Video Screencast Help
Security Community Blog
Showing posts tagged with Basics
Showing posts in English
sezam | 18 Jan 2010 | 9 comments

When SEPM console is tried to be open an ERROR: "Could not find the main class com.sygate.scm.tools.DatabaseFrame. Program will exit "  occurs.

untitled.JPG

The problem is UAC. To make SEPMconsole working properly You need to dissable UAC.

jjesse | 07 Jan 2010 | 1 comment

 In an Information Week article dated December 21, 2009, titled "The Dark Side of DLP," the author argues four reasons why DLP implementations are more involved then what they should be. I have attempted to briefly respond to those points, however my experience with DLP is based on Symantec's DLP product. These 4 points are: •Policy

This is the starting point of any DLP implementation, a DLP product will only find data based on the policies you write. And as the article states "[s]ome policies are fairly obvious – there's no good business reason for an employee to upload a spreadsheet full of Social Security numbers to his Facebook profile." Any DLP product you are investigating should have prebuilt templates, if it doesn't run for the hills. The other key to a good DLP product is you should not have to learn some form of...

Acretian | 28 Oct 2009 | 1 comment
Registry Location

For SEP

HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection\AV
 
For SAV
HKEY_LOCAL_MACHINE\SOFTWARE\INTEL\LANDesk\VirusProtect6\CurrentVersion
On the Key you can find two Values  
PatternFileDate  : Current Definition date
PatternFileRevision : Revision
These are Hexadecimal values
Example:
PatternFileDate  : 27090e - 2009 Oct 14 
27090e - YYMMDD Format
27 - 2009
27 Hex is 39 Decimal, this value is since 1970. So 1970+39 = 2009

09
is October (00- Jan, 0B - Dec)

0e Hex
 - 14 in decimal
PatternFileRevision : 16Hex - 22
16 HEX is 22 in Decimal 
Hope...
stebro | 13 Oct 2009 | 0 comments

Symantec Mobile Management 7.0 is a new product providing rich management capabilities for Windows Mobile and CE devices.

Features of this product include

  • Built on the Symantec Management Platform 7.0 and integrated with Symantec Endpoint Protection Mobile Edition
  • Enhanced over the air agent deployment and management
  • Inventory for hardware, system, and software
  • Software Management including software delivery and application healing
  • Remote Control
  • Real Time Systems Management including remote registry and file editors

     

Product details can be found at http://www.symantec.com/business/mobile-management with trialware from...

aNgeLiQuE | 23 Sep 2009 | 2 comments

 

Data Loss Prevention (Vontu)

 

Version #

Release Date*

End of Standard Support

Current version

Data Loss Prevention (DLP) 8

   

Upgrade to current version from

   

Supported versions

     

Unsupported & End of Life versions

     

What does this product do?

 

Vontu Data Loss Prevention 8 from Symantec is the industry's first integrated solution that combines both endpoint and...

LyNeTtE-sKi23 | 22 Sep 2009 | 0 comments

Host ID Transfer

What is a Host ID?
A Host ID, sometimes called a Node ID, is a unique identifier on aUNIX system. Symantec asks for this ID during license registrationand utilizes the ID to ensure that only the license owner can install and use the license

When a license key/file is generated for a specific computer, it is locked to a number that is unique to that machine.

What is a Symantec System ID (SSID)?
The Symantec System ID is a unique identifier for a particular machine. An SSID is similar to a Host ID, except that the Symantec software adds data to the core Host ID value to create a unique string format. The Symantec System ID format varies from product to product, and across machine types.

What is the difference between "Node-Locked" and "Non-Node-Locked" license keys?

A "Node-Locked" license key is one that can only be used...

LeslieMiller | 26 Aug 2009 | 2 comments

At long last we can announce the runners up to the Tell Your Story Contest that ended on July 31st.

The grand prize winners are announced here.

The runners up are:

Backup and Archiving:
clewis: Symantec Backup Exec: A feature-rich software
Abesama: PureDisk--the de-dup champion
Geral Wanjohi Gitau: The migration that went smoothly

Security:
shaun_b: Migration Success Story
danny77: SEP and SNAC - An Unbeatable Combination

Congratulations to each of...

Abhishek Pradhan | 23 Aug 2009 | 1 comment
 
When it comes to fighting malware, you may be asking as a security professional, “Why would I need to perform malware analysis? I don’t work for an anti-virus vendor.” If you are responsible for the security of a network, at some point in your career you will most likely have to perform malware analysis.
 
The goal of malware analysis is to gain an understanding of how a specific piece of malware functions so that defenses can be built to protect an organization’s network. There are two key questions that must be answered. The first: how did this machine become infected with this piece of malware? The second: what exactly does this malware do? After determining the specific type of malware, you will have to determine which question is more critical to your situation.
 
Types of Malware Analysis
 
There are two types of malware...
Bekir | 11 Aug 2009 | 5 comments

Hello all,

I’m a security consultant in my company which is focused on all aspects of IT security but I’m only Symantec focused, for now :)

I want to share a successful SEP deployment adventure with one of our customers who did not allow us to share their name for this experience.

I can tell their structure though. This is a Holding consists of many companies from military manufacturing, energy, banking to textile and etc. having around 10.000 employees in 4 main branches with many banking branches and even with branches on deserts abroad. Main branches are connected to each other with MetroEthernet and DSL to failover. Other branches within the country have only DSL links and branches in the middle of deserts only have 64kbps sattelite links.

 

They were already using TrendMicro and they were thinking that its management capabilities are limited. There were of course many AV software options on the table to be considered. We did...

riva11 | 07 Aug 2009 | 4 comments

Here is a listing of Top 10 Threats by Bright Hub web site , In the article "Top 10 Computer Viruses of 2009" by Sategroup , there is the complete list about the worst viruses in this year.

Top Viruses of 2009 : Based on Ranking

  • Rank 1: Win32/Conficker
  • Rank 2: INF/Autorun
  • Rank 3: Win32/PSW.OnLineGames
  • Rank 4: Wind32/Agent
  • Rank 5: Win32/FlyStudio
  • Rank 6: INF/Conficker
  • Rank 7: Win32/Pacex.Gen
  • Rank 8: WMA/TrojanDownloader.GetCodec
  • Rank 9: Win32/Qhost
  • Rank 10: Win32/Autorun

Link :  Top 10 Computer Viruses of 2009