Video Screencast Help
We've launched some major improvements to the interface and community structure. Learn about them here!
updated blog entry 28 Apr 2017
It's a familiar refrain: Cloud services and mobile devices have made the challenges of safeguarding company data even more acute. Sensitive information now travels far beyond the relative safety of in-house networks into consumer cloud storage services where it's accessed by employees using unsecured mobile devices. Yet while these risks are well understood, the number of data breaches ...
new discussion 28 Apr 2017
I would like to know when Symantec has definitions to detect TA17-117A Intrusions Affecting Multiple Victims Across Multiple Sectors (https://www.us-cert.gov/ncas/alerts/TA17-117A ) and then the corresponding definition versions, which will detect this threat. Thanks, Scott
updated article 26 Apr 2017
Blacklisting and White listing domains in Symantec Messaging Gateway 10x: 1. Log On to Symantec Messaging Gateway. 2.1 Blacklisting a domain: (a)    Go To Reputation> Policies> Bad Senders. (b)    Edit the Local Bad Sender Domains. (c)    In the Local Bad Sender Domains, Click on Add. (d)    There you may add the ...
updated article 25 Apr 2017
Is it possible to monitor specific progress status with Host Integrity (HI) policy in endpoint protection? The answer is yes. Here is a simple example of how to set the requirement in HI policy. Details steps as below: 1. Edit HI policy--> click Requirements--> click "add" button--> select client platform: Windows and select "Custom requirement", click Ok: 2. On the custom requirement ...
updated article 19 Apr 2017
In this article, a brief description is given about how to create a custom content filtering policy in Symantec Messaging Gateway. The steps are as below: Log in the Symantec Messaging Gateway GUI Console                         Open a Browser> Type https://FQDN(for eg: ...
new article 17 Apr 2017
Hi All, As I shared the little research, history and different ways how ransomware propagates into the network and system, now this article will be focused on prevention methodology which is prepared after referring many security sources like Symantec security resource, McAfee, TrendMicro etc. The best part of this article is I am also contributing by sharing my own best ideas to deal ...
updated blog entry 28 Apr 2017
It's a familiar refrain: Cloud services and mobile devices have made the challenges of safeguarding company data even more acute. Sensitive information now travels far beyond the relative safety of in-house networks into consumer cloud storage services where it's accessed by employees using unsecured mobile devices. Yet while these risks are well understood, the number of data breaches ...
updated blog entry 27 Apr 2017
Note: The following blog post was migrated from the Elastica/Blue Coat website. It was first published on 4/10/2016. Overview: Ransomware poses an increasing risk to businesses. Though it has been around for the past several years, the frequency of attacks has increased significantly in recent months. The distribution mechanisms have become more advanced as attackers have begun using ...
updated blog entry 27 Apr 2017
  Note: The following blog post was migrated from the Elastica/Blue Coat website. It was first published on 6/06/2016. Increasingly, cloud storage apps are used to host malware that enables hackers to conduct drive-by download attacks on the fly. The malware hosting URL (publicly available and exposed) is distributed as a part of phishing campaigns or via other third-party cloud ...
updated blog entry 27 Apr 2017
    Note: The following blog post was migrated from the Elastica/Blue Coat website. It was first published on 3/30/2016. Overview: In this blog post, we discuss the latest ransomware known as Petya. We are not presenting the technical analysis of this ransomware but are focusing on how cybercriminals abuse the function of the Dropbox cloud app to deliver Petya to ...
updated blog entry 27 Apr 2017
  Note: The following blog post was migrated from the Elastica/Blue Coat website. It was first published on 10/19/2015. InfoSecurity Magazine published an article authored by Elastica Cloud Threat Labs on the potential threats residing in cloud applications, including the risks posed by malicious insiders, employee error, and external attackers. The article discusses the root ...
updated download 24 Apr 2017
Symantec DCS Policy Utility v1.0.0.11 For Windows OS (Note .NET Framework 4.5 is required) Designed to help you tune your policy by processing the log files from an Agent. There's a getting started tab that explains the best steps to get the logs and events you need to troubleshoot your policy. The program does not make any changes to the machine or policy. It parses the sisidsevents and ...
updated download 17 Apr 2017
The database space reclamation utility lets you reclaim unused incident LOB space in your Symantec Data Loss Prevention Oracle 11g Standard database. This can use the database space reclamation utility after migrating incident attachments to external storage, or after deleting a large number of incidents.
updated event 27 Apr 2017
Please join us for 1.5 days of exclusive training on Symantec Control Compliance Suite on May 16-17 in Chicago.  This FREE technical workshop will include deep dives on a range of topics such as: Best practices for deployment, configuration, scalability, and troubleshooting Vulnerability management Control Compliance Suite platform generic collector and script engine Check ...
new event 26 Apr 2017
WEBINAR: 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape TIME: 10:00 AM (PST) / 1:00 PM (EST) DATE: May 16, 2017 SPEAKER: Kevin Haley, Director of Product Management for Symantec Security Technology and Response 2016 saw major shifts in techniques used by targeted attackers, the continued rise of ransomware and significant attacks from IoT ...
