Video Screencast Help

Security Community Blog

Showing posts tagged with Control Compliance Suite
Showing posts in English
Chaitali | 20 Feb 2013 | 0 comments

Issue: When a result of a Collection Evaluation Report job is exported in CSV format, the cells break - giving a non-uniform report output.


Cause: When the evidence of the failed checks is large, Microsoft Excel cannot handle the large character count of an individual cell. This causes the cells to break.


Explaination: The capacity of Microsoft excel to handle the length of cell contents is 32,767 characters. The first 1,024 characters display in a cell and the remaining appear in the formula bar. If the character count of the evidence in a cell is more than 32,767 characters, the cell will break. This is a limitation of Microsoft Excel.


Solution 1:

Instead of exporting the report in CSV format, export the result to excel by the following method:

Go to the Evaluation Result >> Select "Asset Based View" >> Highlight and select the assets >> Right Click on...

Chaitali | 20 Feb 2013 | 0 comments

How to report on an agent based Unix Server hosting multiple databases

Desired reports:

- Reports from the Unix Host

- Reports from DB1, DB2, DB3

Refer to the diagram below:


To report on the Unix Host:

Install the Unix agent on Unix Host.

- Register Interface 1 with BVIS using command:

  • / -a <IP of BVIS> <IP of Interface 1> <Username> <Password> -s UNX


To report on DB1, DB2, DB3:

- Register Interface 2 with BVIS using the -lip (logical IP) commands:

  • / -a <IP of BVIS> <IP of Interface 1> <Username> <Password> -s UNX -lip <IP of Interface 2>
  • / -a <IP of BVIS> <IP of Interface...
Chaitali | 19 Feb 2013 | 0 comments

How to determine the cause of Scheduled Task or Query failure


The cause of failed schedules can be determined from the Schedule Logs.

The logs for the RMS schedules are stored in text format at the following location: 

\Program Files (x86)\Symantec\RMS\data\<User Name>\ScheduleLogs


The name of each log file corrosponds to the name of the schedule in RMS.

These log files are automatically overwritten by the new log files after the respective schedule re-runs.

At any given point in time, one schedule in RMS has a corresponding one schedule log file from its latest run.


kishorilal1986 | 17 Feb 2013 | 1 comment

Dear All,

As day by day security threat are increasing  and u need to more proactive approach to find latest details and make security tighten. As hackers group are continously working to break out security measures but at the same time organization spending lots of resource and money to make bussiness smooth and secure.

I think this is not just spending the money on IT security and having securty experts. makes u secure by implementing the security solutions. It is equally important to you how intellegently and smartly you take care each sides of security threats and configure it accordingly.

Please also read below threads for getting updates on some recent security threats


  • Shamoon virus targets energy sector infrastructure


Vikram Kumar-SAV to SEP | 04 Feb 2013 | 0 comments


Symantec keeps tab on the changing Threat Landscape and incorporates relevant security on its products.Same is the story with SAV to SEP to now SEP 12..

When we had SAV in the market what our customer needed was just a Antivirus to protect their system from antivirus was looked more as a Availability facilitator than a core security product..till early 2000.

Even though we had SCS (firewall and IPS) seclected people used the other features.

Starting from 2006-2007 that was a high rise in malware being created and vulnerabilities being exploited..slowly the trend changed and it all came down to money making malwares..

FakeAntivirus, Downadup, Various Blackmailing Trojans the audience was not high profile..and SEP 11 very well detect and blocks and does whatever it can..Slowly people started using IPS, ADC and found much more can be done with SEP and they are doing it..

However in last few years there has been...

Al Cooley - DeepSight Product Management | 29 Jan 2013 | 0 comments

There has been a data explosion within security teams, as organisations everywhere seek to increase their effectiveness in preventing breaches of defences through improved correlation and data sharing. You have probably seen this happening within your own working environment, too.

In the quest to achieve this sought-after level of ‘good enough’ security, the findings of new research from the Enterprise Strategy Group, ‘Big Data Intersection with Security Analytics’, partially sponsored by Symantec, are encouraging.

You won’t be too surprised to hear that, in our ‘Big Data’ world, we are collecting a lot more data than we used to two years ago. There is only one direction in which that arrow is going to be pointing from now on. What is interesting here, though, is that lots of people are vested in this information to do their job – and that is likely to envelop even more people, across a wide range of roles over the next...

Gavin Fulton | 13 Dec 2012 | 0 comments

Over 6 years ago, when working for a Professional Services organization and responsible for developing key Security propositions for customers, I first developed an approach for "Vulnerability Lifecycle Management".

At the time the solution involved manual integration of a range of technologies from a range of different vendors:

  • network vulnerability assessment tool
  • patch management tool
  • compliance management tool
  • risk reduction tool (Host based IPS)
  • security intelligence feed

At that time this involved a identifying a range of tools from a number of different vendors, and the associated technical and procedural integration of inputs and outputs from each.  There were challenges with the different cost models to license this complex solution, let alone the technical integration of the various input and output formats.

Jumping forward from 2006 to 2012 and this type of solution is entirely...

Daniele Bertolotti | 12 Dec 2012 | 1 comment


I think it’s about time to refer to PCI DSS as a rather mature and dissected standard. And I’m ready to bet that you heard at least once in your life the sentence “PCI only demands for common-sense security!” All true, still we keep on facing situations where organizations struggle to maintain compliance with PCI DSS. It seems that we do a pretty good job at covering PCI DSS requirements, but somehow neglect to drive an approach that would help organizations stay compliant and protect their business through their evolution.

PCI standard is based on a very simple yet effective equation: you need to protect a specific and well defined type of data and you must do it with a series of well-defined measures, most of them technological (PCI DSS is probably the standard that, more than any other, dares to get its hands dirty with technology) and many other...

Pamela Reese | 06 Dec 2012 | 0 comments

Symantec received a finalist nomination in 9 categories of the upcoming SC Magazine 2013 Awards, representing Symantec's broad portfolio of superior security offerings. SC Magazine will announce the winners at a dinner event during RSA 2013. Symantec looks forward to attending!

Deb Banerjee | 16 Nov 2012 | 0 comments

Amazon Web Services (AWS) clouds offer a variety networking security controls for segmenting and isolating EC2 instances running in that cloud. These controls address the following use cases

  1. Isolate EC2 instance from the public internet. E.g make those instances unaccessible from the public internet.
  2. Isolate EC2 instance belonging to an Enterprise from other EC2 instances belonging to other tenants.
  3. Within a tenant, isolate applications and departments from one another. This can be also be used to isolate application tiers from one another.
  4. Isolate applications and application tiers from one another within a tenants AWS network..

AWS Network Security Constructs

AWS offers a variety of networking constructs to implement these controls. These include VPC's, Gateways(Internet and VPN), NAT, Subnets, Routes, Security Groups and Elastic IP's.  These objects would be used to implement the above controls...