Video Screencast Help
new discussion 27 Aug 2014
Is anyone else seeing issues in DLP version 12.x with corrupted emails to recipients.  I am hearing that IronPort is "Cleaning" Bare CRLFs out of fragmented packets before reassembling them, which is breaking the message header. Proposed solution is to change a setting in IronPort to NOT clean BARE CRLF. Want to understand the risk in doing so. Thanks, Bob.
new blog entry 27 Aug 2014
The healthcare industry has for years been the number one industry in reported data breaches.  But this dubious honor has been driven in some part because healthcare has the most stringent reporting requirements of any industry.  In other words, unlike other industries, they have to report a data loss.  If every industry had the same reporting requirements, things might look ...
new discussion 27 Aug 2014
Is anyone else seeing issues in DLP version 12.x with corrupted emails to recipients.  I am hearing that IronPort is "Cleaning" Bare CRLFs out of fragmented packets before reassembling them, which is breaking the message header. Proposed solution is to change a setting in IronPort to NOT clean BARE CRLF. Want to understand the risk in doing so. Thanks, Bob.
updated article 27 Aug 2014
This article presents an introduction to publicly available solutions and knowledge-base for Symantec Liveupdate Administrator (LUA) product - latest  available LUA version is 2.3.3.20. KB listing has been split in several categories to allow you for fast browsing and search of interesting topics. Both Symantec official KB resources and Symantec Connects resources included. Please look ...
updated article 22 Aug 2014
Issue The SEPM server needs to be reinstalled and reconnected to its existing SQL Database. Solution Note: Only the screen shots for the most important steps are shown. Note: The Database username and password is needed during the reinstallation. Make sure to know it before performing the below steps. This is not the same account as the SA account. ############## (!) IMPORTANT: Make sure to ...
updated article 15 Aug 2014
What is vShield-enabled Shared Insight Cache? Virtual clients in a VMware vShield infrastructure can use a vShield-enabled Shared Insight Cache to reduce scan loads. A vShield-enabled Shared Insight Cache runs in a Symantec Endpoint Protection Security Virtual Appliance. You must install the appliance so that Windows-based Guest Virtual Machines (GVMs) can use VMware vShield Endpoint to access ...
updated article 14 Aug 2014
Introduction This is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using SEPM Alerts and Reports to Combat a Malware Outbreak, demonstrated how to use reporting features of SEP 12.1's SONAR component to identify Suspicious ...
new blog entry 27 Aug 2014
The healthcare industry has for years been the number one industry in reported data breaches.  But this dubious honor has been driven in some part because healthcare has the most stringent reporting requirements of any industry.  In other words, unlike other industries, they have to report a data loss.  If every industry had the same reporting requirements, things might look ...
updated blog entry 27 Aug 2014
Hace un año Symantec advirtió a los usuarios sobre una de las primeras apariciones de correo no deseado (spam) relacionado con webcams para adultos en Tinder,  aplicación que en aquel momento era la novedad para conocer a una pareja o buscar citas. También avisamos sobre una probable inundación de bots generadores de spam en la versión para el sistema Android que se lanzó posteriormente. ...
updated blog entry 27 Aug 2014
This blog contains all the versions of SEP and SEPM (Symantec Endpoint Protection Manager) which were released since the first version of SEP in Sep 2007. It contains the Enterprise Editions (EE) and Small Business Editions (SBE) RTM - Release To Manufacturing MR - Maintenance Release (replaced by RU) RU - Release Update MP - Maintenance Pack PP - Point Pack           ...
updated blog entry 27 Aug 2014
Spying and violation of privacy are topics that never seem to be out of the headlines these days. Stories about mobile malware being used by governments and law enforcement agencies to spy on people (Finfish), smartphones coming off the production line with spyware preinstalled (Android.Uupay), or stories about cameras and microphones on smartphones being used for spying are all fairly ...
