Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
new idea 45 min ago
How to submit a specimen quarantine files easily  The following sample image as (SEP)  
updated blog entry 1 hour 40 min ago
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回は代表的なWebアプリケーション脆弱性であるクロスサイトリクエストフォージェリについて解説をしています。 ※なお、内容に関しましてはHASHコンサルティング株式会社の徳丸 浩様に監修いただいています。   +++++++++++++++++++++++++++++++++++++++++++++++   クロスサイトリクエストフォージェリ(CWE-352)   ■概要 Webは、サイトからサイトに遷移することが通常の動作であるため、悪意のあるサイトからの遷移に対して、利用者の意図に反する要求をアプリケーションが受け付けてしまう場合があります。その結果、利用者が知らないうちに掲示板等への投稿、物品購入、パスワー ...
updated discussion 2 hours 16 min ago
Bonjour, Lors de l'installation de l'agent Fusion Inventory au niveau des postes clients, actuellement l'antivirus Symantec le dètecte comme une menace virale, est-ce-quelqu'un poura m'aidée afin de rémidier à cet incident. Salutations. 
updated article 08 Sep 2014
Problem Statement: DLP 12.5 Endpoint Agent Stops Triggering Any Incidents after deploying HIPAA and HITECH (including PHI) policy. Agens triggers incidents when HIPAA and HITECH (including PHI) is disabled. Solution: Enable IE channel in agent configuration if not already enabled. Trigger any policy using Internet Explorer. Set logging level to FINEST on an agent using agent management ...
updated article 08 Sep 2014
Hi, Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, corporate espionage, etc., to sabotage of critical infrastructure. These attacks are specifically targeted and are often carried out using ...
updated blog entry 1 hour 40 min ago
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回は代表的なWebアプリケーション脆弱性であるクロスサイトリクエストフォージェリについて解説をしています。 ※なお、内容に関しましてはHASHコンサルティング株式会社の徳丸 浩様に監修いただいています。   +++++++++++++++++++++++++++++++++++++++++++++++   クロスサイトリクエストフォージェリ(CWE-352)   ■概要 Webは、サイトからサイトに遷移することが通常の動作であるため、悪意のあるサイトからの遷移に対して、利用者の意図に反する要求をアプリケーションが受け付けてしまう場合があります。その結果、利用者が知らないうちに掲示板等への投稿、物品購入、パスワー ...
updated blog entry 1 hour 59 min ago
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回は代表的なWebアプリケーション脆弱性であるディレクトリトラバーサルについて解説をしています。 ※なお、内容に関しましてはHASHコンサルティング株式会社の徳丸 浩様に監修いただいています。   +++++++++++++++++++++++++++++++++++++++++++++++ ディレクトリトラバーサル(CWE-22) の解説   ■概要 Webアプリケーションの中には、外部からファイル名を指定して、そのファイルに対する閲覧や書き込みをする実装になっているものがあります。この際、ファイル名を巧妙に細工して指定することにより、本来読み書きを許可していないファイルを指定されてしまう場合があります。このような攻撃 ...
new blog entry 14 hours 27 min ago
On September 15, 2014, Symantec issued a SONAR release via Live Update definitions, which erroneously detected some low prevalence files as malicious. The false positive was reported as a SONAR.SuspLaunch detection. Symantec discovered the issue and had a roll back release available to the field within forty five minutes.  But unfortunately some customers were affected by the issue.  ...
updated blog entry 19 hours 56 min ago
The latest news in the SSL and web browser industries is Google’s plans to deprecate SHA-1 in a unique way on upcoming releases of Chrome starting with version 39. Considerably different from Microsoft’s plans that were announced in November 2013, Google plans on placing visual marks or placing a block within the browser; all based on the version of the browser, date of use and certificate’s ...
updated blog entry 15 Sep 2014
Guest Blogger: John Monnett, V.P. & Partner, Secure128 Website Security Platinum Partner Shopping Cart Abandonment is a Staggering 70% In 2014 we’re living through an online revolution. When I started my university undergrad work in 1991, there was virtually no such thing as “e-commerce” as we know it today. In 2014, worldwide business-to-consumer ecommerce sales are estimated to reach ...
