Video Screencast Help
Security Community Blog
Showing posts in English
Chetan Savade | 21 May 2014 | 1 comment

Hi,

PowerShell script to validate that all machines in your OU have Symantec Endpoint Protection (SEP) anti-virus client installed and started. Generates a color-coded Excel report highlighting problematic nodes.

Refer this link and download the script from here: http://gallery.technet.microsoft.com/scriptcenter/Symantec-Endpoint-8e47c450

Reference link: http://www.reddit.com/r/sysadmin/comments/25mtye/finding_symantec_endpoint_clients_on_network/

Note: This method is not supported by Symantec. Symantec recommends to use unmanaged detector.

Tim G. | 19 May 2014 | 0 comments

So I was reading this article earlier and I had some thoughts come to mind here.  I was going to share them on my LinkedIn account, but felt that this was not going to be a short update, nor would it be a "final thought" as I would like to have something with a little more meat and feedback to it.

So here goes.

In the article the author calls out some pretty interesting stats associated with credit card breaches, PII losses and the like.  None of these details should be news to you if you follow any of Symantec's reports like the ISTR or any other of our joint reports or other industry bodies’ reports for that matter. 

These reports will show you big numbers, which really show just how prevalent and dangerous all of this is.  And to be quite...

nisharamach | 18 May 2014 | 0 comments

Join Symantec Security Response expert, Kevin Haley, for a Tweet Chat on Friday, May 23 at 11 a.m. PT / 2 p.m. ET to talk about  key trends highlighted in Symantec’s recent Internet Security Threat Report (ISTR), Volume 19.

The ISTR, which covers the major threat trends observed by Symantec in 2013, highlights how cybercriminals unleashed the most damaging series of cyberattacks in history – ushering in the era of the “Mega Breach.”

How do these breaches impact you and your company? Find out. Mark your calendars to join the #ISTRTALK chat and plan to discuss the latest attack vectors and techniques used by cybercriminals to gain access to your data.

Topic: Internet Security Threat Report: Volume 19 – What are the odds of your company getting attacked?

Date: Friday May 23, 2014

Time: Starts...

vgtero | 05 May 2014 | 0 comments

Symantec Vision 2014 has finally arrived and we are excited to welcome all of our attendees! This week’s event offers four days of face-to-face insights, information, and experiences you can use to secure your organization.   

On Wednesday, May 7, we are offering a hands-on lab session to highlight the new capabilities of Symantec Control Compliance Suite Standards Manager 11.0.5, which started shipping on April 15, 2014.   Lab 1381- Enhance Asset Discovery and SCAP 1.2 Compliance for Continuous Monitoring with CCS Standards Manager, will demonstrate how CCS Standards Manager's new network and asset discovery capabilities and SCAP 1.2 support enhances your continuous monitoring objectives. (Lab 1381, Wednesday, May 7, 2-3 pm, Milano 1). 

Control Compliance Suite...

khaley | 05 May 2014 | 1 comment

Hear the word flimflam and you think of a time of straw hats and cardboard suitcases; of grifters pulling into town to take the rubes with patent medicine, three-card monte and the old pigeon drop con.

It would be nice to think that these words don’t get used today because we’ve become so much smarter.  We have information at our finger tips.  We are too smart and sophisticated for flimflam, grifts, ruses, hustles, swindles or bunko to work on us. 

Of course that’s not true.  Words just fall out of fashion.  Today we call them scams and cons.  And while we might be more sophisticated than we were, we remain human and human nature remains just as exploitable as it was a hundred years ago.   Oh, and the Flimflammers have gotten more sophisticated too. They’re now using computers.

Using the Internet to run scams makes sense.  Con is short for confidence.  And where better to gain confidence than among friends and...

vgtero | 02 May 2014 | 0 comments

A new report from the Ponemon Institute, “Exposing the Cybersecurity Cracks: A Global Perspective,” concludes that global security professionals find themselves “deficient, disconnected, and in the dark” in combating cyber threats.

Despite the fatalistic tone in this report, I don’t believe that as security pros, you are the type who would just shrug your shoulders, say “cie la vie”, continue with business-as-usual, and hope for the best. As security professionals, you are excellent at problem solving and thrive at these challenges! You are probably in the midst of figuring out strategies or executing plans to address these deficiencies and remove these feelings of “security inadequacies”.  Many of you are multi-taskers, shoring up your organization’s security and risk management capabilities; at the same time, executing transformative activities such as migrating applications to a software-defined environment. 

At Symantec, we continue to develop solutions...

Lion Shaikh | 28 Apr 2014 | 0 comments
Sr. No Blank Field Type Reason
1 Destination HTTPS/SSL In endpoint Incidents Destination field is used for file transfer incidents i.e.( where files are transfered from source to destination) and since https/ssl or http transactions do not have this information destination is only populated for CD/DVD & Removable storage Incidents. But still we get the destination URL for http/s incidents which is given in recipient field.
HTTP
       
2 Destination Path CD/DVD For CD/DVD Incidents destination path would be CD/DVD Drives and since at the time of writing the files on CD/DVD drives they become un-readable for the internal applications due to which DLP is unable to monitor/ keep track of...
Sym_Chris | 28 Apr 2014 | 0 comments

Top Issues!

In one of our previous blogs (https://www-secure.symantec.com/connect/blogs/symanteccloud-support-blog), we looked at the top issues our customers are raising with Symantec.cloud support. In April, these issues remained in the number one and two slots. Firstly, the Submission of Spam Samples. Many of our customers are now using the Symantec Email Submission Client, installed on their Exchange environments. This tool allows users to submit spam samples directly to our analysis teams, without the need to raise a support case. It really is helping us to help you, so if you aren't using it already, head over to the Downloads section of our customer portal and download the file. It's a quick and easy installation, and a very lightweight add-on.

We're also continuing to see Email Delivery issues as a very common...

James Hanlon | 25 Apr 2014 | 1 comment

The Executive Briefing Center (EBC) for many years has worked with EMEA’s key customers to define their security strategies and demonstrate how Symantec’s solutions can help them meet their business needs.  

With the launch of CyberV Enterprise Assessment (EA) service, the EBC will now act as the CyberV center of excellence (CoE) offering not only the ability to deliver the CyberV EA service for Symantec's customers but also providing complete 'Cyber Customer Experiences' by combing the CyberV assessments with Symantec Security Operation Centre (SOC) tours and cyber solution briefings. 

The CyberV EA service leverages the latest global thought leadership within the area cyber resilience and combines it with Symantec's own cyber insights to provide a 'snapshot' assessment of a customer's current and desired level of cyber resilience. The Cyber EA service provide great value for customers by assessing capability around the four cornerstones of cyber resilience...

riva11 | 24 Apr 2014 | 0 comments

Keeping your web browser up to date is very important for your own safety and security, but also it is important to install the latest add-ons whenever new versions become available.

 

What is a plugin?

  • Plugins power videos, animation and games
  • They're built outside of Firefox by companies like Adobe Systems and Apple
  • Plugins don't always update automatically.

 

Why should I update my plugins?

  • Old plugins can interrupt browsing and waste your time.
  • Old plugins increase your risk for attack by malware, viruses, and other security threats.
  • Updated plugins have improvements that make the web better and safer for you.

 

A simple way to check if you always have running the latest plug-ins is visit the Mozilla Plugin Check...