Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.
new discussion 06 May 2015
When I run Live update today (on 4 different computers)' It downlods the catalogs then says Update available for Virus and Spyware Definistions Win32 (hub) Update available for Virus and Spyware Definitions Win32. but then says 0 update(s) have been downloaded Session summary: 2 updates(s) available, 0 update(s) installed LiveUpdate sessions is complete. Is there some definitions issues?
updated blog entry 06 May 2015
俗话说,生活中唯一不变的就是变化。在互联网安全领域,这当然也是真的。在这个领域里,努力保护数字世界安全性的人们与努力将其转为己用的人们之间,存在着一场旷日持久的猫鼠游戏。 第 20 期赛门铁克《互联网安全威胁报告》(ISTR)显示,网络攻击者拦截公司的基础架构并将其转为己用,从而渗透入网络和避开检测;同时,他们还通过最终用户的智能手机和社交媒体向其勒索钱财,捞取现金。 随着不断有引人注目的泄漏事件登上头版,人们对于网络“风险因素”的警觉性也高于以往——但是,很多人还是没有采取行动,或者仍陷在与旧战略的对抗中,而非迎战直面而来的攻击者。 2014 ...
discussion comment 06 May 2015
new discussion 06 May 2015
Hi Everyone, Good day it is my first time to implement  a SWG 8490 appliance. Please enlighten regarding the 4 nic card (2 WAN nic port and 2 LAN port), May i know, why there are 4 ports in exclude managment port and monitor port? what are possible setup scenario 4 ports can be use? and what is the purpose of monitor port and scenario usage. thanks
new discussion 06 May 2015
When I run Live update today (on 4 different computers)' It downlods the catalogs then says Update available for Virus and Spyware Definistions Win32 (hub) Update available for Virus and Spyware Definitions Win32. but then says 0 update(s) have been downloaded Session summary: 2 updates(s) available, 0 update(s) installed LiveUpdate sessions is complete. Is there some definitions issues?
discussion comment 06 May 2015
new discussion 06 May 2015
Hi Everyone, Good day it is my first time to implement  a SWG 8490 appliance. Please enlighten regarding the 4 nic card (2 WAN nic port and 2 LAN port), May i know, why there are 4 ports in exclude managment port and monitor port? what are possible setup scenario 4 ports can be use? and what is the purpose of monitor port and scenario usage. thanks
updated article 30 Apr 2015
Content: What is vShield-enabled Shared Insight Cache? Software requirements and prerequisites Installing vShield Endpoint on ESXi hosts Configuring the Symantec Endpoint Protection Security Virtual Appliance installation settings file Installing a Symantec Endpoint Protection Security Virtual Appliance Installing the EPSEC driver on GVMs Enabling Symantec Endpoint Protection clients to use a ...
updated article 29 Apr 2015
WHAT IS USER AUTHENTICATION? Protect access to your networks and websites with strong user authentication by combining multiple identification factors together for enhanced security. Choose from a range of easy-to-use and easy-to-implement secure credentials and digital certificates. AUTHENTICATION PRODUCTS Validation and ID Protection Service (VIP) Federal Risk and Authorization ...
updated article 27 Apr 2015
Symantec Data Loss Prevention We help you protect your data from loss and theft, comply with privacy laws, and safeguard your reputation. Symantec Data Loss Prevention software discovers, monitors, protects and manages your confidential data wherever it’s stored and used – across endpoints, mobile devices, network and storage systems. It consists of a unified management platform, ...
updated article 27 Apr 2015
Meet the all-new Norton.  Boldly go where you want, when you want. NORTON PRODUCTS Norton Security Norton Security with Backup Norton Small Business Norton Mobile Security Norton Online Backup 25GB Norton Utilities Norton Family Premier NortonLive Ultimate Help Desk OTHER DOCUMENTATION Frequently Requested Information Federal Identity, Credential and Access Management (FICAM) Return ...
updated article 27 Apr 2015
What is Symantec Encryption? Symantec’s encryption portfolio provides flexible data protection through a range of offerings including endpoint, file and folder and email encryption. Integration with Symantec Data Loss Prevention delivers added protection by automatically encrypting sensitive data being moved onto removable media devices or residing in emails and files. Robust management ...
updated article 27 Apr 2015
Symantec's Email family of cloud services and products deliver Security, Privacy and Control over your email. Protection from malware, phishing, spam and targeted attacks is combined with BYOD, Secure Email for Smartphones & Tablets, Archiving, Data Loss Prevention & Encryption to compliment your cloud hosted or on-premise mailboxes. FOR MAILBOXES IN THE CLOUD Email Security.cloud Symantec ...