updated event 25 Apr 2017
The Symantec Data Loss Prevention 14.5: Administration course isdesigned toprovideyouwiththefundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for configuring Enforce server, detection servers, and DLP Agents as w ell as reporting, w orkflow , incident response management, policy management and ...
new event 25 Apr 2017
The Symantec Data Loss Prevention 14.5: Administration course isdesigned toprovideyouwiththefundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs include exercises for configuring Enforce server, detection servers, and DLP Agents as w ell as reporting, w orkflow , incident response management, policy management and ...
new event 25 Apr 2017
The Symantec Data Center Security: Server Advanced 6.7 course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. The architecture and individual components of the SDCS:SA 6.0 solution are detailed and explained. Agent installation and configuration are taught along with deployment and management of SDCS:SA agents and policies across ...
new event 25 Apr 2017
The Symantec Endpoint Protection 14.x: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. This class brings context and examples of attacks and tools used by ...
new event 25 Apr 2017
The Symantec Endpoint Protection 14.x: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. This class brings context and examples of attacks and tools used by ...
new event 25 Apr 2017
Language: Spanish The Symantec Endpoint Protection 14.x: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. This class brings context and examples of attacks and tools used ...
updated event 25 Apr 2017
The Symantec Endpoint Protection 14.x: Manage and Administer course is designed for the network, IT security, and systems administration professional in a Security Operations position tasked with the day-to-day operation of the SEPM management console. The class covers configuring sever-client communication, domains, groups, and locations and Active Directory integration. You also ...
new event 25 Apr 2017
The Symantec Endpoint Protection 14.x: Configure and Protect course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. This class brings context and examples of attacks and tools used by ...
new video 27 Apr 2017
This video forms part of a series which describes the actions administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video focuses on creating the correct user permissions in the ClientNet portal to ensure that the quarantine administrator may take all necessary actions.
new video 27 Apr 2017
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video looks at the Quarantine portal and some of the more common actions that administrators may wish to take, such as customizing the Email Notifications that are generated to end ...
new video 27 Apr 2017
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video looks at the Quarantine options in ClientNet itself and the various options available for quarantine administrators to configure.
updated video 27 Apr 2017
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Secrurity.cloud service. In this video you will be walked through how to turn on quarantine settings for the services that are included in your bundle: either Anti-Spam only, or Anti-Spam, Data Protection ...
updated video 10 Feb 2017
The world is changing. We are entering another era of IT, where enterprises are experiencing a fundamental shift in the way their workforce consumes technology. Personally owned devices ubiquitously connected in today’s world, are giving way to cloud-based applications and repositories in almost every region and vertical. The shift of workloads to cloud applications such as Office365, Google ...
new idea 27 Apr 2017
Knowing the limitations of the Oracle Server, especially on the space compaction/release front - it would make a great feature if DLP could be installed on SQL
new idea 27 Apr 2017
In order to see what Response Rules are applied to a specific policy, you are required to either (a) open each policy, click on the response tab or (b) get into each response rule and see which policies are setup to use 'this' response rule. It would be a great feature, if we can see the response rules part of the main policies page (under Manage, Policies & Policy List). There are some ...
new idea 25 Apr 2017
Currently 'Disable clickable URLs in Message' supports whitelisting of exceptions. If an email contains multiple domain URLs and one domain is matched as exception, all the domain URLs in the email is excepted from _noclick. It would be more secure if only the domains matching were whitelisted and non-matching domains would be changed with adding _noclick.
updated idea 19 Apr 2017
Symantec Endpoint 14.0 is not able to block bluetooth transfer files, and allow bluetooth mouse/keyboard The possibility of restricting the pairing apart from the Mouse and Keyboard but its not feasible with Symantec Endpoint Protection. Based on the input given to Symantec Endpoint there is not way to make this possible as it works based on class and device ID. It's a loop hole in the ...
new idea 19 Apr 2017
During some recent work we highlighted when trying to add an exception from the monitors window that we had numerous duplicate policies and it turned out this was because there were non-shared policies with the same name as a shared policy. As there was no way to distinguish between these I suggest putting a marker against these to identify them as shared or non-shared, and perhaps even a link ...
new idea 12 Apr 2017
We would like to have the ability to add an application exception based on the applications SEP finds under Policies>Tasks>Search for applications. Currently, if we try to add an application exception from the exceptions screen, it pulls up a list of learned applications that is completely different than the ones found under Policies>tasks>search. It would be nice, since SEP already knows ...
updated idea 11 Apr 2017
Symantec Endpoint Encryption 11.1.0 product does not provide the option to manually delete the entries of the machines which are decypted in console. Automatically entries of decrypted machines are not deleted. The machine entries still remains in the console even after decrypting the machine. This creates an problem while fetching reports of encrypted/decrypted machines in ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
Mithun Sanghavi
1,266
60
SMLatCST
434
1
jjesse
107
24
ℬrίαη
2,735
21

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.