Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Management Community Blog
Showing posts tagged with IT Management Suite
Showing posts in English
Michael Grueber | 11 Jan 2013 | 0 comments

A common issue that administrators face when managing the software update process involves situations in which:

  • An application was originally installed with customized settings;
  • The vendor releases an update to the application in the form of an installation that installs a completely new version of the application rather than just incrementally updating just those files that are affected by a security vulnerability or bug

In such cases, the update packages created by application vendors often are not sophisticated enough to preserve the customizations that were made when the application was originally installed.

For example, an adminstrator may roll out Adobe Reader 9.4.0 using the .MSI provided by the vendor together with an .MST transform file that customizes the application's settings (e.g. turning off the auto-update feature).  If the administrator later uses the Patch Management...

Michael Grueber | 11 Dec 2012 | 6 comments

It is essential to understand how the reports in the Patch Management Solution calculate compliance.  For example, the Compliance by Computer report calculates compliance based on all bulletins applicable to that computer. 

If you download the applicability/detection rules for a particular bulletin and the Patch Management Solution finds that an update associated with that bulletin is applicable to a particular computer but not installed on that computer, that computer is considered to not be in compliance with respect to that bulletin.  This is true even if you have not created any policies to distribute the updates associated with the bulletin to that computer.

While the Patch Management Solution reports provide you with an "absolute" measure of compliance, there may be occasions in which you want to see another view of compliance.  For example, you may want to see the compliance status of a particular computer with...

Michael Grueber | 03 Dec 2012 | 0 comments

For a recording of an excellent webcast on "Effective Patch Management for Clients and Servers", please see:  https://www.brighttalk.com/webcast/5691/60201

The presentation was given by Joseph Carson and Santana Villa from Symantec.  Joseph is a Senior Manager of Product Management.  Santana is a Regional Product Manager.

The webcast covers the following topics:

  • Challenges, Potential threats and risks
  • Symantec's approach to patching
  • The Symantec advantage
  • Coming soon from Symantec
Michael Grueber | 03 Dec 2012 | 0 comments

For a recorded webcast on "3rd Party Patching:  Why's it's important and how do you tackle it?, please see:  https://www4.symantec.com/Vrt/offer?a_id=147028

The presentation was given by Travis Grandpre, Senior Marketing Manager at Symantec, and myself.

stebro | 12 Nov 2012 | 0 comments

One of the challenges related to critical applications on Windows desktops is end user’s or malware’s ability to kill critical services and processes. Critical applications in an enterprise desktop can include antivirus and endpoint security products as well as systems management tools for software delivery, patching, and\or inventory. Protection of the services and processes related to these applications is key to ongoing operational security and availability.

Critical Windows applications typically run as a service that often can be stopped by a user running with administrator credentials. Any user who runs as a standard user is limited from stopping services, but as most users in enterprises run with administrator accounts they can stop those services and often do. Reasons for stopping critical services vary, but the most common reasons include complaints about performance impact of such applications or not wanting to be controlled by corporate IT. Whatever...

ohzone - CherylPeterson | 06 Nov 2012 | 0 comments

Twitter users @SymantecEMM has changed it name to @SymcEndptMgt ! Follow us for news and information from the Endpoint Management team!

You'll be glad you did!

Kavitha Gowda | 25 Oct 2012 | 0 comments

Symantec Endpoint Protection Pack 12.1.2 for IT Analytics 7.1 SP2 User Guide is now live at the following location:

http://www.symantec.com/docs/DOC5638

tgrandpre | 12 Oct 2012 | 0 comments

As a current Endpoint Management customer, you are likely already entitled to upgrade to the latest version as part of your maintenance. Since the 6.x release, Symantec has released a number of very powerful enhancements and improvements that will likely benefit your organization. 

In this *recorded webcast, you'll learn about the latest features of Symantec Endpoint Management, as well as understand how to locate the resources and assistance for a successful migration from previous versions. There are numerous tools and tips to help you make the upgrade easy.

This webcast includes technical details that are sure to help you plan your move and reap the benefits of Symantec’s Endpoint Management solutions.

View Webcast HERE

*Live...

Ludovic Ferre | 12 Oct 2012 | 2 comments

A customer of mine reported a problem editing Security Accounts and associating credentials with account, or account to roles.

I had a look at the customer SMP logs and found that it was full of SqlExceptions.

We had a remote session on this today and found that the problem comes from SQL right for the account, which are not sysadmin on the SQL Server and could not read data in sys.syslockinfo, and this caused any call to spResourceAssociationsLoadData to fail.

Granting read on the sys.syslockinfo resolves the issue.

With that said, good week-end Connect!

stebro | 11 Oct 2012 | 0 comments

The Ponemon Institute’s 2012 Cost of Cyber Crime Study sponsored by HP has just been released with some very interesting data. The increasing costs found in this study would argue for additional protections beyond what most organizations are using.

Here are some summary points from the study:

  • 6% increase of costs over 2011
  • 42% increase in the number of cyberattacks with organizations experiencing an average of 102 successful attacks per week
  • Information theft accounts for 44 percent of external costs up 4 percent from 2011
  • 78% of costs come from malicious code, denial of service, stolen or hijacked devices, and malicious insiders
  • Disruption to business or lost productivity accounted for 30 percent of external costs
  • Average time to resolve a cyberattack is 24 days with the average cost incurred at $591,780
  • Recovery and...