Video Screencast Help
discussion comment 25 Apr 2018
updated discussion 25 Apr 2018
Need CPl policy to block whole subnet excluding few Ips as allowing mulitple url or category
discussion comment 25 Apr 2018
updated discussion 25 Apr 2018
Need CPl policy to block whole subnet excluding few Ips as allowing mulitple url or category
updated article 24 Apr 2018
Written by: Shay Berkovich, Sr. Software Development Engineer Martin Vierula, Sr. Software Development Engineer Summary Drupal is a very popular open source Content Management System installed on many webservers. A recently announced patch for Drupal 7.x and 8.x has been released and drew a lot of attention due to the issue criticality. Soon after the patch, various researchers came up with ...
updated article 18 Apr 2018
Critical Vulnerability in Microsoft Malware Protection Engine Description A vulnerability was reported in Microsoft Windows Defender. A remote user can cause arbitrary code to be executed on the target user’s system. The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft  Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and ...
updated article 18 Apr 2018
The introduction will capture the hearts and imagination of current and future customers and partners. The product description to be used everywhere consistently across all Symantec web properties is presented here. It may be a short statement or a full paragraph, as long as it doesn’t exceed fifty words. Features and Benefits Impressive feature More Impressive feature Grand ...
updated article 18 Apr 2018
The introduction will capture the hearts and imagination of current and future customers and partners. The product description to be used everywhere consistently across all Symantec web properties is presented here. It may be a short statement or a full paragraph, as long as it doesn’t exceed fifty words. Features and Benefits Impressive feature More Impressive feature Grand ...
updated article 18 Apr 2018
The introduction will capture the hearts and imagination of current and future customers and partners. The product description to be used everywhere consistently across all Symantec web properties is presented here. It may be a short statement or a full paragraph, as long as it doesn’t exceed fifty words. Features and Benefits Impressive feature More Impressive feature Grand ...
updated article 18 Apr 2018
The introduction will capture the hearts and imagination of current and future customers and partners. The product description to be used everywhere consistently across all Symantec web properties is presented here. It may be a short statement or a full paragraph, as long as it doesn’t exceed fifty words. Features and Benefits Impressive feature More Impressive feature Grand ...
updated article 18 Apr 2018
The introduction will capture the hearts and imagination of current and future customers and partners. The product description to be used everywhere consistently across all Symantec web properties is presented here. It may be a short statement or a full paragraph, as long as it doesn’t exceed fifty words. Features and Benefits Impressive feature More Impressive feature Grand ...
updated article 18 Apr 2018
The introduction will capture the hearts and imagination of current and future customers and partners. The product description to be used everywhere consistently across all Symantec web properties is presented here. It may be a short statement or a full paragraph, as long as it doesn’t exceed fifty words. Features and Benefits Impressive feature More Impressive feature Grand ...
updated blog entry 18 Apr 2018
Most people today rely on email as their method for business communication – sending and receiving hundreds of emails every day. This dependence on email can create a weak link in securing corporate information and expose a company to attacks. While hackers still use general spam emails and social engineering (or phishing) attacks against organizations, they are now increasingly ...
updated blog entry 10 Apr 2018
This is the third part of a four-part series covering twelve fundamentals for choosing a managed PKI solution, and questions to ask in the buying process. In Part 2, we shared three key differences between DigiCert and other managed public key infrastructure (PKI) providers around administration and deployment. This week, we will discuss four features of Symantec Managed PKI*, Powered by ...
updated blog entry 07 Apr 2018
Over the years I always wondered what all these files in C:\Windows\System32 are doing in my Windows XP. I collected most of them and I added the function to them to keep track of what is going on in Windows. Below you find a part of this list. This list is the work of many people who give this information. I collected them and finally compled them into one list. In the near future I will also ...
updated blog entry 03 Apr 2018
This is the second part of a four-part series covering twelve fundamentals for choosing a managed PKI solution, and questions to ask in the buying process. In Part 1, we shared four key differences between managed public key infrastructure (PKI) providers. This week, we will discuss three features of Symantec Managed PKI Service, Powered by DigiCert®[1], that provide your organization with the ...
