantec Data Loss Prevention enables you to monitor CD and DVD burning, instant messaging, email, and HTTP and HTTPS applications that can potentially leak sensitive information. This video explains how to add Chrome to the Application Monitoring screen, and provides settings that can help optimize monitoring performance.
updated video 14 Nov 2014
During this overview I will be discussing agent health features new in Symantec Data Loss Prevention version 12.5.
updated video 03 Nov 2014
Traditional IT Security & Access Management is based on a static definition of who the user is. But business is changing. The office is the home office, the coffee shop or the client site. The workstation is the computer, the laptop, the tablet or the smartphone. Users need different rights to perform different tasks, and different rights based on where they are and what device they’re ...
video comment 27 Oct 2014
updated video 14 Oct 2014
This video will demonstrate you how to install Symantec Control Compliance Suite Vulnerability Manager on Kali Linux.
updated video 30 Sep 2014
ITS would like to work with you to understand Symantec's Data Insight, a product that integrates with Symantec's Data Loss Prevention, discovering and collecting activity and permissions information about your data. Data Insight solves the problem of identifying data owners through usage patterns and behavioral tracking. Join us as we delve into the Data Insight console and demonstrate some of ...
updated idea 20 Nov 2014
Daily Active scans (quick scans) have not been detecting Master Boot Record (MBR) infections.  Nowadsys we are only finding out about MBR infections at the weekly full scan. Seems that it would not add much time to an Active scan to also scan the critical MBR.  Benefits of Active scan checking the MBR: 1. so we catch them sooner (not waiting for a weekly full scan) 2. we ...
new idea 20 Nov 2014
Please see: https://www-secure.symantec.com/connect/forums/hide-not-show-symantec-endpoint-protection-scheduled-scan-dialog In summary, I would an option permanantly to hide the dialog that shows up prior to Endpoint Protection running a scan on my managed endpoint. Instead, just run the scan without bothering my workflow with this dialog. Since it's a managed instance of Endpoint ...
new idea 20 Nov 2014
The current SEP firewall component has the ability to permit/deny direction network traffic, however, the timeout on the stateful table is set to 5 minutes, which is FAR too low. This connection table timeout needs to be raised to hours, not minutes, or custom configurable. Further: the stateful table should not rely on entering specific applications in the firewall rule in order to work: ...
new idea 20 Nov 2014
Please consider adding full DMARC support with new versions of SMG.  SPF & DKIM is only a portion of the capabilities available. 
new idea 19 Nov 2014
Dear PM, Singapore Health Services (SingHealth) is one of our biggest SEP customer in Singapore. Recently, they explore using our SEP for MAC and they notice that even when they disable the Network Threat Protection(NTP), it will still show up at the end client side GUI.   According to our Tech Support (Case#7674114), this is by design. Honestly, I think this is not quite right. ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1482
16
AravindKM
293
1
Mithun Sanghavi
1226
59
P_K_
1131
28
SMLatCST
361
1
jjesse
51
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.