1. /
  2. Security Response/
  3. Virus Definitions & Security Updates

Virus Definitions & Security Updates

A valid support contract is required to obtain the latest content. To renew your product license, see the License Renewal Center.

File-Based Protection (Traditional Antivirus)

Traditional signature and heuristic file scanning engines form the backbone of Symantec’s security solutions; these engines use dozens of techniques to scan files for both known as well as unknown threats.
  • Definitions Created: 8/26/2014
  • Definitions Released: 8/26/2014
  • Extended Version: 8/26/2014 rev. 37
  • Definitions Version: 160826ak
  • Sequence Number: 156978
  • Number of Signatures: 24,157,209

Network-Based Protection (IPS)

Technologies designed to block attacks just as they transition from the network cable or wireless network to the computer, before they have a chance to establish residency in a physical file on a user’s computer. Also called Network Threat Protection.
  • Definitions Released: 8/27/2014
  • Extended Version: 8/26/2014 rev. 1
  • Download: Definitions  
  • Details:

Behavior-Based Protection

Behavioral-based protection technology observes actively running threats on your computer and can terminate running programs if they exhibit malicious behaviors; this technology provides proactive protection from entirely new, previously unseen attacks. Also called Proactive Threat Protection.
  • Definitions Released: 8/11/2014
  • Extended Version: 8/1/2014 rev. 11
  • Download: Definitions  

Reputation-Based Protection (Insight)

Blocks access to malicious files and websites based on the “crowd-based” wisdom of over 175M+ million customers.
  • Latest Published Content:
  • Download: Content is accessed by your product via the Symantec data cloud.

Other Protection

Other forms of security content necessary to the operation of this product.

Support

Additional information for this product, including links to online forums, can be found in the Support section of our site:

Threat Intelligence

Follow the Threat Intelligence Twitter feed