Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
new discussion 19 Dec 2014
I deployed my two Symantec Web Gateway server on DMZ network for internet facing, these two servers are running in clustering and another interface is on LAN.  It is found that my firewall received a lot of deny IGMP traffic for reverse path check from DMZ network.  Why the Web Gateway need IGMP?  What happen if this traffic is blocked at firewall? thx!
updated discussion 19 Dec 2014
We have some machines that miss the regularly scheduled scans that are configured for once a week, overnight.  The scans will then take place during business hours.    Then, the following week, the regular scan time will try to run during the day, instead of the regular overnight scheduled time. The Schedule for the scan is set to "scan until finished".  We are running SEP ...
updated blog entry 19 Dec 2014
Um malware avançado conhecido como Regin foi utilizado em campanhas sistemáticas de espionagem contra uma variedade de alvos internacionais desde, pelo menos, 2008. Considerado um Cavalo de Tróia do tipo Backdoor, o Regin é um malware complexo, cuja estrutura exibe um grau de competência técnica raramente encontrado. Customizável através de uma ampla gama de capacidades, dependendo do alvo, ...
updated discussion 19 Dec 2014
Greetings, On some servers 2008 as well on some windows 7 workstations, if the GDIPLUS.DLL exists on C:\Windows\Syswow64, the patch installed successfully but it still remains Applicable/Schedule on Software Updates tab on the Symantec Management Agent. I can see that security update is well installed on the machine on Add/Remove Programs as well as the event log (Install successfull). Is it a ...
new discussion 19 Dec 2014
I deployed my two Symantec Web Gateway server on DMZ network for internet facing, these two servers are running in clustering and another interface is on LAN.  It is found that my firewall received a lot of deny IGMP traffic for reverse path check from DMZ network.  Why the Web Gateway need IGMP?  What happen if this traffic is blocked at firewall? thx!
updated discussion 19 Dec 2014
We have some machines that miss the regularly scheduled scans that are configured for once a week, overnight.  The scans will then take place during business hours.    Then, the following week, the regular scan time will try to run during the day, instead of the regular overnight scheduled time. The Schedule for the scan is set to "scan until finished".  We are running SEP ...
updated discussion 19 Dec 2014
Greetings, On some servers 2008 as well on some windows 7 workstations, if the GDIPLUS.DLL exists on C:\Windows\Syswow64, the patch installed successfully but it still remains Applicable/Schedule on Software Updates tab on the Symantec Management Agent. I can see that security update is well installed on the machine on Add/Remove Programs as well as the event log (Install successfull). Is it a ...
updated article 19 Dec 2014
Before we begin, I would like to let the reader know that the product for standalone drive encryption installations is Symantec Encryption Desktop.  This guide is intended for managed environments already using Symantec Endpoint Encryption who have a need for a small number of standalone clients that are outside of their domain.  If you have the need for a small number of unmanaged ...
updated article 18 Dec 2014
#Updated: 17th Oct'14  Hi, This article will demonstrate how to install Symantec Endpoint Protection on Red Hat Linux machine. The enterprise version of Symantec Endpoint Protection now includes the Symantec Endpoint Protection client for Linux. The Symantec Endpoint Protection client for Linux replaces the Symantec AntiVirus client for Linux and supports a greater range of ...
updated article 15 Dec 2014
by Tony Bautts Worms, worms are everywhere! The recent and prolific spread of Internet worms has yet again demonstrated the vulnerability of network hosts, and it's clear that new approaches to worm containment need to be investigated. In this article, we'll discuss a new twist on an under-utilized technology: the tarpit. The Worms In a nutshell, worm technology works by infecting a host ...
updated blog entry 19 Dec 2014
Um malware avançado conhecido como Regin foi utilizado em campanhas sistemáticas de espionagem contra uma variedade de alvos internacionais desde, pelo menos, 2008. Considerado um Cavalo de Tróia do tipo Backdoor, o Regin é um malware complexo, cuja estrutura exibe um grau de competência técnica raramente encontrado. Customizável através de uma ampla gama de capacidades, dependendo do alvo, ...
updated blog entry 19 Dec 2014
As the largest security software company in the world, Symantec has earned the trust of consumers, businesses and governments alike to secure and manage their information and identities. We place the highest priority on maintaining this trust and believe it is imperative to be transparent about our business positions as questions arise across the globe on data security and privacy. We have ...