updated blog entry 06 May 2015
俗话说,生活中唯一不变的就是变化。在互联网安全领域,这当然也是真的。在这个领域里,努力保护数字世界安全性的人们与努力将其转为己用的人们之间,存在着一场旷日持久的猫鼠游戏。 第 20 期赛门铁克《互联网安全威胁报告》(ISTR)显示,网络攻击者拦截公司的基础架构并将其转为己用,从而渗透入网络和避开检测;同时,他们还通过最终用户的智能手机和社交媒体向其勒索钱财,捞取现金。 随着不断有引人注目的泄漏事件登上头版,人们对于网络“风险因素”的警觉性也高于以往——但是,很多人还是没有采取行动,或者仍陷在与旧战略的对抗中,而非迎战直面而来的攻击者。 2014 ...
updated blog entry 06 May 2015
When I think of the cyber security realm, three characteristics come top of mind- Velocity, Volume and Variety. These three facets of the attack landscape make security a consistently moving target. It’s one of the only verticals where an active attack actor can change the state of an industry with a touch of keyboard. Over the last decade we have had a front row seat to witness the evolution ...
updated blog entry 04 May 2015
I jumped at the opportunity to write this blog – as my son’s name is Luke and therefore, “Luke, I am your father”. Let’s remember that tense moment in Garbage Compactor 3263827:  after narrowly escaping Death-By-Dianoga, imminent demise again confronts Leia, Luke, Chewbacca and Han as the garbage compactor starts doing what garbage compactors do best.  The young rebels frantically ...
updated blog entry 04 May 2015
SYMANTEC OFFICIAL RULES FOR THE STAR WARS SAGA BLU-RAY FACEBOOK SWEEPSTAKES DRAWING THE STAR WARS DAY FACEBOOK SWEEPSTAKES DRAWING IS OPEN TO LEGAL RESIDENTS OF THE 50 UNITED STATES AND THE DISTRICT OF COLUMBIA (EXCLUDING GUAM, PUERTO RICO, AND ALL OTHER U.S. TERRITORIES AND POSSESSIONS) AND CANADA (EXCLUDING QUEBEC) WHO ARE THE AGE OF MAJORITY IN THEIR STATE OF RESIDENCE AND AT LEAST 18 ...
updated blog entry 04 May 2015
While email remains a significant attack method for cybercriminals, attackers are now setting their sights (and scams!) on social media. In 2014, Symantec observed a 70 percent increase in scams distributed via social media, which often spreads rapidly because people are more likely to click something posted by a friend. Criminals hijacked the power of “social proof” – the idea that we ...
updated blog entry 30 Apr 2015
The WordPress content management system used by millions of websites is vulnerable to two newly discovered threats that allow attackers to take full control of the Web server.  Jouko Pynnönen discovered the zero-day vulnerability in WordPress versions 4.2 and earlier, which allows an attacker to use stored or persistent, cross-site scripting (XSS) bugs to embed code into a WordPress ...
updated blog entry 30 Apr 2015
More than 11,000 files were found to be easily accessible on cloud storage containers, some of which exposed sensitive data such as email addresses, passwords, and credit card transaction logs. That’s according to our research into the risks surrounding infrastructure-as-a-service cloud environments, which found that administrators have been leaking private information through their cloud ...
updated download 08 Jan 2015
To build on my last IR article: How to utilize SEP 12.1 for Incident Response - PART 6 I'm attaching a custom IPS policy which will detect the download of various filetypes via HTTP and HTTPS. The signatures are in Allow mode and set to write to the Packet log for detailed information. As of now, this policy will detect 37 different filetypes. I will update it as I add more. Feel free to use ...
download comment 05 Dec 2014
updated event 13 Apr 2015
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Symantec Data Loss ...
updated event 09 Apr 2015
Please note: This meeting has been rescheduled to a week later on Friday, April 17th! Due to an illness, Mike will be unable to attend and present tomorrow. We apologize for the short notice and any inconvenience this may have caused. We hope to see you there next week! Please join us for the next Twin Cities Data Loss Prevention User Group meeting on Friday, April 17th from 11:00am to 3:00pm ...
new event 10 Mar 2015
Presented by: Pete Lindstrom, Director, Security Products, IDC Research Nico Popp, Vice President Information Protection, Symantec   Webcast Summary: The cloud has changed the way we do business and is forcing us to rethink security in new ways. The fact that information flows freely outside of the enterprise walls and back again means we need to consider how we secure that information ...
updated event 09 Mar 2015
Please join us for the next Philadelphia Security & Compliance User Group meeting on Wednesday March 11th from 9:00am to 12:00pm at Dave & Buster's. The meeting will feature presentations on SEP and DLP from Symantec. Lunch will be served! Agenda: Welcome, Announcements & Introductions Roadmap of Security Solutions by Neil Christie, Symantec SEP DLP Planning, Prizes and ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new event 03 Mar 2015
The Symantec Control Compliance Suite (CCS) 11.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This instructor-led course focuses on using Control Compliance Suite 11.0 to define risk and compliance objectives, develop policies and controls to govern the ...
