Video Screencast Help
updated discussion 20 Oct 2017
Due to the SHA-1 deprecation, we ordered replacement certificates for our web server, however it only partially helped. The site is still showing warnings about weak signature algorithm on Intermediate certificate. In IIS 7, how do we make sure only the correct Intermediate SSL cert is applied and working and others are disabled? I tried removing the cert, but the certificate chain was ...
updated discussion 20 Oct 2017
Due to the SHA-1 deprecation, we ordered replacement certificates for our web server, however it only partially helped. The site is still showing warnings about weak signature algorithm on Intermediate certificate. In IIS 7, how do we make sure only the correct Intermediate SSL cert is applied and working and others are disabled? I tried removing the cert, but the certificate chain was ...
updated discussion 20 Oct 2017
I am beginning a roll-out of Symantec Endpoint Protection Cloud at our company.  I evaluated the software on my work Windows 10 box with no issues.  I have started rolling out the install to our employees, and made some tweaks to the security policy (password complexity and minimum PW length).  Now, my Windows 10 PC is giving my an 'At Risk' message, with 'Device does not comply ...
updated article 20 Oct 2017
The security documentation provided by WordPress and found online for plugin security is sparse, outdated or unclear. This cheat sheet is intended for Penetration Testers who audit WordPress plugins or developers who wish to audit their own WordPress plugins. This cheat sheet can be effectively used to test various WordPress plugins. Cross-Site Scripting (XSS) Check if the following global PHP ...
updated article 17 Oct 2017
Introduction This is the sixth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. This new "Symantec Insider Tip" article aims to provide advice and ...
updated article 11 Oct 2017
GDPR: How prepared are you for May 2018? And what’s likely to happen if your business is not compliant By Robert Arandjelovic, EMEA Director of Security Strategy, Symantec Symantec recently hosted a live panel to help organisations get ready for the imminent GDPR. With contributions lawyer firm White & Case, Mandiant, Commvault and Symantec one issue rang out particularly strongly to me: is ...
updated article 11 Oct 2017
First confirmed in Japan in December of 2016, the DreamBot Trojan infected computers and tricked victims into giving up their credentials and one-time passcode, which a criminal group used to siphon off funds. By the time Japan’s Metropolitan Police Department announced, on October 5, 2017, that it had exposed the criminals, the group had pilfered a staggering 240 million yen (approximately ...
updated article 10 Oct 2017
SysAdmin Day is an annual event celebrated on the last Friday in July and exists to show appreciation for the work of Sys Admins and other IT workers. Your network is secure, your computer is up and running, and your printer is jam-free. Why? Because you’ve got an awesome sysadmin (or maybe a whole IT department) keeping your business up and running. So say IT loud; say IT proud … But it's not ...
updated blog entry 20 Oct 2017
Hackers continue to show endless ingenuity in penetrating corporate networks. In fact, some recent malware attacks made headlines by crippling corporations, robbing shareholders, and damaging the credit of thousands of consumers. These attacks make it clear that cybercriminals continue to evolve, creating threats that can bypass the security defenses of many organizations. Some advanced ...
updated blog entry 20 Oct 2017
Website identity is important for user safety. While encryption is important, knowing who you are encrypting to is paramount when conducting online transactions. While many users can identify the green bar/lettering associated with an Extended Validation (EV) certificate, recent user interface (UI) changes by browsers make it more difficult to differentiate these certificates from low value, ...
updated blog entry 20 Oct 2017
このブログではウェブサイトやその上で動作しているウェブアプリケーションの脆弱性について紹介すると共に注意喚起をする目的でまとめられています。 今回は、最近著名CMSの脆弱性として情報漏えいを起こした原因としてニュースをにぎわしており、Webアプリケーションの脆弱性の中でも最も危険度の高いOSコマンドインジェクションについて解説をしています。 ※なお、内容に関しましてはHASHコンサルティング株式会社の徳丸 浩様に監修いただいています。 +++++++++++++++++++++++++++++++++++++++++++++++ OSコマンドインジェクション脆弱性(CWE-78) ■概要 Webアプリケーションの中には、機能の実現のために外部コマンドを呼び出すものがあります。また、多くのアプリケーションでは、メール送信の機能をsendmailコマンドの呼び出しで実現し、外部か ...
