Video Screencast Help
Symantec is excited to announce our NEW blog platform to ensure our customers and partners have access to trustworthy, authoritative information and perspectives on a visually compelling platform.
updated discussion 16 Dec 2017
Dear All,  I have issues about Proxy Service not working on ProxySG S400-20. My customer have changed configuration about Proxy service Explicit HTTP from Intercept to bypass for test something. and after test completed they change config back to same before from bypass to Intercept. after next day they found some client still cannot access to internet have error about proxy service ...
new discussion 16 Dec 2017
Hi All, Please help to see access logging why have authentication fail so much and have error http 407. Client authentication via IWA Realm and computer is join domain. but client normal access to internet but first time access website it so slowly. you can see from attach file. in attach files have access logging and CPL.
new event 15 Dec 2017
WEBINAR: Secrets Revealed: Effective Protection Against Ransomware TIME: 10:00am PT / 1:00pm ET SPEAKERS: Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for ...
updated discussion 15 Dec 2017
Hello, Is it possible to use the API to download the newest client? thanks in advance, Ken
new discussion 15 Dec 2017
Hi,  I Can't access the Management Console of ProxySG even whene recommanded parameters are configured,  I Had this Error whene I try access the Console : RuntimeException : java.lang.ExceptionInitializerError. I get this error in IE and in Mozilla Firefox / The error in the attachement,  Best regards, Saad
updated discussion 16 Dec 2017
Dear All,  I have issues about Proxy Service not working on ProxySG S400-20. My customer have changed configuration about Proxy service Explicit HTTP from Intercept to bypass for test something. and after test completed they change config back to same before from bypass to Intercept. after next day they found some client still cannot access to internet have error about proxy service ...
new discussion 16 Dec 2017
Hi All, Please help to see access logging why have authentication fail so much and have error http 407. Client authentication via IWA Realm and computer is join domain. but client normal access to internet but first time access website it so slowly. you can see from attach file. in attach files have access logging and CPL.
updated discussion 15 Dec 2017
Hello, Is it possible to use the API to download the newest client? thanks in advance, Ken
new discussion 15 Dec 2017
Hi,  I Can't access the Management Console of ProxySG even whene recommanded parameters are configured,  I Had this Error whene I try access the Console : RuntimeException : java.lang.ExceptionInitializerError. I get this error in IE and in Mozilla Firefox / The error in the attachement,  Best regards, Saad
updated article 15 Dec 2017
In this release, we continue to improve SEP Cloud with user experience enhancements and bug fixes. Better support for the latest versions of Mac and iOS. The OS Distribution widget on the Dashboard now correctly handles devices that run macOS High Sierra 10.13 and iOS 10.x, 11. And the filters in the Devices grid now handle macOS High Sierra 10.13 devices correctly. See Viewing OS ...
updated article 15 Dec 2017
Introduction This is the twentieth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. This article was last updated December 2017. I never ...
updated article 13 Dec 2017
In this release, we've made it even easier to manage SEP Cloud. Two-factor authentication for administrators - simple and secure With the flip of a switch, you can now ensure that all of your administrators use two-factor authentication whenever they sign into SEP Cloud. Two-factor authentication keeps unauthorized users out - even if your password is stolen or hacked - because a unique ...
updated article 11 Dec 2017
Here is the step by step process to disable Ultra Surf from being accessed by your clients. To start with, Ultra Surf leaves a finger print that shall be needed by the admin as a constant value. It is very fortunate that the fingerprint is also included when you open the Ultra Surf. Listed below are the different fingerprints for the Ultra Surf variants available in the web namely: 1. ...
updated article 11 Dec 2017
Introduction By popular demand, below is an index of my Connect articles.  Illustrated, semi-formal and mildly amusing, I hope they assist admins and individuals along their neverending quest to find a safe path in this ever more dangerous world.... Security Series The first article, Using SEPM Alerts and Reports to Combat a Malware Outbreak, demonstrated how to use ...
updated article 11 Dec 2017
First of all, We will download the files locally in a windows 7 Machine and later on, we will use the vmss2core tool locally to convert to .DMP file. 1) Download and install vmss2core tool: 1.1 Navigate to https://labs.vmware.com/flings/vmss2core. 1.2 On the left hand side, tick "I have read and agree to the Technical Preview", select vmsscore-vmss2core-sb-8456865 and click the Download ...
updated article 08 Dec 2017
En primer lugar, descargaremos los archivos localmente en una máquina , en este caso Windows 7 y más adelante, usaremos la herramienta vmss2core localmente para convertirla a un archivo .DMP 1) Descargue e instale la herramienta vmss2core: 1.1 Navegue a https://labs.vmware.com/flings/vmss2core 1.2 En el lado izquierdo, marque "He leído y estoy de acuerdo con la Vista previa técnica", ...
updated article 06 Dec 2017
Introduction This is the fifth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. This article was last updated in December 2017. This ...
updated blog entry 06 Dec 2017
Last week, at its annual Security & Risk summit, Gartner, Inc. presented the Top Technologies for Information Security for 2017. At Symantec, we are thrilled to see that once again, browser isolation (also known as remote browser) is featured as a top security technology. “As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from ...
updated blog entry 17 Nov 2017
“I never use Wi-Fi networks, so man in the middle attacks via Wi-Fi are not my problem” told us an executive of a large organization during a demonstration of Symantec’s innovative mobile security solution, Endpoint Protection Mobile (SEP Mobile), formerly Skycure. But is this really the case? Even if you are a cautious user who never connects to public Wi-Fi networks – does it mean you are ...
updated blog entry 17 Nov 2017
In this post and following a responsible and coordinated disclosure with Google, I will share some interesting findings Shahar Areli & I recently came across while looking into the secure separation logic of Android for Work. In fact, Android provides us with two built-in mechanisms that allow maliciously crafted personal apps to silently view, steal and even manipulate content that should be ...
