Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Symantec Security Information Manager
Showing posts in English
Brian Byrnes | 15 Jul 2010 | 0 comments

As an IT consultant I am fully aware that IT management is struggling with whether social media is productive or obstructive for companies and their employees. Software is being developed and policy and restrictions are being decided everyday by IT managers. The security of the networks of various organizations are at stake but the potential for innovation using social media is a large enough incentive for the discussion of how to properly utilize the medium continues. Palo Alto networks came up with a whitepaper,, which will explore the issues surrounding social media in the workplace. It is important to not only understand the immediate benefits of doing business how one lives, but the threat it presents to an organization’s greater ROI and productivity when it comes to the server’s safety and security.  If your IT Department wants to block social media apps on the company network...

hecongyan | 06 May 2010 | 1 comment

You have just completed installing Windows Server 2008, and you click the CTRL + ALT + DELETE keys and then you were lost, what username should you log on with, what password should you use ? Especially that you did not create any during the installation process ! In this article, I will show you how to successfully log on to Windows Server 2008.

With Windows Server 2008 RC0 and the Beta builds of Windows Server 2008, you were automatically logged on after the successful completion of Windows Server 2008 installation, and then creating the administrator user account password was the first option inside the Initial Configuration Tasks.  ICT-RC0

Whereas With...

hecongyan | 06 May 2010 | 2 comments

Part of any good computer security strategy is changing computer password on a regular basis. A strong password is the first line of defense against those who wish to get access to our computers and the important data they contain.
In this article We will learn how you can easily change your password in Windows 7.

Difficulty: Easy

Things You'll Need:

  • Windows 7


  1. Step 1


    Click on the "Start" , which is the "Windows Orb...

hecongyan | 29 Apr 2010 | 1 comment

Have you ever faced a problem of forgotten password in your Windows PC? If yes better have a backup plan now itself. Here we are going to tell you, how you can reset Windows password using a reset password disk. This feature is available in Windows 7 and Vista only.

You can backup your user identity in a USB disk and use the disk for resetting your Windows user password in the future in case you have forgotten it. For this purpose you need not use a high capacity USB drive. You can either use your old USB which are considered obsolete or too small in size like 128MB or buy a small capacity one at lower cost. This is because the reset file if very small and you need to store the USB device in your locker or any other safer place.


A USB Flash Drive(Any size)

Windows 7 or Vista Operating System


OCCK | 09 Mar 2010 | 1 comment

We are trying to feed the client log entries from the Endpoint Protection to a Security and Information event Management (SIEM) system.   In order for us to size the SIEM, it is necessary to determine number of client logs per hour coming in to the SEP manager.   Does everyone know to figure out this number?  Thanks.

rcarela | 01 Feb 2010 | 0 comments

The South Florida Security & Compliance User Group Board of Directors would like to thank everyone who attended the meeting at the Citrix Building on January 28, 2010.  Here attached are the powerpoint presentations that took place.  If anyone would like to present or host a future meeting please let us know.  Please spread the word about our group!  If our group continues to grow so will our experience and knowledge.

The Powerpoint presentation file

  • BE12_VCB is titled : Symantec Backup Exec 12.5 VMware - Virtual Consolidate Backup 
  • SIMs is titled: Security Information Managers [SIM/SIEM]

More to come in the near future please continue to benefit from using our resources at Symantec.

crazeeeeeem | 26 Jan 2010 | 0 comments

Asissoft's release of Sudden Attack ( is a trojan and is collecting Windows passwords.

It works by preventing a user from logging into his/her PC, then providing an form to fill in a password and user name field, which if filled in correctly, will allow access to the user's machine. What its doing is of course well known subterfuge but the business world seems very unaware of the issues and costs, maybe rightly so.

A probably more overt proponent of this method of controlling and obtaining information from unsuspecting users is a company called LogMeIn ( The simply ask for your passwords over the internet.

Since everyone is doing it, I guess they may as well.

Kevin Walsh | 06 Aug 2009 | 5 comments

Many blogs on the Symantec website are very informative and visually explain - "what is phishing". These efforts have brought down the instances of user-mistakes (such as clicking URL in an email, submitting information to untrusted website etc..). But we have yet to see browser manufacturers addressing the root cause of phishing. Phishing is still a big concern for a new Internet user, especially kids. I see a parallel between usual phishing and Internet crime against kids. Both have same root cause - who can be trusted on the wild-wild-web? 

Explaining "phishing" to a layman: The Internet scammers develop a website which looks just like your bank or merchant. Then the scammer will send you an email that appear an official email from your bank or merchant. This email will ask you to approve a transaction you recently made, or re-verify some personal information by clicking a weblink. If you are not careful and click the weblink you may not realize...

Kedar Mohile | 05 Jun 2009 | 5 comments

After you configure database maintenance options, the new options are applied at midnight, and not immediately.

To configure the database options:

  1. In the console, click Admin > Servers, and then select a site.
  2. Under Tasks, click Edit Site Properties, and then click the Database tab.

To configure the management server to apply the database maintenance options immediately, you can configure the file.

To configure the file:

  1. Open the file, located in the C:\Program Files\Symantec\Symantec Endpoint Protection Manager\tomcat\etc directory by default.
  2. Change the following parameters:
  • Change scm.object.idletime=3600000 (in milliseconds) to a smaller number. The default setting is 1 month.
  • Change scm.timer.objectsweep=900 (in seconds) to a smaller number.The default setting...
Grant_Hall | 26 May 2009 | 1 comment

Don't know if this has been brought to peoples attention yet, but as of May 22, 2009 Symantec has released a new site devoted to Symantec's podcasts. These podcasts cover a wide variety of products and ideas. Customers and employees alike will be able to subscribe to these podcasts and receive RSS updates whenever new podcasts are available. The website for the podcasts is at .  In general these podcast are broken down into eight different categories. These categories include:

Security Response—Learn how to avoid phishing attacks, how Norton AntiVirus products help protect your environment, how to safeguard your smartphones and PDAs, how to protect against business disruptions, and more.

Home Users—Topics cover online family safety, how to prevent cyberbullying, protection against identity...