Video Screencast Help
Endpoint Management Community Blog
Showing posts in English
ohzone - CherylPeterson | 15 Aug 2013 | 0 comments

Never attended a Symantec Vision conference?  We want to know why.  For the first 20 people (10 in the US and 10 in Europe) who sign up and participate in a 30-minute interview before August 22nd, we’ll award you 200 Connect points AND send you a custom Vision Hoodie.  To set-up a time, please click here or email your contact information to vision@symantec.com.

Marcello D'Angelone | 12 Aug 2013 | 0 comments
According to ssd-vs-hdd-report, Windows does not allow a reliable way to collect information about a SSD disks.
However we can identify the SSDs from the Inv_HW_Logical_Device data class.
  
You can copy the following query to create your own report:
 
SELECT
v.[Name] AS [Computer Name],
cs.[Model] AS [Computer Model],
hwl.Model,
ld.[Device ID] as Drive,
CAST((ISNULL(ld.[Size (Bytes)], 0)/(1024 * 1024 * 1024)) AS DECIMAL (10, 2)) AS 'Total Disk Space (GB)',
CAST((ISNULL(ld.[Free Space (Bytes)], 0)/(1024 * 1024 * 1024)) AS DECIMAL (10, 2)) AS 'Free Disk Space (GB)'

FROM vComputer v
INNER JOIN Inv_HW_Logical_Device hwl
ON v.Guid = hwl._ResourceGuid
INNER JOIN vHWComputerSystem...

mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Apple has released 2 Security Updates for their Windows versions of Quicktime and iTunes addressing 52 vulnerabilities. Both of the Apple Security Bulletins released had vulnerabilities that could be used to exploit the rights of the logged on user. Here’s a breakdown of the updates released:

Bulletins 2
Vulnerabilities 52
% of Vulnerabilities with privilege exploits 48%

Apple, unlike Microsoft and other software vendors Arellia has looked at, does not classify their Security Updates. Instead they lump many vulnerabilities into a single security update. Here’s a breakdown of the two security updates and the vulnerabilities with Privilege Exploits:

Security Update Vulnerabilities with Privilege Exploits Total Vulnerabilities
...
mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Adobe has released 16 Security Bulletins addressing 116 vulnerabilities. Of the 16 Adobe Security Bulletins released 81% had vulnerabilities that could be used to exploit the rights of the logged on user. However, if you don’t count the bulletins related to ColdFusion then 100% of the Security Bulletins had vulnerabilities that could be used to exploit user rights. Here’s a breakdown of the Adobe Security Bulletins:

Bulletins 16
Vulnerabilities 116
% of Bulletins with privilege exploits 81.25%
% of Vulnerabilities with privilege exploits 67.24%

Adobe classifies the bulletins as critical, important, moderate, and low. Similar to Microsoft, critical vulnerabilities can run attacker code and install software...

mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Mozilla has released 62 Security Bulletins addressing 88 vulnerabilities. Of the 62 Mozilla Security Bulletins released more than 1 out of every 2 bulletins had vulnerabilities that could be used to exploit the rights of the logged on user. All of the bulletins released affected Mozilla Firefox, which means that any user not keeping up to date with their Firefox browser is in imminent danger unless some privilege management software is in place. Here’s a breakdown of the Mozilla Security Bulletins:

Bulletins 62
Vulnerabilities 88
% of Bulletins with privilege exploits 55%
% of Vulnerabilities with privilege exploits 67%

Mozilla...

mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Microsoft has released 51 Security Bulletins addressing 121 vulnerabilities. Here’s a breakdown of the bulletins and vulnerabilities. Of the 51 Microsoft Security Bulletins released nearly 1 out of every 3 bulletins had vulnerabilities that could be used to exploit the rights of the logged on user.

Bulletins 51
Vulnerabilities 121
% of Bulletins with privilege exploits 35%
% of Vulnerabilities with privilege exploits 34%

Microsoft classifies the bulletins as critical, important, moderate, and low. Vulnerabilities of critical bulletins mean vulnerabilities can be exploited without the user knowing. Vulnerabilities of important bulletins will provide end users some warnings that the exploit is happening, but these...

mmurphy7 | 09 Aug 2013 | 0 comments

One of the most dangerous threats to IT security is abuse of privileged access. Preventing the exploitation of administrator privileges first requires knowledge of who has administrator access whether local or domain based. This is not only good practice, but also driven by many security standards.

One such security compliance standard is the Payment Card Industry Data Security Standard (PCI DSS) which outlines many security requirements to protect consumers’ credit card data. Requirement 8.5.1 states: Control addition, deletion, and modification of user IDs, credentials, and other identifier objects, which clearly identifies the need to monitor and maintain control of the administrators group.

The Center for Internet Security (CIS) releases security configuration guidelines for each Operating System. For Windows 7 section 1.8 defines User Rights and who should have access to certain system capabilities. The key to the user rights defined by CIS is which...

michael cole | 31 Jul 2013 | 0 comments

I came across a stored procedure that is quite popular for troubleshooting SQL especially blocking, it's not new but deserves a repost. I tried it against sp_who and sp_who2. It seems that this SP gives a more instant snapshot in better detail. Probably it's best feature is a clickable link to the transact that is running. I could still see block chains better with sp_who2, as you could see the trail of SPID's better. There is a SQL query for finding the lead blocker at http://sqlserverplanet.com/troubleshooting/blocking-processes-lead-blocker

For those that are interested in what the differences are between sp_who and sp_who2, the screen snip below shows the column differences, the hidden difference is that sp_who is documented and thus supported, otherwise they are very similar. SP_WhoIsActive complements them.

Disclaimer

...
ohzone - CherylPeterson | 30 Jul 2013 | 0 comments

We love our Connect community members and once again we're celebrating SysAdmin day. Check out this blog to find out how we are sharing the love with you!

Happy International Sysadmin Day!

Tell us something crazy that's happened in your world and we might make it worth your time!

LeslieMiller | 02 Jul 2013 | 9 comments

Installing and managing mobile devices within your environment is one of our user's biggest challenges. To make contributing and finding information about this important topic easier, we are excited to introduce a new "Managing Mobility" community on Symantec Connect.

Beginning 12 July 2013, the following product forums will be migrated to the new "Managing Mobility" community:

  • Symantec Mobile Management Suite
  • Symantec App Center
  • Symantec Mobile Management
  • Symantec Mobile Security

In addition, in the new community you'll find thought leadership blogs and articles from Symantec employees and industry leaders.