Video Screencast Help
updated discussion 02 Sep 2014
Recently we upgraded to 12 Endpoint from 11. Everything went good. But few LAN games stopped working, for example Grand Theft Auto IV LAN multiplayer and Command and Conquer Generals: Zero Hour. If i withdraw firewall rule, everything works. Anyone has an idea, what exactly i must allow for games to work? With Endpoint 11 there was no such problem. Thank you.    
updated discussion 02 Sep 2014
Hi Guys,   We have installed Symantec Endpoint Protection 12.1.3 on Server 2012 R2. I installed symantec installation client to workstation and it was installed and works fine in client Pcs but it is not listed in the Symantec Endpoint Protection Manager Clients tab. Some workstations are listed but most of them are not listed. Please assist me on this matter. Thanks in advance. 
updated discussion 02 Sep 2014
Hi everybody,   I post here because i read about 20 subjects on this error and i didn't find any solutions in all posts. Here's my problem :   My SEPM service doesn't start anymore and i got this error in my log : The Java Virtual Machine has exited with a code of -1, the service is being stopped. Source : semsrv ID: 4096 The server is a Windows 2008 SP2 SEPM 12.1 RU4 MP1a   Log ...
updated blog entry 02 Sep 2014
Está por toda a parte notícias sobre fotos privadas de celebridades, entre elas a atriz Jennifer Lawrence e Kate Upton, que foram postadas neste final de semana. Quanto à forma como foram obtidas, diversos relatórios têm sugerido que o cibercriminoso teve acesso às contas da Apple iCloud das celebridades. Com base no amplo interesse nesta história, alertamos aos usuários sobre fraudes em torno ...
updated blog entry 02 Sep 2014
Por lo menos cinco bancos en Estados Unidos han sido blanco de una ola de sofisticados ciberataques en agosto. El periódico New York Times ha reportado que los criminales entraron a sus redes bancarias y robaron miles de gigabytes de información relevante, incluyendo datos de cuentas de cheques y de ahorro. La F.B.I. se encuentra realizando una investigación que incluye estudios forenses, pero ...
new discussion 02 Sep 2014
I have seen a large increase in the amount of SPAM email that my end-users are receiving in their Inbox.  After doing some quick searches online it appears we are not the only ones having this issue. Is anyone else seeing a significant increase in SPAM that is getting through their filters recently? Is Symantec aware of this and are they looking into it? My filters are up to date and they ...
updated discussion 02 Sep 2014
The size of the file I used to encrypted by Endpoint Encryption is about 25GB. Today I find it cannot be decrypted with no detail massage from Endpoint Encryption, but other smaller encrypted files could be successfully decrypted. Why? Is there any requirement about the memory size of the computer? Could I have any solution to decrypt such a file which I encrypted?
updated discussion 02 Sep 2014
Recently we upgraded to 12 Endpoint from 11. Everything went good. But few LAN games stopped working, for example Grand Theft Auto IV LAN multiplayer and Command and Conquer Generals: Zero Hour. If i withdraw firewall rule, everything works. Anyone has an idea, what exactly i must allow for games to work? With Endpoint 11 there was no such problem. Thank you.    
updated discussion 02 Sep 2014
Hi Guys,   We have installed Symantec Endpoint Protection 12.1.3 on Server 2012 R2. I installed symantec installation client to workstation and it was installed and works fine in client Pcs but it is not listed in the Symantec Endpoint Protection Manager Clients tab. Some workstations are listed but most of them are not listed. Please assist me on this matter. Thanks in advance. 
updated discussion 02 Sep 2014
Hi everybody,   I post here because i read about 20 subjects on this error and i didn't find any solutions in all posts. Here's my problem :   My SEPM service doesn't start anymore and i got this error in my log : The Java Virtual Machine has exited with a code of -1, the service is being stopped. Source : semsrv ID: 4096 The server is a Windows 2008 SP2 SEPM 12.1 RU4 MP1a   Log ...
new discussion 02 Sep 2014
I have seen a large increase in the amount of SPAM email that my end-users are receiving in their Inbox.  After doing some quick searches online it appears we are not the only ones having this issue. Is anyone else seeing a significant increase in SPAM that is getting through their filters recently? Is Symantec aware of this and are they looking into it? My filters are up to date and they ...
updated discussion 02 Sep 2014
The size of the file I used to encrypted by Endpoint Encryption is about 25GB. Today I find it cannot be decrypted with no detail massage from Endpoint Encryption, but other smaller encrypted files could be successfully decrypted. Why? Is there any requirement about the memory size of the computer? Could I have any solution to decrypt such a file which I encrypted?
updated discussion 02 Sep 2014
i heard about symhelp tool for diagnose. what information will be collected Symantec symhelp tool? Does any security violates will happen when it run?  
