Video Screencast Help
updated idea 27 May 2016
Hi, One of the customer is requested below,  if any e-mails that are including View or Release link shared to any users from outside of the company, can be view and read this e-mail without Authentication and the only solution is disabling “Sent View and Release Link(These links have Embedded Credentials)” option. Customer thinks that is a Vulnerability and ...
updated article 27 May 2016
Introduction This is lucky number thirteen in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. Chapter Thirteen: Delver of the Arcane ...
new event 27 May 2016
The Philadelphia Security User Group invites you and all Symantec customers in the Mid-Atlantic region to join us for our annual user group meeting at Hershey Park, PA on Friday, August 5 from 9:00 am to 1:00 pm. Breakfast will be served for you, with free park tickets for your whole family! Register Today! Agenda Real Data Center Security in a Cloud Environment Endpoint Protection Risk ...
updated event 27 May 2016
Please join us for the next Cleveland Security User Group meeting on Thursday, June 23 from 9:00 a.m. to 1:00 p.m. at FirstEnergy in Akron. Our meeting will be a good mix of customer presentation and time for networking with other Symantec Security users in the area.  Lunch will be served!  Presentations:  9:00 – 9:30: Welcome and Introductions – Brad Gladish 9:30 – 10:30: ...
discussion comment 27 May 2016
discussion comment 27 May 2016
updated article 27 May 2016
Introduction This is lucky number thirteen in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. Chapter Thirteen: Delver of the Arcane ...
updated article 23 May 2016
The communication between the DCS agent and the DCS manager is based on TCP connections. The DCS agent makes a TCP connection to the DCS manager and sends data and gets a response. The DCS agent then closes the connection. The current protocol used over the TCP connection is either HTTP or more commonly HTTPS. When using the HTTPS protocol, the DCS agent verifies the ...
updated article 19 May 2016
Use the attachment below to walk through the provisioning process, or any time you need to add a domain. If you want to watch a video demonstration of the tool, please click here.
updated article 18 May 2016
Overview SEP allows for clients to report their log information to the Symantec Endpoint Protection Manager (SEPM). This client logging can be done with or without using external logging. Either way, this allows for reports to be created in the SEPM console. These reports can be viewed or saved to external files. The external logging feature in the SEPM allows for saving log data outside of a ...
updated blog entry 27 May 2016
While your organization has turned to Office 365 for productivity with the cloud, is your data safe and secure? According to an IDC white paper sponsored by Symantec, organizations should focus their efforts on the main areas of authentication and access control, data loss prevention, email security, and advanced threat protection to improve upon Office 365's integrated security features. In ...
updated blog entry 27 May 2016
Regular readers of the Symantec blog may sometimes read blogs that mention a fraudulent file that is signed with a valid digital certificate or that an attacker signed their malware with a stolen digital certificate. You may recall that the creators of Stuxnet, arguably the most notorious malware in history, signed it using the private keys of valid digital certificates of well-known ...
updated blog entry 27 May 2016
Contributor: Jeet Morparia Symantec has recently observed various malware families seen in the wild signed with multiple digital certificates. As seen with Suckfly, valid, legitimate certificates can be stolen from an organization, often without their knowledge, and then used to sign malware to evade detection. In this case, attackers have used multiple digital certificates together to ...
updated blog entry 27 May 2016
Symantec has found evidence that a bank in the Philippines has also been attacked by the group that stole US$81 million from the Bangladesh central bank and attempted to steal over $1 million from the Tien Phong Bank in Vietnam. Malware used by the group was also deployed in targeted attacks against a bank in the Philippines. In addition to this, some of the tools used share code similarities ...
new blog entry 26 May 2016
Mobile malware authors have updated their threats to handle Android’s latest permission-granting model, which was introduced in version 6.0 Marshmallow. The model was designed to let users grant permissions only when apps require them, rather than accepting them all on installation. However, dangerous threats such as Android.Bankosy and Android.Cepsohord have adapted to this method in an ...
updated blog entry 26 May 2016
筆者の前回のブログでは、シマンテックの製品が、お客様へ提供するサービスのすべてについて、今後数週間で Certificate Transparency(証明書の透明性、以下 CT)のサポートを拡大していくとお伝えしました。 CT を利用すると、組織が所有しているドメインにおいてどのような SSL/TLS サーバ証明書が有効かを監視できます。大多数のお客様の用途では、現在の CT 実装でも問題はありません。ところが、イントラネットの用途で証明書を利用する場合には、証明書の情報(特にサブドメイン情報)を秘密にしておきたいという要望もあります。たとえば、support.mycompany.com については証明書情報を公開してもかまわないが、top-secret-project.mycompany.com のログを記録することには難色を示すというお客様がいても当然でしょう。現在の CT ...
