Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Community Blog
Showing posts in English
Sym_Chris | 25 Jun 2014 | 0 comments

Here in Symantec.cloud support, we speak to a lot of customers. We handle over 18 thousand client communications a month, via telephone, email, and online chat. It’s no wonder then, that we spend a lot of time looking at all our support data to ensure we do the right thing for you, the client.

One of the things we’ve found is that 1 in 4 support cases are not technical issues, but informational ones. Symantec.cloud put the technical folk right on the end of the phone to give you the best possible help and support. With that in mind, you may sometimes find it more convenient to use some of our other resources;

Online Help:

https://help.symanteccloud.com/Symhelp/Home.aspx/Default

Online Help has been created with set up and configuration in mind. If you are a new administrator or just need a reminder of how things work, there is no better place to learn how to get the...

Stephen Heider | 21 Jun 2014 | 0 comments

The following important changes are being made to the Symantec Data Loss Prevention (DLP) and Data Insight (DI) Knowledgebase.

The content for both products is moving to a new location, to the same Technical Support Knowledge Base for other Symantec products.

Please note:

linda_park | 17 Jun 2014 | 2 comments

Organizations are spending more on security and believe they’re adequately protected, yet data breaches continue to impact consumers, businesses and governments – the number of breaches jumped 62 percent in 2013. Overworked and understaffed, security teams are stitching together “good enough” security point products that weren’t designed to work together. Not only does this make you more vulnerable to breaches, but it also increases operational complexity.

Symantec Data Loss Prevention 12.5 introduces new features that give you greater control over your confidential data and simplify the management of DLP including:

  1. NEW! Single Server Installation support enables you to deploy the DLP detection servers, Enforce Platform, and Oracle database on a single physical server for branch offices or small organizations (1,000 users or less), and lowers hardware and maintenance costs.
  2. NEW! Self-Service Remediation...
srolleycsc | 13 Jun 2014 | 0 comments

Ive just come off 'Gigya's' latest Webinar about the power of social login for marketing.  You know, when you go to a website and your asked to create an account but you also have the option to simply join by using your facebook account.  Well there is a big problem with this and its not going to be long before hackers are all over it.  People dont realise that when they hit the 'login with facebook' account of whats actually happening and even for a professional its difficult to determine.

 

The issue is that the social login window is often sized very small and is not sizeable and you cant see the address its pointing at, so it might offer a fake one first, collect your login and password, say there was an error and ask you to try again, then offer you the real one and let you in so you dont think youve been conned.  People do this dozens of times per week and just trust that the little box is really connecting to facebook.  Invariably...

jjesse | 12 Jun 2014 | 0 comments

Symantec Data Insight (DI) can help customers who struggle with identifying data users and owners for their unstructured data.  DI helps a customer answer the following questions:

  1. Who owns the data?
  2. Who is responsible for remediation of that data?
  3. Who has seen the data?
  4. Who has access to the data?
  5. What data is most at-risk?

 

 

So what's new in Data Insight 4.5?  Here are 4.5 (get it?) awesome things about this release:

 

  1. Self-service portal to make remediation easier:  A portal that allows data owners and/or custodians of data to be able to remediate items directly potentially without the need for IT Security.  Actions can come from either the Data Loss Prevention (DLP) Portal or from Data Insight Management Server depending on the workflow.  

            A customer can create...

Wui Wui Yu | 03 Jun 2014 | 0 comments

On 28 May 2014, 56 security professionals from the public and private sectors took up the Cyber Readiness Challenge in Malaysia.

The exciting four-hour interactive competition to capture the most flags provides a rare opportunity for the participants to put their security knowledge in action, sharpen their skills and compete against their peers through a cyber game.

Here are some photos of the participants in action during the intense competition:

CRC Malaysia - 1.png

The inaugural competition in Malaysia is designed for all levels of technical expertise and puts participants in the role of a cyber attacker seeking to infiltrate and exploit an organisation. It consists of a five-step Advanced Persistent Threat (APT) scenario which include reconnaissance, incursion, discovery, capture and exfiltration.

"The competition helps participants to understand the...

The Conquistador | 22 May 2014 | 0 comments

Every now and then I come across infections that are not picked up by SEP, or they happen to be picked up by SEP, but they only register "newly infected" or "Still infected"
The worst thing about these types of infections is there is not much on the surface. Some malware will stand out at you and pretty much tell you, "HEY YOU ARE INFECTED" by running it's own "level of protection" This will prevent you from running other programs or even accessing the internet to get files that can be beneficial in cleaning out this mess.

I have noticed that whenever things like this occur, I have to either google and/or download different parts of programs even though I already have an AV Program installed. One of the things I do is download MalwareBytes Anti Malware and the Norton Power eraser. These have been the two most powerful tools I have had in cleaning up infected files.
Once run, I am able to make great progress and get a PC/Server back on track....

Chetan Savade | 21 May 2014 | 1 comment

Hi,

PowerShell script to validate that all machines in your OU have Symantec Endpoint Protection (SEP) anti-virus client installed and started. Generates a color-coded Excel report highlighting problematic nodes.

Refer this link and download the script from here: http://gallery.technet.microsoft.com/scriptcenter/Symantec-Endpoint-8e47c450

Reference link: http://www.reddit.com/r/sysadmin/comments/25mtye/finding_symantec_endpoint_clients_on_network/

Note: This method is not supported by Symantec. Symantec recommends to use unmanaged detector.

Tim G. | 19 May 2014 | 0 comments

So I was reading this article earlier and I had some thoughts come to mind here.  I was going to share them on my LinkedIn account, but felt that this was not going to be a short update, nor would it be a "final thought" as I would like to have something with a little more meat and feedback to it.

So here goes.

In the article the author calls out some pretty interesting stats associated with credit card breaches, PII losses and the like.  None of these details should be news to you if you follow any of Symantec's reports like the ISTR or any other of our joint reports or other industry bodies’ reports for that matter. 

These reports will show you big numbers, which really show just how prevalent and dangerous all of this is.  And to be quite...

nisharamach | 18 May 2014 | 0 comments

Join Symantec Security Response expert, Kevin Haley, for a Tweet Chat on Friday, May 23 at 11 a.m. PT / 2 p.m. ET to talk about  key trends highlighted in Symantec’s recent Internet Security Threat Report (ISTR), Volume 19.

The ISTR, which covers the major threat trends observed by Symantec in 2013, highlights how cybercriminals unleashed the most damaging series of cyberattacks in history – ushering in the era of the “Mega Breach.”

How do these breaches impact you and your company? Find out. Mark your calendars to join the #ISTRTALK chat and plan to discuss the latest attack vectors and techniques used by cybercriminals to gain access to your data.

Topic: Internet Security Threat Report: Volume 19 – What are the odds of your company getting attacked?

Date: Friday May 23, 2014

Time: Starts...