Video Screencast Help
Security Community Blog
Showing posts tagged with Reporting
Showing posts in English
Ram Champion | 16 Jun 2009 | 3 comments

Hi Connect Members,

Microsoft has released its first public beta release for exchange 2010 more information can be found on , Thanks.


Kedar Mohile | 05 Jun 2009 | 5 comments

After you configure database maintenance options, the new options are applied at midnight, and not immediately.

To configure the database options:

  1. In the console, click Admin > Servers, and then select a site.
  2. Under Tasks, click Edit Site Properties, and then click the Database tab.

To configure the management server to apply the database maintenance options immediately, you can configure the file.

To configure the file:

  1. Open the file, located in the C:\Program Files\Symantec\Symantec Endpoint Protection Manager\tomcat\etc directory by default.
  2. Change the following parameters:
  • Change scm.object.idletime=3600000 (in milliseconds) to a smaller number. The default setting is 1 month.
  • Change scm.timer.objectsweep=900 (in seconds) to a smaller number.The default setting...
thaller | 03 Jun 2009 | 1 comment

Hello all,

This is my first blog post, but I hope to continue these in the future as situations arise, to help others with their SEP Deployments.

At my Organization we currently have 2 SEP Managers (MR4 MP1), that are replicating between each other. Our primary site is running on a Windows 2003 R2 SP2 Machine and has its DB on a separate server running SQL 2005 SP2 on a Windows 2003 R2 SP2 machine. Our Secondary Site is on a Windows 2003 R2 SP2 Machine running SQL 2005 SP2 on the same machine. These Sites are connected over a DS3 WAN Link approx. 200 Mi apart.

This past weekend the blade that is running the primary sites SQL DB failed, and the SEP Manager informed all of our administrators approx. 5-10 min prior to our other monitoring solution. I know that this looks bad for our primary server monitoring system, however SEP alerted us to a Database Down incident first, which got the ball rolling, and it also pointed out that we need to fine tune our primary...

riva11 | 25 May 2009 | 0 comments

Do you need to know open ports on your servers ? Try CurrPorts by Nirsoft , this helpful tool allows to Monitor TCP/IP Network connection on your Windows computers.
No installation needed, just download the exe file from the dowload link and start to scan your target system.

CurrPorts displays the list of all currently opened TCP/IP and UDP ports on your local computer. For each port in the list, information about the process that opened the port is also displayed, including the process name, full path of the process, version information of the process (product name, file description, and so on), the time that the process was created, and the user that created it.
In addition, CurrPorts allows you to close unwanted TCP connections, kill the process that opened the ports, and save the TCP/UDP ports information to HTML file , XML file, or to tab-delimited text file.
CurrPorts also automatically mark with pink color...

Katherine Cooper Symantec SMB Campaigns | 20 May 2009 | 2 comments

Symantec recently released the findings of its 2009 Storage and Security in SMBs survey, which indicate that some small business are neglecting important information safeguards due to tight budgets and lack of time and IT staff resources.

According to the survey, small and mid-sized businesses (SMBs) clearly understand the importance of security and report that protecting their information, network and servers are their top goals. But despite understanding the risks they face, a surprising number of companies are neglecting basic safeguards.

More than half have not implemented endpoint protection to safeguard laptops, desktops and servers against malware. Almost half do not backup their desktop PCs, leaving their important information at risk.

Finally, one-third of SMBs do not have the most basic protection of all -- antivirus protection. Small business owners are working with many fewer resources and any missteps could shut them down. Every dollar and every...

skc skc | 09 May 2009 | 3 comments

Hi all,

Need solution badly!!!!!!!!!

 When i open my drives semantic anti virus detects and deletes Klif.sys virus and opens in new window. This happens every time when i open drive. Is there any why yo remove virus.

any solution.?

rheadley | 28 Apr 2009 | 1 comment

This zip file contains sample reports provided by Jeff Van Gundy on February 26th at the San Diego User's Group meeting. I have also included a message from Jeff on how to instruct customers to deal with the issue with MR4 MP1.

San Diego Altiris User Group.

Thank you for your time yesterday. I was glad to share the capabilities of Symantec Endpoint Protection with you. As I mentioned before, you can always expect to get straight information from me. I and Symantec value you as customers. We understand that you have invested time and money in our solution. Therefore, it is imperative that we make sure we are direct and honest with you in regards to our security portfolio and how it can impact you. It's easy to stand up and tell you how great we are. It's not so easy when we have an issue. But if I and Symantec are to have integrity, then we need to give you all information both good and bad.

Yesterday I told you that we have an issue with Symantec Endpoint...

vikram3500 | 23 Apr 2009 | 2 comments

 Very interesting article i read the past hour up

Marshal8e6, a global provider of Secure Web Gateway and email security products, announced today the findings of its extensive botnet research conducted by the company's TRACElabs threat research group. The data, compiled during the first quarter of 2009, represents two years of in-depth research and observation which provides detailed analysis of the inner workings of major botnets that Marshal8e6 has identified as the biggest spammers.

As part of the study's findings, TRACElabs determined that the Rustock and Xarvester malware provided the most efficient spambot code, enabling individual zombie computers to send 600,000 spam messages each over a 24 hour period.

More of the Article at

SAM_SHAIKH | 23 Apr 2009 | 3 comments


W32.Sality is a parasitic virus which infects shared drives and Windows executable files by putting its code to host files. It contains downloader functionality to further install Trojan or key logger components. Sality opens a backdoor that allow the remote attacker to get the full control over the infected computer and in turn the confidential information, representing a serious security risk.

Microsoft - Virus: Win32/
Kaspersky - Virus.Win32.Sality.aa

W32.Sality has the following symptoms:

• Modifies System.ini files (Check for the modified date)
• Services listening on the network port(s).
• Unexpected network trafic to one or more of the domain(s).
• No access to File Monitor.
• Disables Safe mode boot
• Disables regedit and taskmanager
• Disables Antivirus

Upon execution, it starts...

erikw | 20 Apr 2009 | 12 comments

Go to the link and read the latest news. You need to have java enabled.