Video Screencast Help

Security Community Blog

Showing posts tagged with Best Practice
Showing posts in English
snekul | 01 Feb 2010 | 0 comments

Just a quick blog post seems relevent after some problems were encountered with our SEPM server.  After finding preformance lacking a bit on our SEPM server, I fired up the disk defragmenter.  Despite having run it not that long ago, the drive was heavily fragmented.  Our server has 60 GB of space, was about 2/5ths full, and was well over 40% fragmented.  I setup a task to defrag the drive daily during the early morning hours.   Since then, we haven't had a problem with fragmentation on the SEPM server.

Just some background.  Our SEPM server is running Server 2003 x86 and SEPM RU5.  I suspect due to the database backups and the regular definition downloads, that SEPM, by its nature, has a tendency to fragment drives rapidly.

sezam | 14 Jan 2010 | 5 comments

 REMEMBER THAT ONLY SUITABLE VERSION FOR WINDOWS 7 IS SEP 11.0.5 RU5

 
Sometimes SEP client is unable to install itself on Windows7 operating systems.

The problem is connected with 2 issues.
 

1. EXE file extractor[FreeExtractor] is not working correctly.

Sometimes on Windows 7 setup.exe file cannot automatically extract into %TEMP% folder.
To resolve this issue You need to Extract setup.exe file application like Winrar and install SEP using setup.exe or *.msi file in extracted folder.

2. Live Update application cannot be installed.


To resolve this problem You need to perform first step from point 1. but in hear firstly You need to install Live Update using LUSETUP.exe file after install it using setup.exe or *.msi file.
Second solution is to install SEP as unmanaged client.

sezam | 07 Jan 2010 | 0 comments

Some days ago I faced with an issue.
In a big network all Live Update applications were configured with Proxy[Unmanaged clients]. But the proxy setting were needed to be disabled.

Network configuration is handled by files:
- Settings.LiveUpdate;

- 1.Settings.LiveUpdate;
- 2.Settings.LiveUpdate.

which are situated in C:\Documents and Settings\All Users\Application Data\Symantec\LiveUpdate folder.

 
If You have a big environment and You need to perform disabling of proxy setting for FTP an WWW the best is create a script which will delete Settings.LiveUpdate and 1.Settings.LiveUpdate files.

I think It could be useful.

 

dixon_lloyd@hotmail.com | 29 Dec 2009 | 1 comment

I have used Norton products since the DOS days when I became an electronic engineering technician.  I have tried other products
and always ended-up returning to Norton when I got hit by undefined viruses.  The last time I tried other AVs was in 2002 when a
malicious worm hit the internet.  My PC was infected of course.  I wasn't using Norton's product because of personal financial
restraints then.  Eradicating the worm was a  long and difficult process.  I learned a very important lesson, again!  Do not EVER,
for any reason, move away from what you know works.  I worked for a major international office supply corporation in the Technology
Department from 2000 to 2007.  I have shared my experience using Norton products to many customers.  Not one came back to
express any difficulties after purchasing the AV.  However, the ones who do, would leave my department having purchased a Norton...

Warrior6945 | 24 Dec 2009 | 1 comment

 Error: "Authentication failure" when trying to log into Symantec Endpoint Protection Manager console with an additional Admin account

When you login to the Symantec Endpoint Protection Manager console using the Default Administrator you can login successfully However if you create a new Admin and try to login you get an error "Authentication failure"
Reseting the password for the additional Admin account also does not help.

In the SEPM Console go to the Admin tab
Select Domains
Check if more than one Domain is present, if Yes then add the admin account to all the Domains 
Also while logging in to SEPM, you may select the correct Domain by clicking on the button "Options"
You should be able to login successfully.
PaulB | 11 Dec 2009 | 0 comments

Here are the great slides done by Waseem Ashraf from Red Robin to accompany his presentation on Mail Security.

Thanks to all who attended and participated in a great meeting last month, and a special thanks to Bill Randall for hostingthe meeting.

Rolf Niedhorn | 28 Nov 2009 | 1 comment

Hello, everyone,

Daniel Melanchton (Microsoft Germany) made a blog post regarding scan exclusions for Microsoft Products.

Because some people reported issues with user profiles since SEP 11 RU5, it is very interesting to look at Microsofts following recommodation:

Group Policy related files

Group Policy user registry information. These files are located in the following folder:

%allusersprofile%\

Exclude the following file:

NTUser.pol

Group Policy client settings file. These files are located in the following folder:

%Systemroot%\system32\GroupPolicy\

Exclude the following file:

registry.pol

You may find the whole article under the following link:

 http://support.microsoft.com/kb/822158/en-us (Article ID: 822158 - Last...

Joe Pendry | 17 Nov 2009 | 0 comments

Last week, Symantec announced its participation in the Lockheed Martin NexGen Cyber Innovation and Technology Center. This initiative supports the Symantec’s vision of providing comprehensive and long-term security solutions for the US Government through intimate knowledge of government requirements and challenges, forward-leaning technologies, and working relationships with the public and private organizations that drive governmental standards and vision.

As reported in Government Computer News, the center will "the new NexGen facility will be able to tap into the defense center's data feeds, or simulate government agency computing environments, and test various approaches to mitigate cyberattacks.... The new center also features dedicated distributed cloud computing and virtualization capabilities. Those capabilities would permit an...

Sheri Atwood | 30 Oct 2009 | 4 comments
Study Reveals Small Businesses Lack Security Policies
 
The security threats to small businesses are increasing in complexity, number and frequency, and the volume of information they must protect and maintain continues to expand.  A surprisingly high number of Small businesses have yet to take even the most basic steps towards protecting their businesses, such as implementing antivirus or backing up their data. 
 
As part of Cyber Security Awareness Month, the National Cyber Security Alliance (NCSA) and Symantec partnered to conduct a survey on the cyber security awareness practices and habits of roughly 1,500 small businesses in the United States. The results showed that while 65 percent of those surveyed believe that Internet security is critical to their business, only 28 percent have formal Internet security policies.
...
Patrick E. Spencer | 10 Oct 2009 | 0 comments

Starting with the April 2009 issue, we began publishing each issue of CIO Digest to the Amazon Kindle. Readers want to consume content in a variety of different formats, and the increasingly popularity of the Amazon Kindle prompted us to begin making each issue available on it.

The July issue has some really interesting articles, including an exclusive interview with Steve Vollmer, the VP of IT and CTO at Las Vegas Sand Corporation, features on ways to optimize storage investments and strategies on weathering the 2009 economic climate, and much more. Click here...