updated blog entry 19 Dec 2014
이번 크리스마스 시즌에 쇼핑객들은 가장 저렴한 가격에 최고의 선물을 구입하기 위해 인터넷을 샅샅이 뒤지고 있습니다. 이맘때 할인 행사를 찾아다니는 이들은 일반 소비자만이 아닙니다. 수많은 사이버 범죄자들도 다른 누군가의 돈으로 쇼핑을 즐기고 지하 경제 시장에서 불법 상품과 서비스를 사고팝니다. 거래 장소만 안다면 불법 유출된 데이터와 온라인 계정, 맞춤형 악성 코드, 공격 서비스와 인프라스트럭처, 사기 상품권 등 온갖 품목을 구매할 수 있습니다. 불법 상품 및 서비스의 가격은 그 내용에 따라 천차만별이지만, 예산이 빠듯한 사이버 범죄자라도 형편에 맞게 구매할 수 있습니다. 훔친 데이터와 계정은 1달러 미만에 구매 가능합니다. 공격 인프라스트럭처와 같은 큰 규모의 서비스는 백 달러에서 수천 달러짜리도 ...
updated blog entry 18 Dec 2014
If you use SSL certificates on intranet sites with internal server names, they may not work from 1 November 2015. For companies with complex infrastructures, the change may be challenging but now is the time to start getting ready. If you use SSL certificates on intranet sites with internal server names, they may not work from 1 November 2015. For companies with complex infrastructures, the ...
updated blog entry 18 Dec 2014
Today, Symantec is proud to announce the availability of our newly consolidated endpoint encryption solution, Symantec Endpoint Encryption v11. This solution blends best-of-breed technologies from our PGP and GuardianEdge acquisitions into a single console that includes strong disk and removable media encryption along with out-of-the-box reporting and enterprise-scale management. Symantec ...
updated blog entry 18 Dec 2014
Por Tarun Sondhi, estratega de negocios y productos en Symantec A esta altura, todas las empresas deben tener alguna forma de programa de seguridad digital instalado. De hecho, si hubiera que categorizar todas las empresas por su nivel de seguridad, lo más probable es que se dividan por la sofisticación relativa de su programa de administración del riesgo para la seguridad en lugar de por si ...
updated blog entry 18 Dec 2014
The CEO of a company that created the StealthGenie mobile spying app recently pleaded guilty for advertising and selling spyware. The US Department of Justice ordered Hammad Akbar to pay a US$500,000 fine and to hand over the spyware’s source code. It’s a significant result, as it marks the first ever criminal conviction surrounding the sale of a mobile spyware app.  This may not be the ...
updated blog entry 16 Dec 2014
何かと IT 関連のトラブルが発生しやすいこの時期、トラブルを未然に防ぎ IT 部門担当者の負担を軽くするためには、従業員を教育することが重要です。トラブル発生を回避するために、従業員が心得るべき 12 のヒントを以下に示します。実際にトラブルが発生した際、IT 部門がスムーズに対応できるように従業員への教育を徹底しましょう。 「セキュリティ」に関するヒント その 1: IT 部門の担当者が誰なのかを事前に把握しておきましょう。IT 担当者を名乗る不審人物が自分の部署に連絡してきた場合に、どこに問い合わせたらよいかを確認しておくことも重要です。スピアフィッシングでは、コンピュータ上にマルウェアをインストールしたり、将来の攻撃に必要な情報を収集するために、IT 担当者を名乗る人物がカスタマーサービス担当者や営業担当者など、外部からの着信が多い人を標的にします。 その ...
download comment 05 Dec 2014
updated event 15 Dec 2014
Attention: This User Group meeting has been rescheduled to January 28, 2015! Please join us for the next Philadelphia Security & Compliance User Group meeting on January 28, 2015 from 9:00 a.m. to 12:00 p.m at Dave & Buster's. Lunch will be served! Agenda: Welcome & Introductions Altiris Update and Overview Lunch Symantec Cloud Security Wrap up, Prize drawings & Conclusion Location: Dave ...
new event 04 Dec 2014
Presented by: Jon Oltsik, Senior Principal Analyst, Enterprise Security Group Kat Pelak, Senior Product Marketing Manager   Online activity and security threats are growing in volume, scale, and complexity.  Not a day passes that we don’t hear about another data breach.  From small and medium-size businesses to Fortune 500 companies, across every industry, no organization is ...
