Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Security Community Blog
Showing posts in English
Mithun Sanghavi | 31 Mar 2014 | 4 comments

Symantec Endpoint Protection receives the AV-TEST AWARD FOR BEST PERFORMANCE 2013


Corporate Users (Windows): Symantec Endpoint Protection

The AV-TEST AWARD FOR BEST PERFORMANCE 2013 is presented to the security software that has the least influence upon a system once installed.

The tests that are carried out involve typical activities such as loading websites, downloading software, installing and starting up programs and copying files.

To check the regular test results - http...

Sym_Chris | 27 Mar 2014 | 0 comments

The big issues!

In our last blog, we noted that the most common issue that causes customers to contact support is mail delivery issues. With that in mind, we've prepared a series of videos that we think you'll find useful. They cover how the service works, common delivery issues and how to troubleshoot them.

We hope you find them useful.

Default Chromeless Player
Sym_Chris | 21 Mar 2014 | 0 comments


Welcome to the first of many support blogs! It's been a busy year for everyone, with cloud-based IT solutions continuing to snatch headlines everywhere. We thought it would be a good time to share what we're doing in support.

Top Issues!

Here in support we monitor all of the issues coming through. Two items in particular come up time and time again and they are the most prevalent reasons our customers contact support for 2014 so far.

The first of these is Mail Failures. process literally billions of mail connections each week, so a certain degree of mail failures are to be expected. It might surprise you to learn however, that less than 10% of the mail failures investigated are as a result of the Email Security Service. Most mail failures occur with the sender or recipient.

With that in mind, we always advise our customers to read any bounceback message they receive carefully. We've put...

James Labonte | 19 Mar 2014 | 0 comments

Internet security never looked the same after Netscape Communications created the SSL certificate in 1994. Looking at the Internet’s growing popularity then, it was easy to see it becoming a dangerous medium in not-so-distant future. Developers at Netscape took the cue and started putting in the effort to utilize strong encryption algorithms in the forming of an SSL certificate, to make sure the important data stored on the web is only seen by the intended parties. Thanks to their earnest efforts; today, Secure Socket Layer (SSL) certificates have become an integral element of website security, especially in case of e-commerce and banking websites.


SSL certificates are issued by Certificate Authorities (CAs), who manage security credentials and public keys for the actual message encryption. As Internet users became more aware of Cyber Security, SSL certificates became the most sought after solution to fight cyber crime. And it still is today, when it comes to...

The Conquistador | 14 Mar 2014 | 8 comments

Checklist for scanning suspicious files
1.    Disconnect any drive mappings and check to see if the PC has any shared folders
2.    Stop the shares if they are present, they can be reestablished if necessary after cleanup
3.    Take the PC OFF the network
4.    Check disk space, lack of disk space can cause multiple issues
5.    Check to see if any users have local admin rights, if they do, remove them
6.    Check the “Run” Key in the registry for any suspicious entries (Check on HKEY_LOCAL_MACHINE AND     HKEY_CURRENT_USER
    Delete any suspicious entries from
7.    Check for old windows user profiles, check with...

Steve C Blair | 13 Mar 2014 | 0 comments

Hi all,

The DCS Data Store Security PM core team needs your help to gather some very detailed Data Center information as we work on refining future product features. We have built up a 20 question anonymous survey that we would appreciate your input regardless if you are a current customer or a prospect.

The anonymous survey is on the what/how/when of securing workloads for storage platforms/applications in a Data Center which opened yesterday and close on 26 March 2014. Any SysAdmin/Security Admin should be able to complete this as we are working to understand needs of customers' business for security of storage, and protection from anti-virus and malware in the Enterprise.

Help us define our next-generation Data Center Security Products and have your voice clearly heard. Our Product Management team is conducting an anonymous survey that will take a maximum of 10 minutes to fill out on https://...

SebastianZ | 13 Mar 2014 | 0 comments

Symantec Help (SymHelp) is a diagnostic utility used to help automate support for multiple Symantec products.  SymHelp features a new utility, the Threat Analysis Scan, that can help to identify suspicious files on a system.  This new feature replaces the previously known Load Point Analysis and Power Eraser tools.

Use the Threat Analysis Scan when you believe there might be malware on a system but security software is either unable to detect it or to remediate it. The Threat Analysis Scan can help to identify the following types of malware

  • New variants of existing threats that are not detected by the current definition sets
  • Fake antivirus applications and other rogueware
  • Rootkits
  • System settings that have been tampered with maliciously

Because the Threat Analysis Scan uses aggressive heuristics to detect these threats, there is a risk that...

SebastianZ | 06 Mar 2014 | 2 comments

Symantec has released the newest version of Symantec Protection Engine for NAS and Symantec Protection Engine for Cloud Services

The release build number is

To download this release go to:


Symantec Protection Engine for Cloud Services:



Symantec Protection Engine for NAS:



What's New in Protection Engine for Cloud Services 7.5 and Symantec Protection Engine for NAS 7.5


  • New...
Sara Pan | 03 Mar 2014 | 2 comments

We have an important update to share with you regarding Symantec Network Access Control. At Symantec, we actively monitor security threats and trends in the industry, and after careful review and consideration, we have made the decision to End of Life (EOL) Symantec Network Access Control. The growth of Bring Your Own Device (BYOD) and the integration of access control technology into networking devices offered by most network hardware vendors have reduced the need for standalone NAC solutions. The discontinuation of Symantec Network Access Control will free up valuable resources to focus on our endpoint security offerings, including advanced threat protection and protection from newer security risks that impact your enterprise today.

Moving forward, Host Integrity, a feature of Symantec Network Access Control, will be integrated into a future release of Symantec Endpoint Protection (SEP). Customers who have SEP entitlement can continue to use the Host Integrity feature....

Chip Epps | 03 Mar 2014 | 0 comments

Virtualization and “software defined” initiatives have shifted how we look at security controls. Let’s take a look at some of the factors to consider in designing security controls for a software defined data center (SDDC). To this end, Symantec has introduced a suite of data center security products:

  • Symantec Data Center Security: Server, and
  • Symantec Data Center Security: Server Advanced


Key Challenges:

Security has often leveraged or worked within “physical” boundaries, e.g. a single task server with fixed resources (CPU, memory, disk space). Administrators could easily associate a piece of hardware, in location X, with a particular set of applications or services. With abstraction and the advancement of virtualization comes the transition...