updated blog entry 20 Oct 2017
In connection with the statement posted to Symantec’s Blog on March 24, 2017, Symantec has been reaching out to its customers.  The text of our most recent customer communication is below:  ******************************************  It's important that we keep the lines of communication open with you as we continue to deliberate possible changes to how we support your website ...
updated blog entry 20 Oct 2017
The CA/Browser Forum is an unincorporated association of separate organizations that creates the guidelines that apply to all SSL certificate and browser providers. Since the effected date of 1 July 2012 Symantec has been notifying customers in regards to certificates with a SAN or Common Name (CN) field that contains a Reserved IP Address or Internal Server Name since they are being ...
updated blog entry 20 Oct 2017
Symantec Identity: Access Manager (SAM) now supports VIP Push and will soon support VIP Login. VIP Push When we introduced VIP Access Push we told you how much more convenient it is – you automatically receive a Push verification to your registered mobile device upon sign-in, replacing the need for you to manually enter a security code – it’s just a push of a button.  We’ve now taken it ...
updated blog entry 20 Oct 2017
Since its founding, Symantec has been dedicated to security.  That is our raison d’etre. As such, we continually collaborate across the industry to update standards, making them more secure and harder to hack or fake. That is why the CA/Browser Forum determined that Certification Authorities must not issue public SHA-1 TLS certificates after December 31, 2015. While this directive is an ...
updated blog entry 20 Oct 2017
Your database has been breached, malware has infected your systems and sensitive records are available for anyone to download on the internet. Your first action is to launch an investigation to find out more about the breach. The report shows that the vulnerability has been exploited for months and all forensic logs have been deleted.       SQL injection isn’t new ...
updated blog entry 20 Oct 2017
We take our role as a key player in the trust ecosystem of the Internet very seriously. We believe that secure and compliant issuance of SSL/TLS certificates is fundamental to the security of the Internet and that we have a responsibility to collaborate with our customers and the broader community to continuously improve industry standards, and specifically our practices, for certificate ...
updated download 28 Sep 2017
This Page has information on AWS Cloud formation Template (CFT) based test drive that can be used by CWP users to validate CWP features. This template automates the creation of instances, subnets, VPC's etc. Multi-tier Organisation Setup ABC Trade Corporation is a leading multi-national company. It has typical N-tier architecture, separating front-end and back-end of the organisation. Each ...
updated download 30 Aug 2017
Symantec DCS Policy Utility v1.0.0.11 For Windows OS (Note .NET Framework 4.5 is required) Designed to help you tune your policy by processing the log files from an Agent. There's a getting started tab that explains the best steps to get the logs and events you need to troubleshoot your policy. The program does not make any changes to the machine or policy. It parses the sisidsevents and ...
updated download 16 Aug 2017
Attached html code of custom block page and below is screenshot of block page, Follow KB article to apply on ProxySG.
updated download 08 Jul 2017
This application control rule prevents process from using *vssadmin.exe to delete shadow copies blocks vssadmin.exe with the folowing argument: .*delete[^\]*shadows[^\]*\/all[^\]*\/quiet.*
updated download 08 Jul 2017
This rule prevents from different malicious activity: * OFFICE, ADOBE, CSCRIPT, WSCRIPT and BROWSERS products from launching CMD or POWERSHELL * scripts from accessing DOCUMENTS (ransomeware protection)
updated download 03 Jul 2017
This application control rule is protecting you from: Adobe products running powershell Office products running cmd or powershell CMD from running powershell or VB scripts VB script from using documents on pc cscript or wscript from running powershell or cmd
updated event 18 Oct 2017
Please join us for a special combined New York DLP & Security User Group meeting on November 2! We are happy to announce this meeting will serve as the official launch of Symantec DLP 15 and Control Compliance Suite 12.0! Come ready to learn about these exciting new releases and rub elbows with experts in your field! Lunch will be served, so come hungry as well. We hope to see you ...