new blog entry 26 Aug 2014
最近、店頭レジ端末(POS)を狙う Trojan.Backoff という脅威が、米国で 1,000 社以上の企業に影響を与えていることが確認されました。Backoff は、感染先の端末からクレジットカードやデビットカードの情報を盗み出す機能を備えています。米国国土安全保障省は、Backoff がもたらす脅威を受けて勧告を発行し、規模の大小にかかわらずすべての企業に対して、使用している機器が POS マルウェアに感染していないかどうか確認するよう推奨しています。 これに先立って US-CERT が7 月 31 日に公開した警告によると、POS システムのプロバイダやベンダー 7 社は、複数の顧客がマルウェアの影響を受けていることを確認しています。国土安全保障省は、感染の発生場所の詳しい情報を基に、米国で 1,000 ...
new blog entry 26 Aug 2014
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices.  Some of these recent cases have received wide press coverage. As a result, the FBI has issued a warning to US healthcare companies that they may ...
updated blog entry 26 Aug 2014
Often considered the backbone of global business, SMBs are a unique mix of entrepreneurial drive, daring ingenuity and highly customer-centric practices. SMBs need to compete in the virtual marketplace with players of all sizes, where square footage doesn’t matter; they are forever seeking ways to stay competitive. One arena where they have a greater chance to level the playing field is in ...
updated blog entry 26 Aug 2014
         The term incident response means a lot of things to a lot of people. Historically, words like “unpleasant” or “chaotic” come to mind when thinking about the last time many organizations responded to the suspicion of a compromise by external attackers. Today, for most organizations incident response is a part of their security program but is ...
updated blog entry 26 Aug 2014
Contributor: Mark Anthony Balanza As a successful business sector, the automobile industry is an attractive target for cybercrime. The automobile industry is composed of a multitude of businesses ranging from manufacturers and sellers to garages offering maintenance and repair. Earlier this month, we observed a spam campaign that targeted several small to medium sized companies within the ...
updated blog entry 26 Aug 2014
A recently discovered point-of-sale (PoS) threat known as Trojan.Backoff has affected more than 1,000 US businesses and is capable of stealing credit and debit card information from infected terminals. The threat posed by Backoff has prompted the US Department of Homeland Security to issue an advisory, encouraging all organizations, regardless of size, to check their equipment for PoS malware ...
updated download 30 Jun 2014
Symantec Data Loss Prevention 11.5: Administration NOTES: This course is 5 days long. TK-DLP-0115 Symantec Data Loss Prevention 11.5: Administration [5-Day ILT]   Click on links below to download course materials:
updated download 27 Jun 2014
*Update available* Hi, I wrote a little Powershell script to update existing SEP 12.1 Installation Packages with the latest definitions for all modules. Instructions: On the SEPM 12.1 share the following folder for “everyone – read” Export Packages without ticking the box “Create a single .EXE file for this package” Ensure that the following .ZIP files exist in the 32Bit and 64Bit package ...
updated download 25 Jun 2014
I made a little tool that will create a new LU policy using a CSV or text file as the input.  The tool can use an existing LU policy as a template.  This will allow you to easily add new Explicit GUP settings or new Multiple GUP settings to an existing LU policy. Here are the steps to use the tool: Download and run tool below. Create a text file (see below for details). (optional) ...
updated download 09 Jun 2014
Hello guys, If you are noticing some problem with disk space after configuring GUP Monitor Tool, take a look below: "C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\apache\logs" = It should be your problem, right? In that folder, SEPM just save errors, by default! If you have configured GUP Monitor Tool, like me, you need to know that you have enabled the access.log as ...
new event 26 Aug 2014
Calling all United States DoD Security Experts and Enthusiasts to Compete with DoD Peers from Around the Globe The Symantec Cyber Readiness Challenge is an immersive, interactive "capture the flag" competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants ...
updated event 18 Aug 2014
Please join us for the next San Francisco Data Loss Prevention User Group meeting on September 9th at the offices of PayPal from 11 a.m. to 3 p.m. Lunch will be served!   Agenda: 11 AM – Introduction & User Group Mission, name the directors and advisory board leaders 11:30 AM to 12:30 PM – Lunch, Meet & Greet 12:30 PM 1:00 PM – DLP and Cloud 1:00 PM to 1:15 PM – Break  1:15 PM to ...
updated event 12 Aug 2014
Presented by: Matt Nelson Attorney and Legal Technology Expert, Information Governance Webcast Summary: Today’s era of technology and data growth presents new and unique challenges for businesses and corporate legal departments in particular. Some speculate that establishing a good “information governance” plan is the only way to address these challenges, yet the term “information ...