updated article 27 Aug 2014
This article presents an introduction to publicly available solutions and knowledge-base for Symantec Liveupdate Administrator (LUA) product - latest  available LUA version is 2.3.3.20. KB listing has been split in several categories to allow you for fast browsing and search of interesting topics. Both Symantec official KB resources and Symantec Connects resources included. Please look ...
updated blog entry 02 Sep 2014
Está por toda a parte notícias sobre fotos privadas de celebridades, entre elas a atriz Jennifer Lawrence e Kate Upton, que foram postadas neste final de semana. Quanto à forma como foram obtidas, diversos relatórios têm sugerido que o cibercriminoso teve acesso às contas da Apple iCloud das celebridades. Com base no amplo interesse nesta história, alertamos aos usuários sobre fraudes em torno ...
updated blog entry 02 Sep 2014
Por lo menos cinco bancos en Estados Unidos han sido blanco de una ola de sofisticados ciberataques en agosto. El periódico New York Times ha reportado que los criminales entraron a sus redes bancarias y robaron miles de gigabytes de información relevante, incluyendo datos de cuentas de cheques y de ahorro. La F.B.I. se encuentra realizando una investigación que incluye estudios forenses, pero ...
new blog entry 02 Sep 2014
Está en todos los medios: fotos privadas de celebridades, como Jennifer Lawrence y Kate Upton, fueron subidas a Internet durante todo el fin de semana. Por la forma en que se obtuvieron, varios informes han sugerido que el atacante tuvo acceso a las cuentas de Apple iCloud de dichas estrellas. Dado el interés que se ha generado sobre el tema, estamos advirtiendo a los usuarios estar alertas ...
updated blog entry 01 Sep 2014
It’s all over the news—private photographs of celebrities, including Jennifer Lawrence and Kate Upton, were posted online over the weekend. As for how they were obtained, various reports have suggested the attacker gained access to the celebrities’ Apple iCloud accounts. Based on the widespread interest in this story, we are warning users about scams around this narrative. Apple ID ...
updated blog entry 30 Aug 2014
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices.  Some of these recent cases have received wide press coverage. As a result, the FBI has issued a warning to US healthcare companies that they may ...
updated blog entry 28 Aug 2014
全球每天都有上百万人主动记录着自己的生活、想法、经历和成就中的点点滴滴,这种活动称为“自我跟踪”,也叫“量化自我”或者“生活记录”。出于种种原因,人们进行自我跟踪。考虑到生成、传输和存储在各处的个人数据量之庞大,隐私和安全成为用户对这些设备和应用程序的重要考量因素。赛门铁克发现很多自我跟踪设备和应用程序都存在安全风险。最主要的问题是,我们发现检查的所有穿戴式活动跟踪设备(包括一线品牌在内)都很容易因为位置跟踪而受到攻击。  我们的研究人员利用 Raspberry Pi ...
updated blog entry 28 Aug 2014
Leveraging Waiting Room Time      Organizations can continue to rely solely on their security vendors to provide the miracle drug or antidote for the digital disease pathogen, or they can take more of a hands-on surveying approach to improve security. Relying on the security vendor is the traditional practice which is normally followed by applying pressure on the security ...
updated blog entry 28 Aug 2014
Epidigitalogy Survey Study Types      In the field of epidemiology there are two study types that I think would be beneficial to the epidigitalogist. The first type of study is a retrospective cohort study. A retrospective cohort study looks to the past for comparison of a known group “cohort” against other groups to identify differences. If we have a known diseased group ...
updated blog entry 28 Aug 2014
Security Response is aware of an alert from US-CERT regarding a threat they are calling Backoff. This threat family is reported to target Point of Sale machines with the purpose of logging key strokes and scraping memory for data (like credit card info) and then exfiltrating the data to the attacker. Symantec Security Response is currently investigating this threat family and is working to ...
updated download 30 Jun 2014
Symantec Data Loss Prevention 11.5: Administration NOTES: This course is 5 days long. TK-DLP-0115 Symantec Data Loss Prevention 11.5: Administration [5-Day ILT]   Click on links below to download course materials:
updated download 27 Jun 2014
*Update available* Hi, I wrote a little Powershell script to update existing SEP 12.1 Installation Packages with the latest definitions for all modules. Instructions: On the SEPM 12.1 share the following folder for “everyone – read” Export Packages without ticking the box “Create a single .EXE file for this package” Ensure that the following .ZIP files exist in the 32Bit and 64Bit package ...
updated download 25 Jun 2014
I made a little tool that will create a new LU policy using a CSV or text file as the input.  The tool can use an existing LU policy as a template.  This will allow you to easily add new Explicit GUP settings or new Multiple GUP settings to an existing LU policy. Here are the steps to use the tool: Download and run tool below. Create a text file (see below for details). (optional) ...
