Video Screencast Help

Endpoint Management Community Blog

Showing posts tagged with 7.x
Showing posts in English
stebro | 11 Oct 2012 | 0 comments

The Ponemon Institute’s 2012 Cost of Cyber Crime Study sponsored by HP has just been released with some very interesting data. The increasing costs found in this study would argue for additional protections beyond what most organizations are using.

Here are some summary points from the study:

  • 6% increase of costs over 2011
  • 42% increase in the number of cyberattacks with organizations experiencing an average of 102 successful attacks per week
  • Information theft accounts for 44 percent of external costs up 4 percent from 2011
  • 78% of costs come from malicious code, denial of service, stolen or hijacked devices, and malicious insiders
  • Disruption to business or lost productivity accounted for 30 percent of external costs
  • Average time to resolve a cyberattack is 24 days with the average cost incurred at $591,780
  • Recovery and...
hugo_parra | 09 Oct 2012 | 3 comments

Continuing our commitment to help you, our users, get the most value out of the Endpoint Management solutions, the product team is sponsoring twelve groups on Connect. In these groups, you will find the best how to videos, articles, and product extensions available. By participating in one or more of these groups (depending on your needs and interests) you will gain access to best practices and content that has been reviewed by our subject matter experts. You will also find access to insightful advice from other users and a trusted conduit for submitting ideas for new content and improvements to our product team.

All these groups are live now! We encourage you to join these sponsored groups and start collaborating with our product team to make our solutions as valuable to you as they can be.

For more information on what a sponsored group is and for instructions on how to join and contribute, see the following article:
...

Ludovic Ferre | 09 Oct 2012 | 1 comment

I was in Spain helping a customer migrate their 7.1 SP1 servers to 7.1 SP2 Rollup 4, and I encountered a strange issue that I am finding, today, on my test servers as well.

The issue, as the title indicates, relates to the Security Role Manager, and was found in one (the reporting server) for my customer. I still need to create a case and send it to our backline / engineering team, but wanted to reserve the primer to Connect.

Now, to be more precise here is how I found the issue on my server (it's slightly different from the customer server - but the root is the same):

  • Clone the Symantec Admin role
  • Open the Security Role Manager
  • Select the "Resources" view, here is what it looked like:

 

  • Click on the pen to limit the role view on the Resource tree:

 

...

Pascal KOTTE | 03 Oct 2012 | 4 comments

Did you already angry because not able to export or copy/paste (text) the content of a filter ? As we were able with NS6 crying

With a report, we still are not able to copy/paste directly into Excel no It is one our feature request to Symantec enlightened thanks to vote those:

Pascal KOTTE | 03 Oct 2012 | 96 comments

2012-10-03: From news on Anthony P. blog an available release MP1 for the SP2. Reviewed 2012-10-26. Re-Reviewed 2012-11-21.

Before upgrading, you must also check this article, can change in the time and obosolete this blog a little:

http://www.symantec.com/docs/TECH197966

IT Management Suite 7.1 SP2 MP1 Release Notes

here it is: http://www.symantec.com/docs/DOC6052

and the IT Management Suite 7.1 SP2 MP1.1 Release Notes

http://www.symantec.com/docs/DOC5955

Notice: You should install the MP1.1, that is...

stebro | 27 Sep 2012 | 0 comments

Since publishing the article on Zero-Day Vulnerability Protection with Privilege Management, there has been a lot of additional press around the September 2012 Microsoft Internet Explorer vulnerability that adds additional insights into this problem. The bottom line is that zero-day vulnerabilities, while not new, continue to be a big problem to organizations.

Time to respond to security threats is crucial and there is some concerning news around the disclosure of this latest Internet Explorer vulnerability. Reviewing the publicly disclosed timeline, we see the following key events:

ianatkin | 20 Sep 2012 | 0 comments

It's just been brought to my attention that Brian Madden yesterday posted this very interesting blog,

http://www.brianmadden.com/blogs/brianmadden/archive/2012/09/19/here-s-how-symantec-can-dominate-the-quot-new-quot-desktop-fingers-crossed-they-don-t-screw-it-up-again.aspx

Interesting to see how others on the outside see the Symantec's plays in desktop management space. 

stebro | 18 Sep 2012 | 0 comments

Have you used Internet Explorer to visit a malicious website recently? Have you used Internet Explorer to visit any website lately? How do you know for sure that you are not infected? Yesterday, a new zero-day vulnerability for Internet Explorer versions 6-9 was reported affecting everything from Windows XP to Windows 7 and Windows Servers. Zero-day vulnerabilities are a common fact of life, but the same old approaches to protection continue to be insufficient. Let’s discuss this vulnerability and how privilege management can mitigate the impact.

In the case of this zero-day vulnerability, a malicious website can be crafted then unsuspecting victims can visit it with Internet Explorer only to be exploited. Once exploited, security software can be disabled, files are downloaded or malicious software is installed so that system can be reused as a zombie or SPAM relay.

...

Darrell Elmore | 24 Aug 2012 | 0 comments

Problem

It seems that the Install Endpoint Protection task fails for some but not all computers.

Solution

  1. Go to the installation package located under D:\Program Files\Altiris\Notification Server\NSCap\bin\Win32\x86\Symantec Endpoint Protection\Install Package or D:\Program Files\Altiris\Notification Server\NSCap\bin\Win64\x64\Symantec Endpoint Protection\Install Package
  2. Open the InstallSEP_<Package Name>.vbs file
  3. Make the following changes

Change: WshShell.Run <Package Name>.exe, HIDE_WINDOW, WAIT_ON_RETURN

To:  sCurrPath = CreateObject("Scripting.FileSystemObject").GetAbsolutePathName(".")

WshShell.Run chr(34) + sCurrPath + "\<Package Name>.exe" + chr(34), HIDE_WINDOW, WAIT_ON_RETURN

In my case this seemed to have fixed my...

mmurphy7 | 21 Aug 2012 | 0 comments

With support for Windows XP ending in less than 2 years, companies are beginning to feel the pressure to complete their migrations to Windows 7 or 8. This is proving to be a bigger headache than most companies planned on as they begin to find more and more of their applications won’t natively run in Windows 7 or 8.

This leaves many companies in a bind. They either have to devote several IT personnel to test many third-party and internal applications used in their company to figure out what is compatible or they have to rely on research done by others and figure out a game plan for their migration. If a company could devote more than a handful of people to figure out their application migration, they would complete it a lot sooner, but that’s a little unrealistic as most organizations have fixed resource constraints.  There needs to be a method to automate application compatibility analysis.

With...