Video Screencast Help

Endpoint Management Community Blog

Showing posts tagged with 7.x
Showing posts in English
tgrandpre | 12 Oct 2012 | 0 comments

As a current Endpoint Management customer, you are likely already entitled to upgrade to the latest version as part of your maintenance. Since the 6.x release, Symantec has released a number of very powerful enhancements and improvements that will likely benefit your organization. 

In this *recorded webcast, you'll learn about the latest features of Symantec Endpoint Management, as well as understand how to locate the resources and assistance for a successful migration from previous versions. There are numerous tools and tips to help you make the upgrade easy.

This webcast includes technical details that are sure to help you plan your move and reap the benefits of Symantec’s Endpoint Management solutions.

View Webcast HERE

*Live...

stebro | 11 Oct 2012 | 0 comments

The Ponemon Institute’s 2012 Cost of Cyber Crime Study sponsored by HP has just been released with some very interesting data. The increasing costs found in this study would argue for additional protections beyond what most organizations are using.

Here are some summary points from the study:

  • 6% increase of costs over 2011
  • 42% increase in the number of cyberattacks with organizations experiencing an average of 102 successful attacks per week
  • Information theft accounts for 44 percent of external costs up 4 percent from 2011
  • 78% of costs come from malicious code, denial of service, stolen or hijacked devices, and malicious insiders
  • Disruption to business or lost productivity accounted for 30 percent of external costs
  • Average time to resolve a cyberattack is 24 days with the average cost incurred at $591,780
  • Recovery and...
hugo_parra | 09 Oct 2012 | 3 comments

Continuing our commitment to help you, our users, get the most value out of the Endpoint Management solutions, the product team is sponsoring twelve groups on Connect. In these groups, you will find the best how to videos, articles, and product extensions available. By participating in one or more of these groups (depending on your needs and interests) you will gain access to best practices and content that has been reviewed by our subject matter experts. You will also find access to insightful advice from other users and a trusted conduit for submitting ideas for new content and improvements to our product team.

All these groups are live now! We encourage you to join these sponsored groups and start collaborating with our product team to make our solutions as valuable to you as they can be.

For more information on what a sponsored group is and for instructions on how to join and contribute, see the following article:
...

Ludovic Ferre | 09 Oct 2012 | 1 comment

I was in Spain helping a customer migrate their 7.1 SP1 servers to 7.1 SP2 Rollup 4, and I encountered a strange issue that I am finding, today, on my test servers as well.

The issue, as the title indicates, relates to the Security Role Manager, and was found in one (the reporting server) for my customer. I still need to create a case and send it to our backline / engineering team, but wanted to reserve the primer to Connect.

Now, to be more precise here is how I found the issue on my server (it's slightly different from the customer server - but the root is the same):

  • Clone the Symantec Admin role
  • Open the Security Role Manager
  • Select the "Resources" view, here is what it looked like:

 

  • Click on the pen to limit the role view on the Resource tree:

 

...

Pascal KOTTE | 03 Oct 2012 | 4 comments

Did you already angry because not able to export or copy/paste (text) the content of a filter ? As we were able with NS6 crying

With a report, we still are not able to copy/paste directly into Excel no It is one our feature request to Symantec enlightened thanks to vote those:

Pascal KOTTE | 03 Oct 2012 | 96 comments

2012-10-03: From news on Anthony P. blog an available release MP1 for the SP2. Reviewed 2012-10-26. Re-Reviewed 2012-11-21.

Before upgrading, you must also check this article, can change in the time and obosolete this blog a little:

http://www.symantec.com/docs/TECH197966

IT Management Suite 7.1 SP2 MP1 Release Notes

here it is: http://www.symantec.com/docs/DOC6052

and the IT Management Suite 7.1 SP2 MP1.1 Release Notes

http://www.symantec.com/docs/DOC5955

Notice: You should install the MP1.1, that is...

stebro | 27 Sep 2012 | 0 comments

Since publishing the article on Zero-Day Vulnerability Protection with Privilege Management, there has been a lot of additional press around the September 2012 Microsoft Internet Explorer vulnerability that adds additional insights into this problem. The bottom line is that zero-day vulnerabilities, while not new, continue to be a big problem to organizations.

Time to respond to security threats is crucial and there is some concerning news around the disclosure of this latest Internet Explorer vulnerability. Reviewing the publicly disclosed timeline, we see the following key events:

ianatkin | 20 Sep 2012 | 0 comments

It's just been brought to my attention that Brian Madden yesterday posted this very interesting blog,

http://www.brianmadden.com/blogs/brianmadden/archive/2012/09/19/here-s-how-symantec-can-dominate-the-quot-new-quot-desktop-fingers-crossed-they-don-t-screw-it-up-again.aspx

Interesting to see how others on the outside see the Symantec's plays in desktop management space. 

stebro | 18 Sep 2012 | 0 comments

Have you used Internet Explorer to visit a malicious website recently? Have you used Internet Explorer to visit any website lately? How do you know for sure that you are not infected? Yesterday, a new zero-day vulnerability for Internet Explorer versions 6-9 was reported affecting everything from Windows XP to Windows 7 and Windows Servers. Zero-day vulnerabilities are a common fact of life, but the same old approaches to protection continue to be insufficient. Let’s discuss this vulnerability and how privilege management can mitigate the impact.

In the case of this zero-day vulnerability, a malicious website can be crafted then unsuspecting victims can visit it with Internet Explorer only to be exploited. Once exploited, security software can be disabled, files are downloaded or malicious software is installed so that system can be reused as a zombie or SPAM relay.

...

jasonfo | 18 Sep 2012 | 0 comments

If you have ever needed to create a report but dont know what table you are looking for this might help you out. In my case I had to find something that had the "Publisher".

 To look for columns in view...

USE
Symantec_CMDB
SELECT
V.name AS View_name,
SCHEMA_NAME(schema_id) AS schema_name,
c.name AS column_name
FROM sys.views AS v
INNER JOIN sys.columns c ON v.OBJECT_ID = c.OBJECT_ID
WHERE c.name LIKE '%Publisher%'
ORDER BY schema_name, View_name;

To look for columns in tables...

USE
Symantec_CMDB
SELECT t.name AS table_name,
SCHEMA_NAME(schema_id) AS schema_name,
c.name AS column_name
FROM sys.tables AS t
INNER JOIN sys.columns c ON t.OBJECT_ID...