updated blog entry 30 Mar 2018
Internet security never looked the same after Netscape Communications created the SSL certificate in 1994. Looking at the Internet’s growing popularity then, it was easy to see it becoming a dangerous medium in not-so-distant future. Developers at Netscape took the cue and started putting in the effort to utilize strong encryption algorithms in the forming of an SSL certificate, to make sure ...
updated blog entry 30 Mar 2018
I hope by now that you are aware that the Certificate Authority/Browser Forum has mandated that Certificate Authorities stop supporting 1024-bit key length RSA certificates for both SSL and code signing by the end of this year (2013). To learn more about these changes please read the CA/Browser Forum’s paper on the Baseline Requirements for the Issuance and Management of Publicly-Trusted ...
updated blog entry 30 Mar 2018
HTTP public key pinning (or just ‘public key pinning’ or HPKP) is a security mechanism designed to improve online privacy. But like other mechanisms, such as Certificate Transparency (CT) and Certification Authority Authorization (CAA) checking, it has its drawbacks. In this article we’ll explain what public key pinning is, discuss its problems, and explain how you can implement it both ...
updated blog entry 30 Mar 2018
Recently, we read about lots of SSL/TLS-related vulnerabilities found in mobile apps, which should come as no surprise. We were warned about this back in 2012 (see my previous blog). More warnings came in 2014 from CERT and FireEye. The Open Web Application Security Project (OWASP) listed “insufficient transport layer protection” as number three in its top 10 list of mobile security problems ...
updated blog entry 30 Mar 2018
The Vulnerability Assessment (VA) scan is a service that each week performs a scan searching for common entry points for the domain you enrolled in for with a purchase of certain SSL certificates.  If the scan finds any potential weakness within that domain that if breached could threaten your online security, an e-mail will be sent out informing the technical contact to pick up the ...
updated blog entry 30 Mar 2018
As I discuss EV SSL with a variety of online businesses, one question I get a lot is about the name that appears adjacent to the address bar in compatible browsers. The question goes something like this, "We do business under the well-known brand of HipCoolStuff, but our company is actually called Old Stodgy Holding Corporation. We don't want the Old Stodgy name on our Web site. Nobody knows ...
updated download 01 Mar 2018
Last Updated: Jan 31 2018 This Page has information on AWS Cloud formation Template (CFT) based test drive that can be used by CWP users to speed up creation of a demo/test stack on AWS. This template automates the creation of instances, subnets, VPC's etc. and documents describe various use cases that can be leveraged for Proof of Concept and validations. Multi-tier Organisation Setup ABC ...
updated download 04 Feb 2018
It will list all machines login to domain and give status of SEP service if installed or is running on login machine.  1. Script is vbs will easily work on any winndows client Windows 7, 8, 8.1, 10  2. It can check any service like Symantec Endpoint Protection, Symantec Altris Client Management Suite or any service you want to track 3. Script will log result centrally at a ...
updated download 23 Jan 2018
The below tool is used to clean unistall the PGP 10.4 agent from laptop which removes the PGP entries from Registry, system 32 & .dll files. This tools clean wipes the files as shown in the below arcticle which is required to completely uninstall the product https://support.symantec.com/en_US/article.TECH225...
updated download 08 Jan 2018
Attached is CCS standard containing fixed checks from CIS Microsoft Windows Server 2012 R2 v2.2.0/v2.2.1: 1.2.3 Is the 'Reset account lockout counter after' parameter set to '15 or more minute(s)'? 18.4.13.1 (18.4.14.1) Is the 'Hardened UNC Paths' parameter set to 'Enabled, with "Require Mutual Authentication" and "Require Integrity" set for all NETLOGON and SYSVOL shares'? 18.9.22.3 ...
updated download 07 Nov 2017
This guide describes a process to test engine updates and security content before you implement the updates on all client computers. Reference link: http://www.symantec.com/docs/DOC10649
updated download 30 Oct 2017
updated event 17 Apr 2018
We are excited to invite you to our next Chicago EPM User Group meeting on May 11. Join Symantec and your peers for conversations around Endpoint Management topics and issues.  The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also ...