new video 04 May 2015
How to submit suspicious files with Threat Analysis Threat Analysis를 통해 탐지된 의심스러운 파일을 어떻게 판단하여 Symantec Security Response Team에 업로드 하는지 알아봅니다. 준비사항: 1. Threat Analysis by Symhelp tool 2. Threat Analysis Report Symhelp Download: http://www.symantec.com/business/support/index?page=content&id=TECH170752 Threat Analysis 사용 방법은 아래의 URL을 참고하시기 ...
updated video 29 Apr 2015
In this short video, you learn how to troubleshoot a client that is unable to communicate with the SEPM by reviewing settings and running SymHelp. You also learn how to deploy new communication settings to the client. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection ...
updated video 29 Apr 2015
In this short video, you learn how to troubleshoot and resolve a replication issue by examining Tomcat logs and other areas of the SEPM. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting Client Communication Issues Troubleshooting Group Update ...
updated video 29 Apr 2015
In this short video, you learn how to configure a client as a GUP. You also learn how to configure clients to retreive LiveUpdate content from a GUP. In addition you learn how to ensure tha clients are retrieving content from a GUP. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection ...
updated video 29 Apr 2015
In this short video, you learn how to troubleshoot a failed SEP client installation by reviewing key logs and running SymHelp and Windows Installer. You also learn how to successfully re-deploy the client. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting ...
updated video 29 Apr 2015
In this short video, you learn how to troubleshoot a SEPM that cannot connect to LiveUpdate. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting Client Installation Issues Troubleshooting Client Communication Issues Troubleshooting Group Update Providers Troubleshooting a Replication Issue Troubleshooting ...
updated video 29 Apr 2015
Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting Client Installation Issues Troubleshooting Client Communication Issues Troubleshooting Group Update Providers Troubleshooting a Replication Issue Troubleshooting Performance Issues
updated video 29 Apr 2015
In this short video, you learn how to troublehoot a SEPM console connection issue with an MS SQL database. Please watch the other videos in this series: Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting Client Installation Issues Troubleshooting Client Communication Issues Troubleshooting Group Update Providers Troubleshooting a ...
updated video 29 Apr 2015
In this short video, you learn how to idenitfy and troubleshoot SEP performance issues with Windows Task Manager and Symantec Help. Please watch the other videos in this series: Troubleshooting Console Issues Troubleshooting LiveUpdate Configuration Issues Troubleshooting LiveUpdate Connection Issues Troubleshooting Client Installation Issues Troubleshooting Client Communication ...
updated video 09 Apr 2015
This video shows how groups are created and used within the Symantec Endpoint Protection Small Business Edition management console. ************************************************************************************************************* SCRIPT: Welcome to this program on creating and using groups in your Symantec Endpoint Protection Small Business Edition account. In this video, you will ...
new idea 05 May 2015
With SEPM you only have a limited amount of options to specify for application control about the processes. You can match a process name, but a simple rename can render it pointless. You can also match a file fingerprint but again that is a chore in of itself as you have to constantly keep up on new versions to add more fingerprints, not to mention having to get fingerprints for older ...
new idea 01 May 2015
We could do with when distributing a package to user and no forced reboot is selected an option to at least notify the users once the package has been downloaded that the machine could do with a reboot to complete the upgrade at next earliest convinence. 
new idea 30 Apr 2015
i want to add all the feature of Host integrity policy on my SEPM console..
new idea 30 Apr 2015
i need to set up  email notification for host integrity policy..i found no option for that..there is a option for system notification not for email notification
updated idea 29 Apr 2015
We have SEP v12.x rolled out in a relatively large and extremely distributed enterprise environment with 400-500 subnets. Ideally, we would be able to report on unmanaged devices on the network, but the current process of creating an unmanaged detector (one by one) is extraordinarly cumbersome. The unmanaged detector feature is an excellent tool, but it's implementation in SEPM makes it ...
new idea 29 Apr 2015
It would be very useful if we could add a new Hardware Device to hardware devices list by issuing the both combination of Class ID and Device ID. This feature makes Hardware Device definition much more flexible. For example it would be so simple to block a USB Tethering mobile phone or USB connected Network Adapter by adding a new Hardware Device which is defined with ...
updated idea 28 Apr 2015
Currently in order to use sep with a different language you need to install a separate package corresponding to the specific language region In order to save space on the manager it would be beneficial if all languages could be integrated to a specific SEP platform.
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
AravindKM
293
1
Brɨan
1836
19
Mithun Sanghavi
1242
59
SMLatCST
383
1
jjesse
59
24

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.