updated download 09 Jun 2014
Hello guys, If you are noticing some problem with disk space after configuring GUP Monitor Tool, take a look below: "C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\apache\logs" = It should be your problem, right? In that folder, SEPM just save errors, by default! If you have configured GUP Monitor Tool, like me, you need to know that you have enabled the access.log as ...
new event 26 Aug 2014
Calling all United States DoD Security Experts and Enthusiasts to Compete with DoD Peers from Around the Globe The Symantec Cyber Readiness Challenge is an immersive, interactive "capture the flag" competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants ...
updated event 18 Aug 2014
Please join us for the next San Francisco Data Loss Prevention User Group meeting on September 9th at the offices of PayPal from 11 a.m. to 3 p.m. Lunch will be served!   Agenda: 11 AM – Introduction & User Group Mission, name the directors and advisory board leaders 11:30 AM to 12:30 PM – Lunch, Meet & Greet 12:30 PM 1:00 PM – DLP and Cloud 1:00 PM to 1:15 PM – Break  1:15 PM to ...
updated event 12 Aug 2014
Presented by: Matt Nelson Attorney and Legal Technology Expert, Information Governance Webcast Summary: Today’s era of technology and data growth presents new and unique challenges for businesses and corporate legal departments in particular. Some speculate that establishing a good “information governance” plan is the only way to address these challenges, yet the term “information ...
new event 12 Aug 2014
Presented by: Eric Schwake, Product Marketing Manager Webcast Summary: Increasingly complex, advanced threats are more prevalent than ever and even with the myriad of security tools available, the news is still filled with information about organizations getting breached. A better approach is needed. Register for this webcast and learn how to ensure your organization has the strongest ...
updated event 08 Aug 2014
The cyber security event provides rich content around cyber security. Guest speakers will address the legal, best practise, and industry issues for cyber security. It will demystify the obvious confusion of Information Security versus Cyber Security, and will explain why for instance Lloyds have moved cyber risk from 13th to 3rd place in its risk register. It will explain the new EU cyber laws ...
event comment 21 Jul 2014
new event 17 Jul 2014
Organizations are spending more on security and believe they’re adequately protected, yet data breaches continue to impact consumers, businesses and governments – the number of breaches jumped 62 percent in 2013. Overworked and understaffed, security teams are stitching together good enough security point products that weren’t designed to work together. Not only does this make organizations ...
new event 17 Jul 2014
Rolling out virtualization in the data center involves a lot of planning and unfortunately, leaves companies just as vulnerable to an attack as other systems. Taking a closer look at virtualized systems, Symantec research has uncovered some key security issues and threats to hit virtualized environments. Attend this live webcast to learn about: The challenges with virtual machines and ...
new event 23 May 2014
  Free Webcast from ITS   Thursday, June 5th at 2 p.m. (est) With the exponential increase in devices, point solutions, appliances, and other hardware in today’s industry, protecting that hardware has become a daunting challenge.  Combined with the evolution of targeted attack motivation from just bragging rights to massive profits, a new approach to IT security is ...
updated video 18 Aug 2014
How-to demonstration of the installation process for LUA (Live Update Administrator)
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated video 11 Jun 2014
You must download Agents before your Symantec.cloud services will work. This video demonstrates how to download agents using any of the three download methods: Directly to a computer; or As a redistributable package; or As download invitations to up to 50 users More details about "Installing and managing Agents" can be seen in the Symantec.cloud Help.   Click here for the video with ...
updated video 11 Jun 2014
You must download Agents before your Symantec.cloud services will work. This video demonstrates how to download agents using any of the three download methods:     Directly to a computer; or     As a redistributable package; or     As download invitations to up to 50 users More details about "Installing and managing Agents" can be seen in the ...
new idea 02 Sep 2014
Hi, I would like to request the ability (product enhancement) whereby a SEP12 managed client can receive Rapid Release updates by way of reaching out to Symantec LiveUpdate Servers.  In a virus outbreak situation it is sometimes necessary to apply RR defs to a few (or all) managed clients. Today we can not achieve this automatically unless the client is in a group where the a/v policy is ...
new idea 01 Sep 2014
We are seeing lots of quarantined messages that we believe are coming from a machine on our network.  There doesn't appear to be a way to track the messages.  If they are released the email header is rewritten, so it it is imposible to identify the source machine.
new idea 29 Aug 2014
Ability to track IP Address of the machine from where login to SMG (GUI/CLI) has been initiated. These logs should be readily visible in the GUI console.
new idea 29 Aug 2014
I would like an enhancement that would allow the SMG to block a NDR message from replying with the internal IP of my SMG box or be able to block the NDR message completely. This is the recommendation I got from the Symantec techinician I was working on for ticket number 07050152.
new idea 28 Aug 2014
An option to allow the following: After an Anti-Virus scan completes the computer automatically shuts down?
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1300
16
AravindKM
293
1
Mithun Sanghavi
1223
59
P_K_
1131
28
jjesse
51
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.