Video Screencast Help
Endpoint Management Community Blog
Showing posts in English
mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Adobe has released 16 Security Bulletins addressing 116 vulnerabilities. Of the 16 Adobe Security Bulletins released 81% had vulnerabilities that could be used to exploit the rights of the logged on user. However, if you don’t count the bulletins related to ColdFusion then 100% of the Security Bulletins had vulnerabilities that could be used to exploit user rights. Here’s a breakdown of the Adobe Security Bulletins:

Bulletins 16
Vulnerabilities 116
% of Bulletins with privilege exploits 81.25%
% of Vulnerabilities with privilege exploits 67.24%

Adobe classifies the bulletins as critical, important, moderate, and low. Similar to Microsoft, critical vulnerabilities can run attacker code and install software...

mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Mozilla has released 62 Security Bulletins addressing 88 vulnerabilities. Of the 62 Mozilla Security Bulletins released more than 1 out of every 2 bulletins had vulnerabilities that could be used to exploit the rights of the logged on user. All of the bulletins released affected Mozilla Firefox, which means that any user not keeping up to date with their Firefox browser is in imminent danger unless some privilege management software is in place. Here’s a breakdown of the Mozilla Security Bulletins:

Bulletins 62
Vulnerabilities 88
% of Bulletins with privilege exploits 55%
% of Vulnerabilities with privilege exploits 67%


mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Microsoft has released 51 Security Bulletins addressing 121 vulnerabilities. Here’s a breakdown of the bulletins and vulnerabilities. Of the 51 Microsoft Security Bulletins released nearly 1 out of every 3 bulletins had vulnerabilities that could be used to exploit the rights of the logged on user.

Bulletins 51
Vulnerabilities 121
% of Bulletins with privilege exploits 35%
% of Vulnerabilities with privilege exploits 34%

Microsoft classifies the bulletins as critical, important, moderate, and low. Vulnerabilities of critical bulletins mean vulnerabilities can be exploited without the user knowing. Vulnerabilities of important bulletins will provide end users some warnings that the exploit is happening, but these...

mmurphy7 | 09 Aug 2013 | 0 comments

One of the most dangerous threats to IT security is abuse of privileged access. Preventing the exploitation of administrator privileges first requires knowledge of who has administrator access whether local or domain based. This is not only good practice, but also driven by many security standards.

One such security compliance standard is the Payment Card Industry Data Security Standard (PCI DSS) which outlines many security requirements to protect consumers’ credit card data. Requirement 8.5.1 states: Control addition, deletion, and modification of user IDs, credentials, and other identifier objects, which clearly identifies the need to monitor and maintain control of the administrators group.

The Center for Internet Security (CIS) releases security configuration guidelines for each Operating System. For Windows 7 section 1.8 defines User Rights and who should have access to certain system capabilities. The key to the user rights defined by CIS is which...

michael cole | 31 Jul 2013 | 0 comments

I came across a stored procedure that is quite popular for troubleshooting SQL especially blocking, it's not new but deserves a repost. I tried it against sp_who and sp_who2. It seems that this SP gives a more instant snapshot in better detail. Probably it's best feature is a clickable link to the transact that is running. I could still see block chains better with sp_who2, as you could see the trail of SPID's better. There is a SQL query for finding the lead blocker at

For those that are interested in what the differences are between sp_who and sp_who2, the screen snip below shows the column differences, the hidden difference is that sp_who is documented and thus supported, otherwise they are very similar. SP_WhoIsActive complements them.


ohzone - CherylPeterson | 30 Jul 2013 | 0 comments

We love our Connect community members and once again we're celebrating SysAdmin day. Check out this blog to find out how we are sharing the love with you!

Happy International Sysadmin Day!

Tell us something crazy that's happened in your world and we might make it worth your time!

LeslieMiller | 02 Jul 2013 | 9 comments

Installing and managing mobile devices within your environment is one of our user's biggest challenges. To make contributing and finding information about this important topic easier, we are excited to introduce a new "Managing Mobility" community on Symantec Connect.

Beginning 12 July 2013, the following product forums will be migrated to the new "Managing Mobility" community:

  • Symantec Mobile Management Suite
  • Symantec App Center
  • Symantec Mobile Management
  • Symantec Mobile Security

In addition, in the new community you'll find thought leadership blogs and articles from Symantec employees and industry leaders.

stebro | 26 Jun 2013 | 0 comments

Properly securing privileged accounts is a basic security tenet and often a priority for servers. Unfortunately, the same level of concern is not present for desktops in many organizations. Yet desktops\laptops often contain as much sensitive information as servers and have done so for many years.

Most desktops\laptops have information that doesn’t make it to servers yet is extremely sensitive and valuable. Think about what is on the laptops of the CEO, the HR director, the software architect, or the CFO in any given organization. Much of this information on these systems can create serious risks if compromised as any data on an organizations file or database server. Endpoint security too often focuses solely on the threat of malware and hackers, but ignores the simple threat of insecure privileged user accounts.

For Windows systems, privileged accounts are any accounts that are in the Administrators group. Often there is at least one account that is used by an...

Santana_Villa | 13 Jun 2013 | 0 comments

ITMS 7.5 Release Preview Release Announcement 06/13/13

Announcement Details The IT Management Suite 7.5 Release Preview has been released to authorized Beta customers.

Highlights - UI Performance improvements – console up to 15 times faster! - Cloud-enabled Management - Expanded security options - Dynamic summary reporting for software delivery tasks and policies with one-click retry for any failed tasks - Legacy Agent Communication mode - Mac management improvements, including Mac imaging - SIM: improved upgrade interface - More flexible deployment options - Additional pre-boot capabilities - Addition of CMDB functions (custom resources, resource mapping) to all products - Simplified and enhanced IT Analytics reporting

Download Location and Documentation Log in with (or create) your SymBeta account:...

jon_sharp | 10 Jun 2013

Symantec Deployment Solutions is dependent on the use of pre-boot operating systems in the management of workstation and server systems. The pre-boot environment is delivered to target workstation and server systems via network PXE servers or through the use of physical devices and media. This process has the potential for exposure to possible malicious activity from a person who may have already breached network security, either physically or through a remote network connection, or from a malicious but authorized network user. This paper will address these types of secondary security exposures. ...

Click here to read the full KB.