updated event 24 Nov 2014
Greetings Valued DLP Customers and Partners,   We respectfully request your participation at our upcoming Symantec DLP Feature Advisory Board (FAB).  We will be discussing the upcoming feature, Discover for Box Cloud Storage.  You will be among the first to see and hear about this new feature.  The meeting will be led by DLP Product Management and your feedback will shape ...
updated event 24 Nov 2014
Join Symantec at the Gartner Data Center, Infrastructure & Operations Management Conference 2014 in Las Vegas and get the information you need to deliver crucial IT services and drive improved levels of productivity and innovation at the same time. With a renewed focus on people, processes, technology and culture, you will learn how to select and prioritize I&O initiatives, manage ongoing ...
new event 13 Nov 2014
Presented by: Kevin Haley, Director, Security Technology And Response Webcast Summary: The true personal computer is in our pockets or purses today.  It’s the smart phone.  It is a computer with more processing power than in the first space capsule that sent men to the moon.  And it’s a very personal device - to work, play and share with our friends.  But like any ...
updated event 07 Nov 2014
Today, Healthcare organizations are at a crossroad.  Continue the struggle to strike balance between business reward and risk, or take the brave steps toward making IT security an offensive game?  The reality is that personal health information is worth more than credit cards and what's worse is that thieves know it!   Today’s threats are also more automated, more ...
updated video 10 Dec 2014
This is lesson 7 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelilgence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 5 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 4 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 3 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as ...
updated video 10 Dec 2014
This is lesson 2 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as licensing or ...
updated video 10 Dec 2014
This is lesson 1 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons, click on a link below to access the remaining lessons. Please fill out a course evaluation once you have completed this training. Contact Symantec Technical Support at 800-342-0652 if you have a technical issue. For non-technical issues, such as ...
updated video 05 Dec 2014
This is lesson 6 of the Symantec DeepSight Intelligence Portal course. This course includes a total of seven lessons: Lesson 1: DeepSight Intelligence Portal Overview - Discuss the variety of intelligence the portal provides - Set up your account and familiarize yourself with the portal - Review the analyst journals - Determine who to contact if you have a problem - ...
new idea 18 Dec 2014
Wir haben seit kurzem Probleme mit der automatischen Connection Classification. Ein Kunde hat uns mitgeteilt, dass er uns keine eMails senden kann, da diese zurückgewiesen werden. Im Log wurden die Server des Dienstanbieters Mimecast mit "451 4.3.2 Please try later" abgewiesen. Nach längere Suche haben wir herausgefunden, dass die Ursache in der Connection Classification lag. Uns ist dabei ...
new idea 16 Dec 2014
We have a SIEM. We receive logs from SEP to SIEM. However, for the application and device control logs, we don't receive serial numbers of the USB devices. We were told that it is not possible/not designed. Please, consider additing the information.
new idea 16 Dec 2014
Sería interesante que se estudiara la posibilidad de que se pudieran programar informes en SEPM, y que en lugar de enviar correos a los administradores, se guardaran automáticamente dichos informes (los mismos archivos .mht que se envían al correo electrónico) en un directorio que se le indique en el servidor donde esté instalado SEPM. Esto sería de utilidad para entornos en los que no se ...
new idea 15 Dec 2014
Remove SEPM Java Console Timeout implemented in v12.1.5. Might be good to force a timeout for the Small Business version, but for Enterprise, we should be able to choose NEVER. 1 hour max is flat out ridiculous! If I'm monitoring or doing something else for a couple of hours, I don't want to have log back in to the console. This is especially annoying when monitoring client upgrades. I might ...
updated idea 15 Dec 2014
Hello, My company has been using your Symantec.Cloud product for a few months now and we really enjoy it. We find it to be a great product. However, we think a useful addition would be to create a report that shows you the date and time of the last full scan the computers in you network had. Because we many times try and run a full scan using the group actions tool. But sometimes a computer ...
updated idea 15 Dec 2014
I'm requesting the ability to control SEP client settings via the command line. Specifically I want to disable Network Threat Protection. Other application options should be modifiable via command line, either a tool that interacts with SEP or a prefernece file we can manage with Profiles, MCX, or defaults commands. Some of the client settings I'd like to control are: Auto-Protect ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1569
17
AravindKM
293
1
Mithun Sanghavi
1228
59
P_K_
1131
28
SMLatCST
366
1
jjesse
52
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.