Video Screencast Help
updated discussion 24 Jul 2016
Hi, I have received this logs to the remote syslogs, the thing is I cannot define why there's a lot of content_xx under the logs: UTC|UID|UNTESTED scanner_host bmserver[767]: ...
updated discussion 23 Jul 2016
Hello We're experiencing problems when sending to email addresses that use messagelabs.com MX. See below; Previous Message: 1bQsBx-0005UT-RH: H=cluster3.eu.messagelabs.com [85.158.139.3] Connection timed out This is happening for various accounts on our server which is sending from IP Address 88.202.228.72 I have used this; http://ipremoval.sms.symantec.com/lookup/ to check on our IP and ...
new idea 22 Jul 2016
Can a guide be created showing multiple use cases of all the ways CCS standards can be used for.A use case guide is required providing extensive range of examples each with different examples. This helps organizations to adopt the product at the faster pace. Rather than go through the 1000 page user guide or a thin how to guide for standards with very few examples. Learning by examples is the ...
updated discussion 24 Jul 2016
Hi, I have received this logs to the remote syslogs, the thing is I cannot define why there's a lot of content_xx under the logs: UTC|UID|UNTESTED scanner_host bmserver[767]: ...
updated discussion 23 Jul 2016
Hello We're experiencing problems when sending to email addresses that use messagelabs.com MX. See below; Previous Message: 1bQsBx-0005UT-RH: H=cluster3.eu.messagelabs.com [85.158.139.3] Connection timed out This is happening for various accounts on our server which is sending from IP Address 88.202.228.72 I have used this; http://ipremoval.sms.symantec.com/lookup/ to check on our IP and ...
updated article 22 Jul 2016
Customers Can Now Integrate Compliance Monitoring Into Their Evolving DevOps Process MOUNTAIN VIEW, Calif. – July 20, 2016 – Symantec Corp. (NASDAQ: SYMC), the global leader in cybersecurity, today announced the next version of Symantec Control Compliance Suite, the enterprise-class IT governance, risk and compliance solution. Symantec Control Compliance Suite delivers new ...
updated article 21 Jul 2016
Introduction This is the tenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. This article gets down to some practical particulars on how to take ...
updated article 20 Jul 2016
Click here to visit the site on Symantec.com.
updated article 20 Jul 2016
Please click here to view the current Symantec Security Insights newsletter. Thank you!
updated article 19 Jul 2016
Introduction This is the sixth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. This new "Symantec Insider Tip" article aims to provide advice and ...
updated blog entry 22 Jul 2016
A government organization or a financial company targeted for attack once is likely to be targeted again at least three more times throughout the year, according to the Symantec 2016 Internet Security Threat Report (ISTR) Vol 21. Cyber criminals are setting their sights on governments and large enterprises. In fact, large businesses that experienced a cyber attack saw an average of 3.6 ...
updated blog entry 22 Jul 2016
Buen día. Busco mas información sobre Scan Engine, he instalado un entorno virtual para testearlo pero aun no tengo claro si esta herramienta es la adecuada para lo que necesito. A través de su sdk, necesito escanear archivos desde una app desarrollada en C#. - Scan Engine necesita que el antivirus este instalado?, no tengo claro si Scan Engine es un cliente para Norton o el en si es un ...
updated blog entry 22 Jul 2016
DDoS 공격이란 무엇이며 왜 조심해야 합니까? DDoS(Distributed Denial-of-Service) 공격은 표적을 과부하 상태로 만들어 합법적인 트래픽이 웹 사이트에 액세스할 수 없게 합니다. 즉 거래 은행, 엔터테인먼트 회사, 신문, 전자상거래 포털이 (심지어 Xbox Live의 인터넷 연결까지) 엄청나게 느려지거나 충돌이 발생합니다. DDoS 공격은 2000년부터 광범위하게 보고되었으며 해를 거듭할수록 규모, 횟수, 강도가 더욱 증가하고 있습니다. 이 공격은 오랜 세월에 걸쳐 그 효과가 입증되었고 예방이 거의 불가능하며 매우 저렴하게 임대할 수 있을 뿐 아니라 장기적으로 엄청난 폐해를 불러올 수 있습니다. Gino Grieco는 Wrist Grabs and ...
