Video Screencast Help
Security Community Blog
Showing posts in English
Mithun Sanghavi | 02 Oct 2012 | 4 comments


The Latest version of LiveUpdate Administrator (LUA) version 2.3.2 is now available.

Contact Symantec Technical Support to grab the Latest Copy of LiveUpdate Administrator (LUA) version 2.3.2

The installation file (147.35 MB) and will later be included on the SEP 12.1 RU2 DVD’s (SEP 12.1 RU2 is yet to be released)

Some of the features included in this release

  • Packaged with Apache Tomcat version 7.0.26 and PostgreSQL version 9.1.3.
  • Packaged with JRE 1.7 (private JRE, automatically bundled, installed and configured by the LUA installer).
  • Enhanced security with advanced features to protect the User Interface from certain attacks.
  • Added the ability to modify the LUA download directory path at any time (not just at install time).
  • Product Catalog will now automatically update to ensure catalog changes become available without any user...
Brandon Noble | 23 Aug 2012 | 0 comments

We have been seeing a recent wave of Trojan.Shylock variants with a lot of additional functionality than the older versions we have been used to.

Initially, many of these variants are detected generically as Backdoor.Trojan or Trojan Horse, but our new Shylock heuristic signatures (Trojan.Shylock!gen6 and Trojan.Shylock!gen7) should be changing this to a more accurate naming convention, and should be picking up a much wider spread of these threats.

Additionally we are hearing about some behavior that we have not been able to reproduce. Reports are saying that legitimate documents are getting hidden and then shortcuts with the same name of the document are being added in their place. These shortcuts actually launch a thumbs.db(x) file which is the Shylock Trojan, and they are meant to trick the user into running the threat. This is common behavior of for threats, as noted in this blog article from May 2012,...

Richard Harsell | 20 Aug 2014 | 0 comments

We are looking to hire a CSP resident in the Raleigh, NC area.  The req can be found at:

Please contact Ryan Alves at


This Resident Consultant will be the trusted advisor in Symantec Data Center Security (DCS) - formerly Critical System Protection (CSP) - for a customer located in Raleigh, NC.  The successful candidate will be part of a team of onsite Consultants that support multiple Symantec technologies for this customer.  The primary responsibilities include:

  • Prevention and Detection policy testing, tuning, and automation
  • Customized reporting and analytics
  • Upgrade testing and deployment
  • Assist with daily administration and optimization of the DCS/CSP...
EfrainO | 18 Aug 2014 | 0 comments

Following in Dr. Snow’s footsteps
     We can follow Dr. Snow’s lead by looking for commonalities, differences and outliers in our own digital communities. We need to start to look for what makes one system get infected while another does not. It is difficult to inconvenience many people based on incomplete evidence or misunderstood information. It may help to tell the Dr. Snow story to illustrate the parallels with the difficult fight against digital diseases. When the water pump on Broad Street was removed, the community complained about the inconvenience of having to walk farther to get their water. In order to convince our digital General Board of Health to remove a digital pump handle at an organization, we must have the evidence to back up our claims.  We must remind users that when it comes to digital diseases, just like biological diseases, epidemiology is a science of probability not a science of certainty. Even a great...

Khi02 | 18 Aug 2014 | 0 comments

Security response team is doing their best towards identifying the Bots in our organization, whenever we submit the logs they will react in a very quick manner and update us with result. The botnet tracker tends to decrease down day by day and now it is very much controlled by following the best practises.



Marianne Davis | 15 Aug 2014 | 0 comments

How do you know how much cybersecurity is enough? Roughly 45 percent of global CIOs admit to underinvesting in cybersecurity according to a recent Accenture study. While CIOs are generally aware that endpoint protection alone is not enough to protect their business against advanced cyber threats, many are reluctant to upgrade security technologies. Why? Because of the perceived cost involved.

According to the U.S. Treasury, companies often avoid sufficiently investing in cybersecurity because they perceive that existing threats don’t warrant high levels of investment. Unfortunately, the cost of data...

EfrainO | 08 Aug 2014 | 0 comments

This is the second part of my blog series.

In the medical community, Dr. John Snow is considered the father of modern epidemiology. He is known for successfully investigating the cause of a cholera outbreak in London in 1854. Through careful surveying of the deceased individual’s location of death, and which company was their water provider, Dr. Snow noticed that the locations of the deceased seemed to correlate to where they obtained their water. Contrary to popular retelling, Dr. Snow did not figure out the cause of cholera from looking at a map of data. Before the Broad Street pump incident, Dr. Snow was already investigating two water companies that served London; the Southwark & Vauxhall Company and the Lambeth Water Company. An outbreak of Cholera in the Soho area of London occurred in 1854 which offered him the opportunity to test his hypothesis: that cholera was transmitted via water and not air as believed by miasmatists. Miasmatists believed diseases were...

Kari Ann | 07 Aug 2014 | 4 comments

The prevalence of zero-day vulnerabilities hit close to home this week when a North American penetration tester published a report claiming they had found a vulnerability in Symantec Endpoint Protection. The reality of Symantec’s ISTR vo. 19 seeing a 64%* increase in zero-day discoveries last year came alive as the Endpoint Protection product team reacted quickly to confirm and respond to the risk with a patch (available on FileConnect).

To date, no known compromise has been reported due to this medium severity vulnerability. The issue affects the Application and Device Control component of Symantec Endpoint Protection. If exploited, it could result in a client crash, denial of service or, if successful, escalate to admin privileges and gain control of the system.

It’s important to note that the vulnerability is not...

Chetan Savade | 07 Aug 2014 | 0 comments

Hello Everyone,

Symantec Endpoint Protection support is availalble with multiple options like Phone Support, Chat Support, Social support & Web Support via My Symantec 

Here is the landing page: 


Phone Support:

Phone Support.JPG

Check Phone Support conact by region. Here is the link.


Chat Support:

Chat Support.JPG

To initiate Chat support, Enter initial word...

EfrainO | 06 Aug 2014 | 0 comments


This is the first of a multipart blog. I want to advocate a process change to continuously monitor an organization’s digital population, healthy or otherwise, modeled after Dr. John Snow and the Center for Disease Control and Prevention’s Epidemic Intelligence Service (CDC EIS). This Snow–and-CDC inspired process will help in detecting outliers or indicators of early stage digital disease onset, limiting the exposure time to hosts, and limiting the total cost of loss. Instead of waiting for a digital disease outbreak to engage responders, we should engage in the constant day to day analysis of population health data to find the digital disease pathogen before it becomes an epidemic and possible pandemic. In this paper I’ll discuss Dr. Snow’s investigation of cholera and how his investigation method relates to digital disease detection, response and prevention. I will also cover some tools used in epidemiology that demonstrate epidemiology’s applicability to advance...