Video Screencast Help
Security Community Blog
Showing posts tagged with Endpoint Protection (AntiVirus)
Showing posts in English
binayak | 19 Aug 2009 | 0 comments

If you need to install Active Directory or any Windows Components using Add/Remove Windows Components feature such as IIS in Windows Server 2003, there are certain files that need to be copied from the Windows Server Setup Disk and these files are stored inside the i386 folder. So everytime you install Windows Components you have to carry the Windows Installation Disk with you and define the path of that folder.

Here is the solution:

1.  Copy the i386 folder in the System Driver (generally C: drive).

2.  Open Registy Editor.

3.  After you open the Registry Editor, navigate to :

 
HKEY_Local_Machine\SYSTEM\ CurrentControlSet\Services\HealthService\Parameters\ConnectorManager

4. Doubleclick the EnableADIntegration key. Change the Value to 1 and click OK.

Now you don't have to define the path everytime,...

jeffwichman | 17 Aug 2009 | 0 comments
 
 
Good day everyone,
My name is Jeff Wichman, from the "Symantec Twin Cities Security & Compliance User Group." If you are responsible for your organization’s Information Assurance, use Symantec for some part of your security program, and in the Minneapolis/St Paul area I highly suggest you join us at one of our quarterly meetings. No I do not work for Symantec, I am just happy with what I have experienced with the SEP product. I am going to leave the name of my employer out of this article simply because these are my opinions and not necessarily those of my employer. We are a currently running close to 10,000 clients with SEP (11.0.4202.75). Approximately half of our clients are remote users connecting to various WiFi hotspots, untrusted third party networks, and occasionally in one of our main remote offices. The other half consists mainly of windows based servers and 4,000 internal...
riva11 | 15 Aug 2009 | 1 comment

There are several discussions about phishing and socially engineered malware attacks, I found an article that help to understand how browsers are ready to detect these attacks.
Take a look on the report published on NSS Labs "Q3 2099 Phishing Test Report", This report examines the ability to protect users across the following browsers  :

  • Apple Safari v4
  • Google Chrome 2
  • Microsoft Internet Explorer v8
  • Mozilla Firefox v3
  • Opera 10 Beta

Extract from NSS Labs Blog :
Socially engineered malware is the most common and impactful threat on the Internet today, with browser protection averaging between 1% and 81%. Internet Explorer 8 caught 81% of the socially engineered...

PaulNorthgate | 13 Aug 2009 | 19 comments

Hi Everyone,

First let me tell you a bit about me and my company, (well I wish it was my company, unfortunately I am but a humble employee who loves their job), I work for a large IT company in N.Ireland and we supply IT services (Hardware, software, support, security you name it, we do it) to every School in N.Ireland as well as some schools in England. My role is as a Solutions Development and Implementation specialist. (Sounds fancy, but i'm really only learning!)

Anyway more about Symantec's role in our organisation. As you can imagine securing a managed network which supports one of the largest ADs in Europe is no mean feat in itself, however what happens when unruly pupils (Sorry about my generalisation! i myself was once an unruly pupil and somewhat expect every school going teenager to be just like me, which i'm sure isn't the case) bring Linux, MAC and Windows based notebooks and netbooks to school, fully loaded with malware, filesharing tools, 1337...

J.Porter | 12 Aug 2009 | 2 comments

When I signed on to work in my current position as infosec specialist, I was required to attend the Symantec Endpoint Protection 11.0 MR4: Administration course. Little did I know how hard it would be to actually register and attend a course in my area. The course was cancelled 3 times due to lack of enrollment 3 times, before I finally attended. I began working with SEP11 MR2, and finally got into the MR4 course with 1 year of experience under my belt. The instructor stated "Wow, you've been working on the product for a year so you can probably teach the class"! 

The course was a good course, but the instructor was right. I didn't learn a significant amount of new information. My sole job is to manage Symantec Endpoint Protection Management servers, so naturally I learned a thing or two over the last year. On the otherhand, this class is great for those who are new to...

LeslieMiller | 12 Aug 2009 | 13 comments

Announcing the winners of the latest Tell Your Story Contest for the Backup and Security communities.

But first, tap your fingers on your desk to get the full effect of a drum roll. . . . . . . . . . . . .

The award for the Tell Your Backup Story Contest goes to:

glandge for the entry: BackupExec: The Best for Microsoft Exchange

The award for the Tell Your Security Story Contest goes to:

Jeanne for the entry: My Security Story

Join us as we give our heartiest congratulations for these two winners. Each of them will receive 25,000 rewards points added to their accounts.

Watch next week for the announcement of the contest runners up and an exciting announcement of the next round of how you can win...

Bekir | 11 Aug 2009 | 5 comments

Hello all,

I’m a security consultant in my company which is focused on all aspects of IT security but I’m only Symantec focused, for now :)

I want to share a successful SEP deployment adventure with one of our customers who did not allow us to share their name for this experience.

I can tell their structure though. This is a Holding consists of many companies from military manufacturing, energy, banking to textile and etc. having around 10.000 employees in 4 main branches with many banking branches and even with branches on deserts abroad. Main branches are connected to each other with MetroEthernet and DSL to failover. Other branches within the country have only DSL links and branches in the middle of deserts only have 64kbps sattelite links.

 

They were already using TrendMicro and they were thinking that its management capabilities are limited. There were of course many AV software options on the table to be considered. We did...

riva11 | 07 Aug 2009 | 4 comments

Here is a listing of Top 10 Threats by Bright Hub web site , In the article "Top 10 Computer Viruses of 2009" by Sategroup , there is the complete list about the worst viruses in this year.

Top Viruses of 2009 : Based on Ranking

  • Rank 1: Win32/Conficker
  • Rank 2: INF/Autorun
  • Rank 3: Win32/PSW.OnLineGames
  • Rank 4: Wind32/Agent
  • Rank 5: Win32/FlyStudio
  • Rank 6: INF/Conficker
  • Rank 7: Win32/Pacex.Gen
  • Rank 8: WMA/TrojanDownloader.GetCodec
  • Rank 9: Win32/Qhost
  • Rank 10: Win32/Autorun

Link :  Top 10 Computer Viruses of 2009 

Vikram Kumar-SAV to SEP | 06 Aug 2009 | 5 comments
Sometimes when a file is not detected as threat and you think it is a Malware and still it is not getting detected.
In order to scan it from a different antivirus you actually un-install the current antivirus to install a 3rd party antivirus you update the definitions and then scan a file.
Just to know that even that is not detecting it.
There is a easier way of scanning a file with 39 well known antivirus software with their updated definitions.
Simply submit your file to
VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, Trojans, and all kinds of Malware detected by antivirus engines.
Adrian Diaz | 05 Aug 2009 | 1 comment
We are a financial institution headquartered in sunny South Florida. We are now a new charter and privately held bank. My role in the organization is that of Vice President, Information Security Manager. I have been with the bank for over four years. Our department is structured where we manage and maintain all the technology security layers as well as internal controls to meet regulatory requirements.   Currently GLBA is our main driver for compliance.
 
Right from when I started with the bank the Information Security and Information Technology departments where at arms over the then antivirus and client firewall suite. We were using SAV 8.x and 9.x as well as SCS firewall products. Every day, it just seemed to be one battle after the other. The Helpdesk kept receiving user complaints on slow machines, constant viruses and malware, machines freezing and crashing, etc. The Desktop team had issues with...