new blog entry 22 Jul 2016
ここ数週間、出会い系アプリ Tinder では、ユーザーに宛てたメッセージで、オンラインの出会いが安全になると謳うスパムが確認されています。目的は、ユーザーを誘導してアフィリエイトの報酬を稼ぐことにあります。 これは、モバイルの出会い系アプリでは最新のスパムです。2013 年以降シマンテックは、モバイルの出会い系アプリとして人気の Tinder でスパムボットが増加しているということを何度かブログ記事でお伝えしてきました。Tinder は最近サービスを変更し、プレミアム版を導入しましたが、スパマーが狙う標的としての人気は衰えていません。 図 1. Tinder ユーザーにメッセージを送るスパムボットの例 Tinder の認証は済ませました? この新しいスパムボットは、「Wanna eat cookie dough together some ...
new blog entry 21 Jul 2016
在最近几周,我们发现Tinder上有垃圾邮件以消息形式发送至用户,要求用户增强在线交友安全等级。诈骗者将此作为诱饵,把诈骗所得钱款收入囊中。 以上是垃圾邮件攻击手机交友应用程序的最新趋势。自2013年起,我们发布了几篇相关博文,详细描述垃圾邮件程序在Tinder这款知名手机交友应用程序上的活动有所上升。尽管Tinder最近推出了高端服务以对原有服务做出相应改变,但该应用程序仍然是网络诈骗者们的热门目标。 图1. 垃圾邮件程序向Tinder用户发送消息 您通过Tinder验证了吗? 这些新型的垃圾邮件程序用轻浮或幽默的开场白发起对话,比如“有空想一起去吃曲奇饼吗?” 在发完一连串消息后,垃圾邮件程序将询问用户是否通过Tinder验证。 图2. ...
updated blog entry 21 Jul 2016
微软Office恶意宏在2015年卷土重来。从散布勒索软件至银行木马病毒,该恶意宏对计算机用户构成了巨大威胁。目前,我们发现网络罪犯将宏病毒融入到网络钓鱼攻击之中,从而通过电邮窃取用户信息。网络攻击者在这场攻击活动共发送了几千封德语的网络钓鱼电邮,且其中的Excel附件含有宏病毒。 利用宏病毒进行网络钓鱼攻击 在这场德语网络钓鱼攻击活动中,网络攻击者发出带有Excel附件的电邮。电邮中声称这些信息来自于一家德国银行。这些电邮的主题包括: Neue Sicherheitsrichtlinien Sicherheitsrichtlinien Bitte aktualisieren Sie Ihre Daten Kundendaten 将这些主题进行翻译后为: 新安全政策 安全政策 请更新信息 客户数据 图1. 网络钓鱼电邮带有Excel附件,该附件中内含恶意宏。 ...
updated blog entry 21 Jul 2016
对于任何信息技术经理来说,若接到电话得知机构数百台电脑受勒索软件感染,导致关键系统离线,机构所有业务面临风险,那么其肯定有如身处噩梦中一样。 这种情况在今年早些时候发生在一家大型机构身上。该机构在那时发现自己成为了一场精心策划和执行的勒索软件攻击的受害者。我们的调查发现这次攻击完美地代表了新兴形式企业特定攻击。虽然绝大多数勒索软件犯罪团伙在攻击时目标广泛模糊,但还有一些犯罪团伙开始故意将目标瞄准特定机构,目的是使其业务彻底瘫痪以榨取大量赎金。 这些攻击有很多采用了我们在网络间谍攻击所见到的高水平技术,即使用一个可利用软件漏洞和正版软件实用程序的工具箱非法闯入机构网络。 我们所举出的网络攻击者并没有什么不同之处,他们也是利用某机构一个服务器的未修补漏洞在其网络上获取立足点。这些网络攻击者使用很多公开的黑客工具,绘制出受害者的网络,并使用迄今未知的一种勒索软件变体尽可能多地感染计算机 ...
updated blog entry 21 Jul 2016
How confident are you with your current endpoint security? Do you know what’s happening on your endpoints? Are you troubled by numerous random alerts? If you are, you’re not alone because a recent ESG report shows that security staffs spend nearly 40% of their time firefighting. When you’re in a world with over 1.1 million new malware variants created on daily basis, it’s hard ...