updated blog entry 15 Sep 2014
Dias depois da descoberta de que diversas celebridades tiveram suas contas no iCloud comprometidas, um grande botnet voltou sua atenção aos clientes da Apple e lançou uma campanha de phishing por e-mail. O objetivo é atrair as vítimas e fazer com que revelem seu ID da Apple e suas senhas. Symantec observou a ameaça Kelihos (também conhecido como Waledac) sendo utilizada em e-mails de spam, que ...
updated blog entry 15 Sep 2014
Está por toda a parte notícias sobre fotos privadas de celebridades, entre elas a atriz Jennifer Lawrence e Kate Upton, que foram postadas neste final de semana. Quanto à forma como foram obtidas, diversos relatórios têm sugerido que o cibercriminoso teve acesso às contas da Apple iCloud das celebridades. Com base no amplo interesse nesta história, alertamos aos usuários sobre fraudes em torno ...
updated blog entry 15 Sep 2014
Notícias sobre a epidemia do vírus Ebola no oeste da África estão sendo veiculadas na imprensa mundial e os cibercriminosos estão mais uma vez usando as manchetes mais recentes para atrair vítimas. A Symantec observou três operações de malware e uma campanha de phishing utilizando o vírus Ebola como tema para a engenharia social.  Malware e campanhas de phishing A primeira campanha é ...
updated blog entry 15 Sep 2014
  Na conferência para desenvolvedores Google I/O deste ano, a gigante de tecnologia compartilhou sua visão sobre um mundo conectado, onde relógios inteligentes, smartphones, carros, laptops, aparelhos de televisão e termostatos interagem diretamente uns com os outros. O ponto central desta visão era um dos principais temas da conferência, a ideia do Android em todos os lugares e em todos ...
updated download 30 Jun 2014
Symantec Data Loss Prevention 11.5: Administration NOTES: This course is 5 days long. TK-DLP-0115 Symantec Data Loss Prevention 11.5: Administration [5-Day ILT]   Click on links below to download course materials:
updated download 27 Jun 2014
*Update available* Hi, I wrote a little Powershell script to update existing SEP 12.1 Installation Packages with the latest definitions for all modules. Instructions: On the SEPM 12.1 share the following folder for “everyone – read” Export Packages without ticking the box “Create a single .EXE file for this package” Ensure that the following .ZIP files exist in the 32Bit and 64Bit package ...
updated download 26 Jun 2014
I made a little tool that will create a new LU policy using a CSV or text file as the input.  The tool can use an existing LU policy as a template.  This will allow you to easily add new Explicit GUP settings or new Multiple GUP settings to an existing LU policy. Here are the steps to use the tool: Download and run tool below. Create a text file (see below for details). (optional) ...
updated download 09 Jun 2014
Hello guys, If you are noticing some problem with disk space after configuring GUP Monitor Tool, take a look below: "C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\apache\logs" = It should be your problem, right? In that folder, SEPM just save errors, by default! If you have configured GUP Monitor Tool, like me, you need to know that you have enabled the access.log as ...
updated event 15 Sep 2014
Presented by: Kevin Haley, Director, Product Management, Response Jeff Barto, Trust  Advocate Webcast Summary: Vendors are priming a great future when the Internet of Things (IoT) becomes a reality.  The reality is that the Internet of Things is here today. IoT has been with us in various incarnations over the last ten years or so. To protect yourself, ...
updated event 08 Sep 2014
Please join us for the next San Francisco Data Loss Prevention User Group meeting on September 9th at the Symantec Office from 11 a.m. to 3 p.m. Lunch will be served!   Agenda: 11 AM – Introduction & User Group Mission, name the directors and advisory board leaders 11:30 AM to 12:30 PM – Lunch, Meet & Greet 12:30 PM 1:00 PM – Symantec DLP Roadmap - Cloud by Mike Lindsay, Symantec 1:00 PM ...
new event 04 Sep 2014
Join us on Monday, September 15th to learn about the next cutting egde step in managing access!         Register through the link below:                  http://hubs.ly/y04kt-0     Can't make the webinar, but want to learn more?  Check out the link to our data sheet below.  If you have any questions or ...
new event 03 Sep 2014
The explosion of data since 2008 has produced a new challenge for IT personnel who understand the value of data and the importance of empowering the team with the right information about that data in order to determine how to govern it. Let us bring “insight” as to who is really the owner of critical data in your organization. ITS would like to work with you to understand Symantec's Data ...