new event 16 Apr 2018
Webinar:  Healthcare Cyber Security: Still Playing Catch Up? Speaker: Axel Wirth, Distinguished Technical Architect, Symantec Cybersecurity is earning its seat in the boardroom with so much attention on the impacts and destruction a cyber attack or incident can have on a hospital's bottom line, or even worse, a patient. Yet healthcare providers continue to lag behind other industries when ...
new event 16 Apr 2018
Upcoming Webcast: How to Keep Endpoints Safe and Employees Productive with Application Isolation Date/Time:  May 1, 2018 (10:00 AM PT / 1:00 PM ET) Speakers: Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT ...
new event 13 Apr 2018
Container technologies are still a relatively small part of the overall cloud and application portability market, but that is changing. Use of containers is exploding at an estimated annual growth rate of 40%.​ Containers provide some very compelling benefits especially in terms of speed and cost savings. But, like with any new tool, there are security concerns that must be addressed.​ Join us ...
updated event 13 Apr 2018
Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations. As a result, IT organizations are increasingly ...
updated event 10 Apr 2018
Join Symantec and your peers for conversations around Endpoint/Network Security, Data Protection, and User Management.  The agenda includes lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for ...
updated video 13 Apr 2018
This how-to video covers the upgrade process from Altiris 7.1 to Symantec IT Management Suite 7.5 powered by Altiris technology. Links to learn more: 7.5 Migration and Upgrade landing page 7.5 Presentations and Hands-on Labs from the 7.5 Summit IT Management Suite 7.5 Documentation Migration Guide 7.0 to 7.5 7.5 Installation and Upgrade Guide 7.5 Planning for Implementation Guide
updated video 14 Nov 2017
Web Isolation Demo Videos : - Web Isolation Overview - Web Isolation Phishing  - Selective Isolation
new idea 24 Apr 2018
I would like to request a change in Symantec Endpoint Protection client (SEP) and Symantec Endpoint Protection Manager (SEPM) to allow the Administrator to change the Severity level on Enabled USB devices so that SEP will send a notification back to SEPM that can generate an email alert, similar to the way SEP communicates a DISABLED USB device.  In my production clients, I periodically ...
updated idea 24 Apr 2018
Hello, The click-time URL protection feature has been made avaialble by all leading security vendors on both their hosted (cloud) and on-prem solutions. Although this feature is available in Symantec's cloud-based ATP, it is still not there in the SMG. Noting that we have been using SMG for years now, we would like to see this important security feature in SMG very soon. I would be grateful if ...
updated idea 24 Apr 2018
Implement RFC 7489 (DMARC - Domain-based Message Authentication, Reporting, and Conformance - https://dmarc.org/) in Symantec Messaging Gateway. A DMARC policy allows a sender to indicate that their emails are protected by SPF and/or DKIM, and tells a receiver what to do if neither of those authentication methods passes – such as junk or reject the message. DMARC removes guesswork from ...
updated idea 24 Apr 2018
Please consider adding full DMARC support with new versions of SMG.  SPF & DKIM is only a portion of the capabilities available. 
updated idea 24 Apr 2018
Hi, We need SMG to support the new DMARC security and anti spam feature. I can register my DNS records accordingly thus only partially support this important feature. Curently I'm configured the SMG for SPF and DKIM, OK Current version, 10.6.2 Thanks, Trond Østrådt
updated idea 23 Apr 2018
I have had a few users raise questions about the possibility of including a Delete link in the Spam notification emails that they receive. Is it possible to potentially include this option in a future Symantec Messaging Gateway upgrade? Currently there are the following options available: Include View link Include Release link Users can go in to View when they receive notification ...
new idea 20 Apr 2018
One customer would like to import/move list of SEP clients from CSV file. But not SEPM support only UI to select and move/add fuction options. If we can enhance as the request in further.
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
Mithun Sanghavi
1,279
63
SMLatCST
444
1
jjesse
109
24
ℬrίαη
3,094
25

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.