Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Management Community Blog
Showing posts tagged with 7.x
Showing posts in English
Ludovic Ferre | 09 Oct 2012 | 1 comment

I was in Spain helping a customer migrate their 7.1 SP1 servers to 7.1 SP2 Rollup 4, and I encountered a strange issue that I am finding, today, on my test servers as well.

The issue, as the title indicates, relates to the Security Role Manager, and was found in one (the reporting server) for my customer. I still need to create a case and send it to our backline / engineering team, but wanted to reserve the primer to Connect.

Now, to be more precise here is how I found the issue on my server (it's slightly different from the customer server - but the root is the same):

  • Clone the Symantec Admin role
  • Open the Security Role Manager
  • Select the "Resources" view, here is what it looked like:

  • Click on the pen to limit the role view on the Resource tree:

...

Pascal KOTTE | 03 Oct 2012 | 4 comments

Did you already angry because not able to export or copy/paste (text) the content of a filter ? As we were able with NS6 crying

With a report, we still are not able to copy/paste directly into Excel no It is one our feature request to Symantec enlightened thanks to vote those:

Pascal KOTTE | 03 Oct 2012 | 96 comments

2012-10-03: From news on Anthony P. blog an available release MP1 for the SP2. Reviewed 2012-10-26. Re-Reviewed 2012-11-21.

Before upgrading, you must also check this article, can change in the time and obosolete this blog a little:

http://www.symantec.com/docs/TECH197966

IT Management Suite 7.1 SP2 MP1 Release Notes

here it is: http://www.symantec.com/docs/DOC6052

and the IT Management Suite 7.1 SP2 MP1.1 Release Notes

http://www.symantec.com/docs/DOC5955

Notice: You should install the MP1.1, that is...

stebro | 27 Sep 2012 | 0 comments

Since publishing the article on Zero-Day Vulnerability Protection with Privilege Management, there has been a lot of additional press around the September 2012 Microsoft Internet Explorer vulnerability that adds additional insights into this problem. The bottom line is that zero-day vulnerabilities, while not new, continue to be a big problem to organizations.

Time to respond to security threats is crucial and there is some concerning news around the disclosure of this latest Internet Explorer vulnerability. Reviewing the publicly disclosed timeline, we see the following key events:

ianatkin | 20 Sep 2012 | 0 comments

It's just been brought to my attention that Brian Madden yesterday posted this very interesting blog,

http://www.brianmadden.com/blogs/brianmadden/archive/2012/09/19/here-s-how-symantec-can-dominate-the-quot-new-quot-desktop-fingers-crossed-they-don-t-screw-it-up-again.aspx

Interesting to see how others on the outside see the Symantec's plays in desktop management space. 

stebro | 18 Sep 2012 | 0 comments

Have you used Internet Explorer to visit a malicious website recently? Have you used Internet Explorer to visit any website lately? How do you know for sure that you are not infected? Yesterday, a new zero-day vulnerability for Internet Explorer versions 6-9 was reported affecting everything from Windows XP to Windows 7 and Windows Servers. Zero-day vulnerabilities are a common fact of life, but the same old approaches to protection continue to be insufficient. Let’s discuss this vulnerability and how privilege management can mitigate the impact.

In the case of this zero-day vulnerability, a malicious website can be crafted then unsuspecting victims can visit it with Internet Explorer only to be exploited. Once exploited, security software can be disabled, files are downloaded or malicious software is installed so that system can be reused as a zombie or SPAM relay.

...

Darrell Elmore | 24 Aug 2012 | 0 comments

Problem

It seems that the Install Endpoint Protection task fails for some but not all computers.

Solution

  1. Go to the installation package located under D:\Program Files\Altiris\Notification Server\NSCap\bin\Win32\x86\Symantec Endpoint Protection\Install Package or D:\Program Files\Altiris\Notification Server\NSCap\bin\Win64\x64\Symantec Endpoint Protection\Install Package
  2. Open the InstallSEP_<Package Name>.vbs file
  3. Make the following changes

Change: WshShell.Run <Package Name>.exe, HIDE_WINDOW, WAIT_ON_RETURN

To:  sCurrPath = CreateObject("Scripting.FileSystemObject").GetAbsolutePathName(".")

WshShell.Run chr(34) + sCurrPath + "\<Package Name>.exe" + chr(34), HIDE_WINDOW, WAIT_ON_RETURN

In my case this seemed to have fixed my...

mmurphy7 | 21 Aug 2012 | 0 comments

With support for Windows XP ending in less than 2 years, companies are beginning to feel the pressure to complete their migrations to Windows 7 or 8. This is proving to be a bigger headache than most companies planned on as they begin to find more and more of their applications won’t natively run in Windows 7 or 8.

This leaves many companies in a bind. They either have to devote several IT personnel to test many third-party and internal applications used in their company to figure out what is compatible or they have to rely on research done by others and figure out a game plan for their migration. If a company could devote more than a handful of people to figure out their application migration, they would complete it a lot sooner, but that’s a little unrealistic as most organizations have fixed resource constraints.  There needs to be a method to automate application compatibility analysis.

With...

stebro | 21 Aug 2012 | 0 comments

One of the first challenges an organization faces when deciding to remove end-user administrator rights is determining what applications require such rights. Many times the approach is to remove administrator rights, see who complains and add those users back to the administrators group. Over time, large chunks of an organization still have administrator rights due to applications that are not compatible when run as a standard user. Let’s look at how this can be addressed.

There are four application types that typically require administrator rights:

  • System Utilities: Some of these utilities make sense to restrict from standard users including computer management, turning Windows features on or off, or allowing remote access. Others such as the Disk Defragmenter, changing the system time, or adding language packs may be appropriate
  • Installers: Most installers will not run by a standard user. There are some installer exceptions that will still...
mmurphy7 | 20 Aug 2012 | 0 comments

With 2012 almost at the midpoint, it is a good time to take a look at the state of security. Arellia research has analyzed Adobe Security Bulletins and how removal of administrator rights could mitigate their vulnerabilities. As mentioned in the Introduction on Privilege Exploitation, privilege exploitation is where the malicious software takes advantage of the rights of the logged in user to change the configuration of the local computer. Adobe is a common target and Arellia has found a high risk of operating with an administrator user when using many Adobe products.

Here is a summary of privilege exploitation for Adobe Products in 2012 to date:

  2012
 Bulletins 14
...