new event 26 Aug 2014
Calling all United States DoD Security Experts and Enthusiasts to Compete with DoD Peers from Around the Globe The Symantec Cyber Readiness Challenge is an immersive, interactive "capture the flag" competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants ...
updated event 12 Aug 2014
Presented by: Matt Nelson Attorney and Legal Technology Expert, Information Governance Webcast Summary: Today’s era of technology and data growth presents new and unique challenges for businesses and corporate legal departments in particular. Some speculate that establishing a good “information governance” plan is the only way to address these challenges, yet the term “information ...
new event 12 Aug 2014
Presented by: Eric Schwake, Product Marketing Manager Webcast Summary: Increasingly complex, advanced threats are more prevalent than ever and even with the myriad of security tools available, the news is still filled with information about organizations getting breached. A better approach is needed. Register for this webcast and learn how to ensure your organization has the strongest ...
updated event 08 Aug 2014
The cyber security event provides rich content around cyber security. Guest speakers will address the legal, best practise, and industry issues for cyber security. It will demystify the obvious confusion of Information Security versus Cyber Security, and will explain why for instance Lloyds have moved cyber risk from 13th to 3rd place in its risk register. It will explain the new EU cyber laws ...
event comment 21 Jul 2014
new event 17 Jul 2014
Organizations are spending more on security and believe they’re adequately protected, yet data breaches continue to impact consumers, businesses and governments – the number of breaches jumped 62 percent in 2013. Overworked and understaffed, security teams are stitching together good enough security point products that weren’t designed to work together. Not only does this make organizations ...
updated video 18 Aug 2014
How-to demonstration of the installation process for LUA (Live Update Administrator)
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
updated video 11 Jun 2014
Symantec Endpoint Protection updates, virus definitions, and software updates for the Agent and other services are downloaded from the Internet to each computer on your network. These updates may consume more Internet bandwidth than some organizations are comfortable using. The Local Update Service helps to minimize Internet bandwidth consumption. Symantec recommends that our customers take ...
new idea 45 min ago
How to submit a specimen quarantine files easily  The following sample image as (SEP)  
updated idea 2 hours 6 min ago
Hi,   All the necessary certificates to be part of the installation for SEP 121.RU4 MP1a and MP1b. As installation is getting failing on Win2k3 Sp2 standard, Windows Vista SP2 and Win2K8 Sp2 standard operating systems. If the Symantec suggested certificates are part of the installation ,automatically support calls/Service requests  will get reduce in installation front. So much ...
new idea 2 hours 7 min ago
It will be great that the exclusion policy was a sum of exclusion lists. Today, I must have as many lists as configuration. But, for instance, I would like to create those exclusion lists: - Standard Microsoft exclusion - Standard IIS exclusion - Standard Apache Exclusion - Standard MySQL exclusion - Standard SQL Server exclusion etc ... On each group, I will apply a set of ...
new idea 23 hours 36 min ago
whenever SP link is down & SMG brightmail is not receiving emails from internet, it should alert system admin. Whenever ISP link is down it should alert system admin when it is not allowing emails to relay to internet. There will be alert for number of emails in message queue in addition to queue size which option is already available.
new idea 16 Sep 2014
In windows 8.1 OS external/ internal  portable Hard disk is getting detected has SCSI disk , os we are unable to block the devices using ADC policy for USBSTOR*. in other OS ADC policy is workfine with USBSTOR* like (Windows 7 & Windows XP)   Request you to give me solution to make work in  Windows 8.1 OS.   Please refer the Attachement ...
new idea 15 Sep 2014
It would be great if an end user could mark a message as spam/not spam in their personal quarantine the same way an administrator can. Thanks! Matt
updated idea 15 Sep 2014
Scenario: Win7, x64, SEP 12.1 unmanaged client, LiveUpdate frequency set to 4 hours. The system is used only for releatively short periods throughout the day, e.g. 1-2 hours and then shut down into standby or hybernation. The next day the system does not poll the latest AV Definitions if it is not run for at least 4 hours continuously, what rarely happens. As a result AV Definitions ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
.Brian
1321
16
AravindKM
293
1
Mithun Sanghavi
1223
59
P_K_
1131
28
jjesse
51
23

A Message From Your Community Manager: Swathi Turlapaty

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.