updated blog entry 26 May 2016
本日シマンテックは、Certificate Transparency(証明書の透明性)のサポートを SSL/TLS サーバ証明書のすべてのブランドと顧客チャネルに拡大すると発表しました。Certificate Transparency は、全世界のお客様に強力な証明書管理機能を提供するための重要な要素です。 Certificate Transparency(以下、CT)は、組織が所有しているドメインにおいてどのような SSL サーバ証明書が有効かを包括的に把握するためのオープンフレームワークです。簡潔なポリシーを実施し、中間者攻撃のような脅威にも迅速に対応するには、証明書について明確かつ完全に把握しておくことが欠かせません。 すでに発表されているように、シマンテックはまず 2014 年 12 月に、Symantec、Thawte、GeoTrust の Extended ...
new blog entry 25 May 2016
2,500 を超える Twitter アカウントが侵害され、アダルト向けの出会いやセフレ紹介を専門とする Web サイトへのリンクをツイートしています。アカウントのプロフィール写真や自己紹介文、フルネームも書き換えられ、そうしたサイトの宣伝に利用されていました。攻撃者は、アフィリエイトプログラムを通じて、そのようなアダルト系サイトにユーザーをリダイレクトすることで利益をあげた可能性があります。 シマンテックの調査で侵害が判明した著名な Twitter アカウントのなかには、エレクトロファンクグループ Chromeo(クローメオ)が所有する複数のアカウントや、テレグラフ紙の国際的なジャーナリストのアカウントなども含まれていました。シマンテックの調査以外でも、スタンダップコメディアンの Azeem Banatwala 氏、ヒューストン・テキサンズのワイドレシーバー Cecil ...
updated blog entry 25 May 2016
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回はSSL3.0の脆弱性POODLE (Padding Oracle On Downgraded Legacy Encryption; CVE-2014-3566)について解説をしています。 ※なお、内容に関しましてはHASHコンサルティング株式会社の徳丸 浩様に監修いただいています。 +++++++++++++++++++++++++++++++++++++++++++++++ POODLE (Padding Oracle On Downgraded Legacy Encryption; CVE-2014-3566) ■概要 インターネット上の通信暗号のプロトコルとして、従来からSSL(Secure Sockets ...
updated blog entry 25 May 2016
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回は、ミドルウェアのバグに基づくサービス妨害攻撃(Denial of Service; ...
new download 16 May 2016
To make use of stop-words for russian language, download attached file, unzip it and place to the "Protect\config\stopwords" subfolder in the Symantec DLP installation directory. Then go to the "Advanced settings" page of selected detection server and set the variable "Lexer.StopwordLanguages" to "en,ru". Do it for every detection server you have.
updated download 22 Apr 2016
Symantec DCS Policy Utility v1.0.0.11 For Windows OS (Note .NET Framework 4.5 is required) Designed to help you tune your policy by processing the log files from an Agent. There's a getting started tab that explains the best steps to get the logs and events you need to troubleshoot your policy. The program does not make any changes to the machine or policy. It parses the sisidsevents and ...
updated download 01 Apr 2016
When a customer is using the forensics software "Encase 7" with our Symantec Endpoint Encryption Full Disk 8.2.0 software, the customer will need the appropriate DLLs so that the Encase product can successfully work with our Full Disk product. The DLLs required are attached here and can also be located within the original product download under the subfolder "utilities". The DLLs required in ...
updated download 01 Apr 2016
At times, a customer may require the details for creating a batch file (startup script) to assist in the uninstallation of a Symantec Endpoint Encryption Device Control client that was installed via GPO. You cannot use the automatic uninstall feature in the GPO software installation package because the Device Control uninstall procedure is password protected. To uninstall Device Control you ...
new download 01 Mar 2016
Symantec Data Loss Prevention- Triggering Endpoint Response Rules Video
new download 01 Mar 2016
Oracle 11g Symantec DLP Installation
updated download 16 Feb 2016
This script is intended for use in Symantec Data Loss Prevention and provide an ability to sort incidents not only by file name but also by separate subfolders in it's path. You need to create following Custom Attributes: FPath_Drive_Letter FPath_Root_Folder FPath_SubFolder_1 FPath_SubFolder_2 FPath_SubFolder_3 FPath_SubFolder_4 ''' Created on 8 feb 2016 @author: Stepanov Alexander ...
new event 27 May 2016
The Philadelphia Security User Group invites you and all Symantec customers in the Mid-Atlantic region to join us for our annual user group meeting at Hershey Park, PA on Friday, August 5 from 9:00 am to 1:00 pm. Breakfast will be served for you, with free park tickets for your whole family! Register Today! Agenda Real Data Center Security in a Cloud Environment Endpoint Protection Risk ...
updated event 27 May 2016
Please join us for the next Cleveland Security User Group meeting on Thursday, June 23 from 9:00 a.m. to 1:00 p.m. at FirstEnergy in Akron. Our meeting will be a good mix of customer presentation and time for networking with other Symantec Security users in the area.  Lunch will be served!  Presentations:  9:00 – 9:30: Welcome and Introductions – Brad Gladish 9:30 – 10:30: ...