new blog entry 21 Jul 2016
Symantec Uncovers New Details on Cybercriminals in the Middle East and North Africa Project Desert Host highlights tactics, techniques and procedures of adversaries in region Symantec analysts have observed a spike in malicious activity – chiefly ransomware variants, such as Locky, Cryptolocker, and DMA Locker – communicating with bullet proof hosting service (BPHS) infrastructure in four key ...
updated blog entry 21 Jul 2016
Pokemon Go (手遊精靈寶可夢)在全球引發了一場抓捕小精靈的熱潮,儘管只在部分地區發佈,但這款遊戲卻在不到一周的時間內獲得了超過百萬次的安裝量。 Pokemon Go的火爆現象同時也吸引了網路罪犯的注意。 賽門鐵克資安團隊已經發現了針對該遊戲的社交媒體詐騙和木馬版本。 不僅如此,由於官方版本要求使用者開放相關許可權,隱私和資料安全問題也受到了公眾的關注。 在奮力抓捕精靈的同時,賽門鐵克資安團隊希望提示玩家注意以下網路威脅,保護設備和自身安全。 免費 PokeCoin 騙局 在Pokemon Go中,玩家可以在應用內購買被稱為 PokeCoin 的虛擬貨幣,並用來購買遊戲中的道具,例如引誘精靈的熏香,或孵化稀有精靈的蛋。 一些玩家希望繞過應用程式內的購買機制,嘗試在網路上搜索打折或免費的PokeCoin。 ...
new download 17 Jun 2016
Ever had the CCS Agent registered with wrong name or agent IP changed? In some situations it can be pain to fix this as it requires going to agent and running the registration again (imaging you do not have access to agent server and you have to raise ticket to 3rd party supplier and he asks you to raise a change request). Well with these two simple scripts, you can change both agent name and ...
new download 16 May 2016
To make use of stop-words for russian language, download attached file, unzip it and place to the "Protect\config\stopwords" subfolder in the Symantec DLP installation directory. Then go to the "Advanced settings" page of selected detection server and set the variable "Lexer.StopwordLanguages" to "en,ru". Do it for every detection server you have.
updated download 22 Apr 2016
Symantec DCS Policy Utility v1.0.0.11 For Windows OS (Note .NET Framework 4.5 is required) Designed to help you tune your policy by processing the log files from an Agent. There's a getting started tab that explains the best steps to get the logs and events you need to troubleshoot your policy. The program does not make any changes to the machine or policy. It parses the sisidsevents and ...
updated download 01 Apr 2016
When a customer is using the forensics software "Encase 7" with our Symantec Endpoint Encryption Full Disk 8.2.0 software, the customer will need the appropriate DLLs so that the Encase product can successfully work with our Full Disk product. The DLLs required are attached here and can also be located within the original product download under the subfolder "utilities". The DLLs required in ...
updated download 01 Apr 2016
At times, a customer may require the details for creating a batch file (startup script) to assist in the uninstallation of a Symantec Endpoint Encryption Device Control client that was installed via GPO. You cannot use the automatic uninstall feature in the GPO software installation package because the Device Control uninstall procedure is password protected. To uninstall Device Control you ...
updated event 13 Jul 2016
Topic: Why are cybercriminals targeting Services and Financial? Speaker: Matt Reid, ITS VP of Risk Management Date: Thu, Jul 14, 2016 11:00 AM - 12:00 PM EST Details: Services and Financial industries are key targets for cyber criminals and it’s not just because of the bounty…learn what they have in common and what to do about it! Regional Banks and Credit Unions are ...
new event 08 Jul 2016
South Florida Cyber Security Forum has been created based on the complexity of today’s global threat environment. As IT no longer rules the roof, device and data explosion coupled by being ever targeted by data breaches and battered attacks continue to make cyber security grow. This all revolves around the balance between privacy, anonymity, technology and security.  This is a free ...
new event 27 Jun 2016
Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.  Join us for an interactive discussion and learn more about  • How emerging security technologies are helping organizations defend against targeted attacks ...