updated blog entry 17 Nov 2017
Introduction This is a follow up to our blog post during RSA, where we explained how a hacker, by combining two features of Android, Accessibility Services and the ability to draw over other apps, may gain control of the mobile device, including acquiring elevated privileges and exposing the content of all apps on the device. With this exploit, a hacker could persistently monitor all of a ...
updated blog entry 17 Nov 2017
Preface This post contains details about a coding pitfall I recently identified in many iOS applications, which we call HTTP Request Hijacking (HRH). Adi Sharabani, CEO of Skycure (now part of Symantec), and I will be presenting the problem, its ramifications, and some fix suggestions to developers later today at RSA Europe (14:10 – 15:00 | Room: G102). If you are an iOS developer in a hurry ...
updated blog entry 17 Nov 2017
Update: After presenting this research at RSA, confirmed on all Android versions through KitKat, it occurred to me that there may be a way to also run this on Android devices running Lollipop. My team was then able to test this and verify that Lollipop is also vulnerable to Accessibility Clickjacking, elevating the total exposure to 95.4% of all Android devices. After reading this blog, ...
updated blog entry 17 Nov 2017
First of all, I am proud and honored to share that Skycure (now part of Symantec) has been selected by leading analyst firm Frost & Sullivan as their Global Company of the Year for Mobile Enterprise Security. We have worked very hard to create the best solution we can, and recognition from this highly respected organization means a lot to us. Frost & Sullivan has issued an official release ...
updated blog entry 17 Nov 2017
[Update 04/28/2015] In the past week, we have been working with Apple security team to complete their testing on the subject and are pleased to inform that Apple has confirmed that iOS 8.3 addresses the “No iOS Zone” vulnerability mentioned below. Users are highly advised to update their iOS to the latest version to avoid exploits related to this vulnerability. In today’s RSA Conference ...
updated download 07 Nov 2017
This guide describes a process to test engine updates and security content before you implement the updates on all client computers. Reference link: http://www.symantec.com/docs/DOC10649
updated download 30 Oct 2017
updated download 30 Oct 2017
updated download 30 Oct 2017
updated download 30 Oct 2017
updated download 28 Sep 2017
This Page has information on AWS Cloud formation Template (CFT) based test drive that can be used by CWP users to validate CWP features. This template automates the creation of instances, subnets, VPC's etc. Multi-tier Organisation Setup ABC Trade Corporation is a leading multi-national company. It has typical N-tier architecture, separating front-end and back-end of the organisation. Each ...
updated download 30 Aug 2017
Symantec DCS Policy Utility v1.0.0.11 For Windows OS (Note .NET Framework 4.5 is required) Designed to help you tune your policy by processing the log files from an Agent. There's a getting started tab that explains the best steps to get the logs and events you need to troubleshoot your policy. The program does not make any changes to the machine or policy. It parses the sisidsevents and ...
new event 15 Dec 2017
WEBINAR: Secrets Revealed: Effective Protection Against Ransomware TIME: 10:00am PT / 1:00pm ET SPEAKERS: Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for ...
updated event 14 Dec 2017
We are excited to invite you to our next Dallas Security User Group meeting on February 8 at the Hockey Hall of Fame in Toronto. The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for ...
updated event 12 Dec 2017
We are excited to invite you to our next Dallas Security User Group meeting on January 18 at Maggiano’s in Plano, TX. The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for ...
new event 08 Dec 2017
Today’s network users demand for speed, flexibility, and a safe operating environment. While many companies offer technologies that can help you achieve your goal of meeting these user demands, but the right technology not only will help you achieve your goals, it also can help to build a more efficient network environment and saves you thousands of dollars while doing it. Come to this ...
new event 08 Dec 2017
We are excited to have you at our next Washington DC User Group meeting on February 22, 2018 at our Symantec office in DC. The agenda includes lunch and an interactive conversation with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. There will also be ...
new event 22 Nov 2017
NetX Information Systems Live Webinar - Nov 7th @ 2pm ET, 1pm CT, (11am PDT)   Simplifying DLP Policy Management and Incident Remediation using ICA     Learn how to simplify DLP policy management and incident remediation using Information Centric Analytics (ICA) from Symantec.     Symantec DLP provides tremendous visibility and the broadest protection across ...
updated event 22 Nov 2017
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Register Today Symantec ...
updated event 22 Nov 2017
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Register ...
updated video 14 Nov 2017
Web Isolation Demo Videos : - Web Isolation Overview - Web Isolation Phishing  - Selective Isolation
new idea 13 Dec 2017
Test
new idea 13 Dec 2017
I am experiencing a couple of issues with alerts since moving to 14.01/14.1, and have these suggestions: 1. In a standard deployment, we can choose to suppress user alerts.  I would like this functionality in the 14.01/14.1 model.  I really don't want my users to be bothered with anything that the Symantec Endpoint generates.  The reality is that users cannot be interrupted or ...
updated idea 06 Dec 2017
Hello, I followed the KB "Tech 241456" to schedule a configuration backup for PacketShaper and upload the backup configuration file to an FTP server but without success. PacketShaper# ftpput Error: There is no command 'ftpput'. Use '?' to see a list of commands. Is it possible to implement this capability for PacketShaper S series? Thanks in advance. Best regards,
new idea 06 Dec 2017
This is not acceptable and manageable even.. dont want to have two AV programs running in all machines. Symantec should prohibit defender for all it's features and components to be primary for all kind of protections available..  Thanks
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
Mithun Sanghavi
1,270
63
SMLatCST
439
1
jjesse
109
24
ℬrίαη
2,983
25

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.