Video Screencast Help

Security Community Blog

Showing posts tagged with 11.x
Showing posts in English
Spencer Parkinson | 16 Feb 2011 | 0 comments

In his keynote speech at the 2011 RSA Conference, Enrique Salem, Symantec’s president and CEO, shared his perspective on what is happening in the security industry. Enrique took the crowd on a journey back in time to July 13, 2010, when the world first got word of Stuxnet and provided an analysis of the threat.  Enrique also talked about how IT is being pulled in conflicting directions as users demand more choice over their devices and applications while management demands more security and control. The mega trends of mobile, virtualization and cloud, along with the continuing information explosion and changing threat landscape, are fundamentally redefining the roles and responsibilities of security professionals. Listen as Enrique talks about how IT can resolve these conflicts and regain control.

P_K_ | 25 Jan 2011 | 0 comments

How is the content downloaded via LU secure?

The Live update TRI files are downloaded in an archive format

These minitri’s and files consists of 3 files

  • liveupdt.sig
  • liveupdt.grd
  • liveupdt.tri

GRD and SIG files are used to verify security and integrity of patches

The Mini-tri Zip is Validated by GRD file and also Authenticated by SIG file

The  Guard file use  SHA-1 hash values

For Live update the protocols that are used is  HTTP/FTP server. These live update is hosted by Akamai.

Published using Java Triage and they are Signed by Symantec Digital Signing Servers.

UCD4me | 05 Jan 2011 | 0 comments

The User Centered Design (UCD) team here at Symantec exists to help make customer experiences easier, more efficient and more useful for you.  Right now, we're ramping up several research projects where we are looking for those in security and compliance with a manger, director or CISO role to give us feedback in the form of short user stories.  This should require only a 30-45 minute commitment on the phone to share experiences and points of pain, and this effort is "product agnostic" so as long as you are involved with security, regardless of products used, we'd like to hear from you!


If you are interested, please email Kellie Mecham at to arrange a date and time for the phone interview. 


We look forward to hearing from you!


Best wishes,





sezam | 10 Dec 2010 | 1 comment

If You would like to get fast report about SEP clients connected to SEPManager you can use this query.

use SEPdbName








where SEPdbName is a SEPManager Data Base name.


In next Blog entries I will explain more.

sanoj | 25 Nov 2010 | 0 comments


Hi All,

Is there any new Vulnerability in Windows (Windows zero-day flaw bypasses UAC) .

Please look in to below link

Has symantec found any mitigation for this.




Mig90 | 11 Nov 2010 | 1 comment

I need HELP!!!  


I cannot install Symantec Endpoint Protection (Ver 11.6) onto my Computer (Microsoft Vista).  I am active duty Air Force and am attempting to install the Free Home edition on my home computer that I downloaded from the website at work.

Every time I attempt to install Symantec Endpoint Protection Client it stops installing and says, "The wizard was interrupted before Symantec Endpoint Protection could be completely installed.     Your system has not been modified.  To complete installation another time, please run setup again another time."


Every time I do I get the same error.  I uninstalled and deleted the old Norton antivirus from the computer.    



Spencer Parkinson | 10 Nov 2010 | 0 comments

Symantec was recently named a finalist in multiple categories of the 2011 SC Magazine Awards program. Symantec has been recognized for 10 products in 10 areas of the Reader Trust Award competition, which honors best-in-class security products and services. Symantec’s products were selected from more than 650 entries submitted in more than 30 technology categories.


Symantec products honored this year:

Mahesh Roja | 07 Oct 2010 | 4 comments

IE9 Beta causes SEP client not to update virus definitions and sometimes in windows 2008 R2 servers have got installed IE 9 beta

Follow the below steps      

    1.Go to Programs and Features -- Turn Windows Features on or off --then click on view updates

           2.  In the list of installed updates, double-click Windows Internet Explorer 9.

3.    In the Uninstall an update dialog box, click Yes.
Note If you are prompted for an administrator password or for confirmation, type the password, or click Continue.

4.    Follow the instructions to uninstall Internet Explorer 9.

5.    When the uninstall program is finished, restart your computer.

6. If you have IE 8...

davidsen1937 | 29 Sep 2010 | 0 comments

Hi guys,

We are now on the process of migrating SEP RU5 clients to RU6a. Our current setup is to utilize Auto-upgrade feature of SEPM, and to 'Download the client Package from the management server'.

With bandwidth issues, especially on our remote offices, we are looking into an option of 'downloading the package from a specific URL', from a machine co-located with the remote computers. What could be the considerations that we may need to take? Such as setting up a webserver, and the specifications or other requirements for it to push the upgrade package to the clients.

Also, talking about bandwidth issues here, do you have an idea on how much does a SEP client takes to have it upgraded from RU5 to RU6a?

Thanks for the help..

mon_raralio | 23 Sep 2010 | 1 comment

What is a sector?

Before we begin, we must first determine what is a sector. A sector is a subdivision of a drive. The term is derived from the mathematical term for a portion of a circle (an arc) that is enclosed by 2 radii or lines from the center to the edge of a circle. So in computer storage terms, a sector is an an arc where data is written. Note: Drawing is not by best work.
So, what and where is a boot sector?
In order for a PC to be useable, it need to powerup and boot.And the PC has 2 stages of booting up.The first stage boot loader is the BIOS. This is so that all the primary hardwares would come online and be able to communicate with one another. This also contains instructions on which hardware - usually a storage device - to access to get to the second stage of...