updated event 27 Jun 2016
The Philadelphia Security User Group invites you and all Symantec customers in the Mid-Atlantic region to join us for our annual user group meeting at Hershey Park, PA on Friday, August 5 from 9:00 am to 1:00 pm. Breakfast will be served for you, with free park tickets for your whole family! Register Today! Agenda Behind the Scenes Forensics - Real World Attacks, the Tools We Use and How to ...
updated video 13 Jul 2016
In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which  provides IT security teams with the best visibility in their endpoint environment.   Advanced Threat Protection - Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console.   Download our ATP whitepaper at ...
updated video 19 May 2016
This video will help new customers to provision their domains and inbound routes once they have access to the administration portal. If you want a desktop aid to provide a step by step guide as to the tool, then please download that here.
new video 17 May 2016
Bay Dynamics recently announced the availability of the standalone IT Analytics Server 2.1, which includes an enhanced web based cube browser. This video walks you through how as an existing Symantec Endpoint Protection customer, you can leverage IT Analytics Server to visualize your cube data and take advantage of its benefits.
updated video 17 May 2016
Bay Dynamics recently announced the availability of the standalone IT Analytics Server 2.1, which includes an enhanced web based cube browser. This video walks you through how as an existing Symantec customer, you can leverage IT Analytics Server to visualize your cube data and take advantage of its benefits.
new video 17 May 2016
In this video, we demonstrate how to install the new standalone IT Analytics Server v2.1 with the Symantec Data Loss Prevention content pack.
updated video 17 May 2016
This training module aims to walk you through how to setup a new business partner in the Encryption module of the Management Portal. Watch more Videos in the Self-serve TLS video series: Self-serve TLS: Moving domains from one Business Partner to another Self-serve TLS: Getting visibility into your enforcements Self-serve TLS: Enforcing TLS encryption between you and the Email Security ...
new video 13 May 2016
This video shows you the new features in Advanced Threat Protection 2.0.2.
updated video 13 May 2016
In this video, you'll see how you can use a STIX file to perform a database search in Advanced Threat Protection 2.0.2 and later.
new idea 22 Jul 2016
Can a guide be created showing multiple use cases of all the ways CCS standards can be used for.A use case guide is required providing extensive range of examples each with different examples. This helps organizations to adopt the product at the faster pace. Rather than go through the 1000 page user guide or a thin how to guide for standards with very few examples. Learning by examples is the ...
updated idea 22 Jul 2016
awooso posted: IPSEC
I am currently doing an implementation of Symantec firewall to block all intersubnet traffic except a very select few for a very select subnet. Symantec firewall does a great jo and offers a lot of really easy to configure controls except when dealing with IPsec........... Since IPsec required port 500 upd (some say IP protocol 50 and 51) it should be a simple build right? except Symantec ...
new idea 22 Jul 2016
From within the SEPM if you sync an AD container that has managed clients in a unsynched container it moves them to the synched container in the SEPM and will not allow you to move them back without breaking the client management.  This being said it would be very helpful to be able to scan AD for hosts & their client status if present with the option to deploy ...
new idea 21 Jul 2016
There needs to be a tools that will convert existing SEP policies to new versions of SEP policies that have new features. I should not have to rewrite policies everytime there is a SEP update.
new idea 21 Jul 2016
I would like to see the option to copy the deployment settings (install packages) to multiple groups at once.  Each of our groups need to update to the latest 12.1.7004.6500 client and now I have to add each one individually even using the "Copy Deployment settings" in SEPM. The checkboxes already exist, this should of been expanded to allow multiple group to be selected from the start. ...
updated idea 20 Jul 2016
Our company uses LogMeIn Central to manage all of our machines and servers throughout our facility. It has status updates for antivirus that allows us to know when there are threats, outdated databases, and any other general issues with the antivirus installed on the machines. Sadly, LogMeIn has not supported any newer updates of Endpoint Protection since version 12.1.5337. A year ago, they ...
updated idea 19 Jul 2016
I have some of Multiple Symantec End Point Manager Console to be maintaining Clients in different Factories, we requested to view the all factories SEPM Console (multiple Console in one Console) in One Console to monitoring the task,. Thanks & Regards Sureshkumar.R
updated idea 18 Jul 2016
Hi I just want to know if there is development in the works to add the feature to generate the unmanaged detector result. It will be easy to export the result if the report is exported via .csv or .txt format. hope in the future release this feature will add on SEPM. Thanks