Video Screencast Help
new discussion 23 Feb 2018
Hello everyone, 1. If in one policy we have added some domains to white-listed, then data going to other than those domains will be quarantine. which is right and working proper 2. If use the white-listed ID along with new ID (which is a not part of White-listed domains), then also the mails is allowed and it is not quarantine. a. is it that if we use white-listed ID in same mail of other ID ...
new discussion 23 Feb 2018
Hello everyone, 1. If in one policy we have added some domains to white-listed, then data going to other than those domains will be quarantine. which is right and working proper 2. If use the white-listed ID along with new ID (which is a not part of White-listed domains), then also the mails is allowed and it is not quarantine. a. is it that if we use white-listed ID in same mail of other ID ...
updated article 20 Feb 2018
SEPM console lists all available SEP client packages ready for deployment. But, at times you may have requirement for older or newer version of client package.  In my case i had a situation, I have SEPM 14 but some aprticular thin client machines  are not having enough resources for SEP 14 client. Thus, I need to get SEP 12 client package for deployment on thin ...
updated article 18 Feb 2018
Hello friends, As a security administrator in my organization I can see a rising trand of JSCoinminer events These events are users surfing to a web page which is infected with a malitious script Unfortunatly you will not know about this at all as the default configuration in the SEPM is to ALLOW and NO LOG This is the event: 15/02/2018 12:42:20 Browser Protection Major and ...
updated article 12 Feb 2018
This is version no.1 (will be updated in the future) I have exported a sanitized(from my organizations data) application control rule which covers most of the malware and ATP detection and protection that I have learned and used. Tested in a large - 5000+ endpoints environment on endpoints and servers ******** You should use this rule as TEST (LOG ONLY) at first - it is important to make ...
updated article 09 Feb 2018
A question from @epkpej was asked on another of my Articles Using the REST Generator (Response Content) in Workflow 7.6 https://www.symantec.com/connect/articles/using-rest-generator-response-content-workflow-76 They wanted to get the "Response Header" from a POST Request. Unfortunately this isn't possible using the REST Generator. It isn't exposed in the components that are generated by ...
updated article 09 Feb 2018
Introduction This is the twentieth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. This article was last updated February 2018. I never ...
updated blog entry 20 Feb 2018
Passwords have been the primary means of verifying user identity since the need to protect data emerged. A growing user population requires access from an array of mobile devices, and the amount of information stored on servers and in the cloud continues to grow, providing more opportunity to conduct business on-the-move. With this increased opportunity comes heightened vulnerability as more ...
updated blog entry 19 Feb 2018
The contents of this article have been archived as all promotions have ended. If you are on GSS 2.x or Deployment Solution 6.9 please contact your local Symantec sales team or partner.
updated blog entry 05 Feb 2018
Do you think your password is unique in the world ?   Please take some minutes to read the The Top 500 Worst Passwords of All Time . Many interesting information are shown in this article, for example do you know that the all time most used password is 123456 ? and the second is (of course) password ?   Here an extract: :  Lists the top 500 worst ...
updated blog entry 02 Jan 2018
I would like to share with you the details of a privacy issue Adi Sharabani and I have recently discovered in LinkedIn’s iOS application, as part of our ongoing mobile security research here at Skycure (now part of Symantec). Adi is going to present the discovery later on today, at the Yuval Ne’eman workshop annual international conference about cyber security; you are welcomed to attend, it ...
updated blog entry 02 Jan 2018
 “I never use Wi-Fi networks, so man in the middle attacks via Wi-Fi are not my problem” told us an executive of a large organization during a demonstration of SEP Mobile’s innovative mobile security solution. But is this really the case? Even if you are a cautious user who never connects to public Wi-Fi networks – does it mean you are safe? Surprisingly, it doesn’t. Our research ...
updated download 04 Feb 2018
It will list all machines login to domain and give status of SEP service if installed or is running on login machine.  1. Script is vbs will easily work on any winndows client Windows 7, 8, 8.1, 10  2. It can check any service like Symantec Endpoint Protection, Symantec Altris Client Management Suite or any service you want to track 3. Script will log result centrally at a ...
updated download 30 Jan 2018
Last Updated: Jan 31 2018 This Page has information on AWS Cloud formation Template (CFT) based test drive that can be used by CWP users to speed up creation of a demo/test stack on AWS. This template automates the creation of instances, subnets, VPC's etc. and documents describe various use cases that can be leveraged for Proof of Concept and validations. Multi-tier Organisation Setup ABC ...
updated download 23 Jan 2018
The below tool is used to clean unistall the PGP 10.4 agent from laptop which removes the PGP entries from Registry, system 32 & .dll files. This tools clean wipes the files as shown in the below arcticle which is required to completely uninstall the product https://support.symantec.com/en_US/article.TECH225...
updated download 08 Jan 2018
Attached is CCS standard containing fixed checks from CIS Microsoft Windows Server 2012 R2 v2.2.0/v2.2.1: 1.2.3 Is the 'Reset account lockout counter after' parameter set to '15 or more minute(s)'? 18.4.13.1 (18.4.14.1) Is the 'Hardened UNC Paths' parameter set to 'Enabled, with "Require Mutual Authentication" and "Require Integrity" set for all NETLOGON and SYSVOL shares'? 18.9.22.3 ...