new event 12 Aug 2014
Presented by: Eric Schwake, Product Marketing Manager Webcast Summary: Increasingly complex, advanced threats are more prevalent than ever and even with the myriad of security tools available, the news is still filled with information about organizations getting breached. A better approach is needed. Register for this webcast and learn how to ensure your organization has the strongest ...
updated event 08 Aug 2014
The cyber security event provides rich content around cyber security. Guest speakers will address the legal, best practise, and industry issues for cyber security. It will demystify the obvious confusion of Information Security versus Cyber Security, and will explain why for instance Lloyds have moved cyber risk from 13th to 3rd place in its risk register. It will explain the new EU cyber laws ...
event comment 21 Jul 2014
new event 17 Jul 2014
Organizations are spending more on security and believe they’re adequately protected, yet data breaches continue to impact consumers, businesses and governments – the number of breaches jumped 62 percent in 2013. Overworked and understaffed, security teams are stitching together good enough security point products that weren’t designed to work together. Not only does this make organizations ...
new event 17 Jul 2014
Rolling out virtualization in the data center involves a lot of planning and unfortunately, leaves companies just as vulnerable to an attack as other systems. Taking a closer look at virtualized systems, Symantec research has uncovered some key security issues and threats to hit virtualized environments. Attend this live webcast to learn about: The challenges with virtual machines and ...
new event 23 May 2014
  Free Webcast from ITS   Thursday, June 5th at 2 p.m. (est) With the exponential increase in devices, point solutions, appliances, and other hardware in today’s industry, protecting that hardware has become a daunting challenge.  Combined with the evolution of targeted attack motivation from just bragging rights to massive profits, a new approach to IT security is ...
updated video 18 Aug 2014
How-to demonstration of the installation process for LUA (Live Update Administrator)
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated video 11 Jun 2014
You must download Agents before your Symantec.cloud services will work. This video demonstrates how to download agents using any of the three download methods: Directly to a computer; or As a redistributable package; or As download invitations to up to 50 users More details about "Installing and managing Agents" can be seen in the Symantec.cloud Help.   Click here for the video with ...
updated video 11 Jun 2014
You must download Agents before your Symantec.cloud services will work. This video demonstrates how to download agents using any of the three download methods:     Directly to a computer; or     As a redistributable package; or     As download invitations to up to 50 users More details about "Installing and managing Agents" can be seen in the ...
new idea 27 Aug 2014
Now that we have AD attribute based agent configuration assignment possible, it will be good to move the Endpoint Server including failover server configuration from agent package to agent configuration. This will help avoid the complication of having multiple agent packages for each endpoint server specially in large setups with several locations having thier own endpoint server. It will also ...
updated idea 27 Aug 2014
Hi, Symantec Endpoint Encryption (SEE) uses Microsoft management console (MMC). It would be nice to see Java console instead of MMC.
new idea 26 Aug 2014
Only NTLM v1 is supported for proxy authentication in External communication of Endpoint Protection for the purpose of submissions. This means proxy credentials are sent in clear text. This is not desirable. Please built support for Kerberos of NTLM v2 in the near future.
new idea 25 Aug 2014
We're finding Symantec Endpoint Protection to be too restrictive in how it presents data.  The MHT format is good for display, but we'd like to create data in XLSX (or CSV) format for data manipulation. Also more granularity.  A drop-down option lets me select one criterion.  But sometimes I want client reports on all server operating systems, or multiple client Windows ...
updated idea 21 Aug 2014
Hi,     I would like to suggest to create the Symantech Endpoint Protection Manager SEPM also on linux. This would solve issues having licencing cost for the OS if only none windows clients are managed.     Regards, Danijel
new idea 21 Aug 2014
Hello, we would like to protect the Endpoint Protection installtions on our Mac-Clients using an uninstall password. The users are admins or have administrator privileges. Can you please implement this feature in future product versions? Thank you in advance.
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1295
16
AravindKM
293
1
Mithun Sanghavi
1223
59
P_K_
1131
28
jjesse
51
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.