updated event 24 May 2016
Please join us for the next Brazil Data Loss Prevention User Group meeting, June 1 from 09:00 to 12:00. Agenda: 09:00-09:30 – Welcome/Introductions 09:30-10:00 – User Group initiative/concept 10:00-10:15 – Break 10:15-11:00 – Customer Success Story 11:00-11:45 – DLP What’s new and Roadmap 11:45-12:00 – Closing and Next Steps
updated event 19 May 2016
Please join us for the next South Florida Security User Group meeting on Wednesday, June 22 from 11:30 am to 2:00 pm at Bokamper's in Miramar. Lunch will be served! Agenda  Welcome – Raul Documet Presentation – Symantec: ATP / DLP Lunch & Networking Presentation – Javier Sola – ATP / DLP Customer Roundtable Conclusion, Prize Drawings & Feedback
updated event 19 May 2016
Please join us for the next Michigan Security User Group meeting on Tuesday, June 7 from 10 am to 1 pm at CBI’s offices in Ferndale. Lunch will be served! Agenda: 10:00 – 10:30  Welcome and Introductions 10:30 – 11:30  Symantec / CBI joint presentation: Don’t Be a Victim, Be a Hero History of Ransomware and ATP Advanced Persistent Threats (APTs) use technologies, people and ...
updated video 19 May 2016
This video will help new customers to provision their domains and inbound routes once they have access to the administration portal. If you want a desktop aid to provide a step by step guide as to the tool, then please download that here.
new video 17 May 2016
Bay Dynamics recently announced the availability of the standalone IT Analytics Server 2.1, which includes an enhanced web based cube browser. This video walks you through how as an existing Symantec Endpoint Protection customer, you can leverage IT Analytics Server to visualize your cube data and take advantage of its benefits.
updated video 17 May 2016
Bay Dynamics recently announced the availability of the standalone IT Analytics Server 2.1, which includes an enhanced web based cube browser. This video walks you through how as an existing Symantec customer, you can leverage IT Analytics Server to visualize your cube data and take advantage of its benefits.
new video 17 May 2016
In this video, we demonstrate how to install the new standalone IT Analytics Server v2.1 with the Symantec Data Loss Prevention content pack.
updated video 17 May 2016
This training module aims to walk you through how to setup a new business partner in the Encryption module of the Management Portal. Watch more Videos in the Self-serve TLS video series: Self-serve TLS: Moving domains from one Business Partner to another Self-serve TLS: Getting visibility into your enforcements Self-serve TLS: Enforcing TLS encryption between you and the Email Security ...
new video 13 May 2016
This video shows you the new features in Advanced Threat Protection 2.0.2.
updated video 13 May 2016
In this video, you'll see how you can use a STIX file to perform a database search in Advanced Threat Protection 2.0.2 and later.
updated video 13 May 2016
This video shows how you can create on demand and scheduled reports in Advanced Threat Protection.
updated video 13 May 2016
This video shows how Advanced Threat Protection can help you analyze process behaviors that occur on your endpoints.
updated idea 27 May 2016
Hi, One of the customer is requested below,  if any e-mails that are including View or Release link shared to any users from outside of the company, can be view and read this e-mail without Authentication and the only solution is disabling “Sent View and Release Link(These links have Embedded Credentials)” option. Customer thinks that is a Vulnerability and ...
new idea 27 May 2016
Mail Security for Exchange 7.5.2 and 7.5.3 does not log Configuration change details. It does log when changes are saved but does not provide details of the change. This would be good information to log for auditing purposes.
new idea 27 May 2016
The system audit is lacking information from the object on wich an action is performed. This is an important point for an audit log and should be integrated on the SEPM logs system -> server Activity Logs. At least the following information is crutial for the action "the computer account has been moved to another group": machine, intial group, final group.
updated idea 26 May 2016
I know there is the load balancing/failover solution for clients checking into SEPM but I am looking to implement load balancning for my admins logging into the SEPM console. We have over 200 administrators and I do not want at any point one of our 3 management hosts to become overloaded because they are all logging into one directly at the same time. I would like to implement load ...
updated idea 24 May 2016
Endpoint Protection (12.1)定義ファイルのダウンロードサイズをカスタマイズできれば
updated idea 24 May 2016
I would like the ability to prevent missed scans from running when computers come back online. Most users turn their PC's off over the weekend, and then find it very frustrating when they come back to the office to find the computer running very slow due to missed scans running. Their should be an option for hosted Symantec Endpoint to skip missed scans. Thank you, Dave Cronin
updated idea 24 May 2016
SEP12の件です。 インターネットに繋がらない環境で、1台にSEPMをインストールして、他のパソコンにパターン配信しようとしています。 インターネットに繋がるパソコンからパターンファイル(JDB)をダウンロードして、 何らかの記憶媒体でファイルを運び、 パターンの更新をする必要がありますが、現時点でファイルサイズが500MB以上あり、 環境によっては正常にダウンロードできません。  パターンファイルを小さくするか、せめて分割してダウンロードできるようにして欲しいです。  (ちなみに、他社ソフトのトレントマイクロのウイルスバスターは30MB程度です) ご検討の程、よろしくお願いします。
new idea 23 May 2016
Kindly release SEP 12.1 new release that supports latest RedHat Enterprise Linux OS v6.7 and v6.8.
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.