updated download 07 Nov 2017
This guide describes a process to test engine updates and security content before you implement the updates on all client computers. Reference link: http://www.symantec.com/docs/DOC10649
new event 20 Feb 2018
Many IT Executives are caught between two worlds. Enable the workforce’s productivity, while at the same time keep reducing risk for the organization.  Today’s workplace is experiencing a fundamental shift in how work gets done and as a result, also a shift in how we enforce security policy. Join ITS and Symantec on February 27th for dinner and a discussion around cloud security to ...
updated event 14 Feb 2018
We are excited to invite you to our next Twin Cities DLP User Group meeting on March 6. Join Symantec and your peers for conversations around Data Loss Prevention topics and issues.  The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also ...
updated event 13 Feb 2018
Join Symantec and your peers for conversations around Data Loss Prevention topics.  The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions.
new event 13 Feb 2018
LIVE Web Demo: Simplifying DLP Triage & Remediation with Symantec UEBA Wednesday, February 28 @1:00PM ET Symantec Information Centric Analytics (ICA), powered by Bay Dynamics, simplifies Data Loss Prevention (DLP) programs by providing behavioral analytics to streamline incident triage, remediation, and policy management. Should you have pop windows blocked and the hyperlink above does NOT ...
new event 13 Feb 2018
LIVE Web Demo: Addressing Compromised & Malicious Insider Threats with Symantec UEBA Wednesday, February 14 @1:00PM ET Symantec Information Centric Analytics, powered by Bay Dynamics, integrates and analyzes information from platforms including DLP, endpoint security and CASB, among others, leveraging advanced UEBA to provide unparalleled visibility into emerging cyber breach ...
new event 13 Feb 2018
WEBINAR: How to Tackle Data Protection Risk in time for GDPR Compliance TIME: 10:00 AM PT /1:00 PM ET DATE: March 15, 2018 Leveraging state of the art technology to help you find personal data, spot risky users, and respond to incidents The General Data Protection Regulation (GDPR) sets a new standard in data protection that will impact not just EU, but global organizations. With the GDPR ...
new event 13 Feb 2018
WEBINAR: Understanding and Responding to Fileless Malware Attacks DATE: March 8, 2018 TIME: 10:00 AM PT / 1:00 PM ET Attackers are increasingly using stealthy attacks that exploit common tools and techniques that reside in memory and never touch the disk. This webinar covers the fileless methods targeted attack groups and cybercriminals use and how the capabilities of Symantec Endpoint ...
updated event 13 Feb 2018
WEBINAR: Top 5 Risks of Employee Cloud App Use and Abuse  TIME: 10:00am PT / 1:00pm ET SPEAKER: Martin Johnson, Sr. Director of Outbound Product Management, Cloud, Symantec Cloud app adoption and use is exploding as forward thinking organizations quickly realize the  productivity, collaboration, and cost benefits of migrating to the cloud.  With accelerating cloud adoption ...
new event 08 Feb 2018
Join Symantec and your peers for conversations around Endpoint/Network Security, Data Protection, and User Management.  The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for ...
new event 08 Feb 2018
We are excited to invite you to our next Toronto DLP User Group meeting on May 17. Join Symantec and your peers for conversations around Data Loss Prevention topics and issues.  The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also ...
updated video 14 Nov 2017
Web Isolation Demo Videos : - Web Isolation Overview - Web Isolation Phishing  - Selective Isolation
updated idea 22 Feb 2018
Hello Product Managers/ Team, We have some suggestions like including the .CSV format kind of reports for scheduling from SEP manager console. Can we schedule the .CSV formate for NTP logs to analyze more sophisticated. Which eventually will help us to understand for Support engineers and from client end. 
new idea 21 Feb 2018
Hi, As different as the two products (SEP and DCS) are, It would good to be able to password protect the uninstall of the DCS agent like you can the SEP agent. I know once DCS prevention is enabled the agent cannot be uninstalled but if users have the rights to override the policy then the uninstall becomes available again as it is when the policy is set to monitoring mode. I find ...
new idea 14 Feb 2018
It will be good if we have a report on the serial number of SEP License used for Auditing purpose. In our organisation, we have one SEPM server which is being shared by some department which buy their own SEP License. When the auditor comes to audit the Department SEP license used, at the moment, there are no report to be given to auditor on which license is being used for a particular ...
new idea 13 Feb 2018
SEPM console is a wonderful dashboard for viewing overall security status. This requirment is particular to provide filtering tools to clients tab of SEPM..  Some times we find ourself to track down certain set of clients in group for some action. Times we find difficult to create a set of clients based on multiple parameters. Thus, if we can put filters on columns it will assist us in ...
Member Name
ArticlesSolved
Mithun Sanghavi
1,275
63
SMLatCST
440
1
jjesse
109
24
ℬrίαη
3,046
25

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.