updated event 17 Oct 2017
Please join us for the next Cleveland User Group meeting on October 18th, 2017 from 9:00-1:00 (341 White Pond Rd, Akron). We will be in the Hub area on the second floor (room 215). Come ready to rub elbows with experts in your field! Breakfast and lunch will be served, so come hungry as well. We hope to see you there! Agenda: Symantec Strategy – How application isolation changes ...
new event 12 Oct 2017
WEBINAR: Learn How Proxy Plays A Critical Role in Protecting Your Enterprise TIME: 10:00am PT / 1:00pm ET SPEAKER: Timothy Chiu, Sr. Director of Product Marketing, Symantec Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and ...
new event 09 Oct 2017
WEBINAR: Addressing The Security Challenges of the Cloud Generation TIME: 9:00am PT / 12:00pm ET SPEAKER: Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk. Distributed environments—like mobile and distributed ...
new event 09 Oct 2017
WEBINAR: Protecting Critical Infrastructure from Cyber Threats TIME: 10:00am PT / 1:00pm ET SPEAKER: Kunal Agarwal, GM Internet of Things, Symantec The systems that connect our lives like financial institutions, and transportation - are all dependent upon the internet. Building resilience in critical infrastructure is crucial to our national security.  Join us as we ...
new event 09 Oct 2017
WEBINAR: The Digital Workforce wants YOU: Consider a Career in Cybersecurity TIME: 10:00am PT / 1:00pm ET SPEAKER: Patrick G. Cohen, VP, Strategic Partnership from NPower Inc. According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers.   Key influencers like teachers, parents, state and ...
updated event 06 Oct 2017
***REGISTRATION IS FULL AT THIS TIME. WE HOPE TO SEE YOU AT OUR NEXT EVENT*** Please join us for the next London DLP User Group meeting on Tuesday 10th October from 09:30 – 17:00 at the KPMG offices. Come ready to rub elbows with experts in your field! Lunch will be served with refreshments in the morning and afternoon as well. Please register or log in to Connect to signup for this event. ...
new video 24 Jul 2017
A how-to video that guides you through the steps necessary to establish content classification in Box for CloudSOC content.
new video 07 Jul 2017
We had SEPM 12.1 MP 7 running on SQL 2008, in order to upgrade to SEPM 14, we had to upgrade to SQL 2016 first then repoint the application to the new database then SEPM to 14.  For this, we created a lab and demonstrated this step by step via the video.  Sharing as it may help others. [connect_embed_youtube:cTRpU0NzkZ8]
new idea 19 Oct 2017
I put in a ticket with Symantec Support and they suggested I post here.  Currently, Risk Outbreak Notifications can only be configured to notify for all risks or a specific risks.  We can either use * for all risks or type the risk name.  Rather than specify the risk name, we would like to get a notification for any unspecified virus that reoccurs.    When using the * ...
new idea 17 Oct 2017
The console time out is anoying when using for monitoring dashboard on video wall. This get time out every 60 minutes. Since reporting console doesn't have management capablity, why we are not thinking to customize the timeout period. Better if this can be added with individual user account, where administrator reseve right to provide reporting console timeout duration based on ...
new idea 17 Oct 2017
You have to implement import/export hardware devices in SEP Manager [Policies > Policy Components > Hardware Devices].  
new idea 12 Oct 2017
Problem: When we proceed to mass client updates deployement we choose, in the Clients - Install Packages view, to add a new package the problem is that the default Security features and the Default installation settings are not the ones that we chose in our environement and we always have to choos ours from the drop down list. That led, recently, to an unwanted Servers reboot because of the ...
new idea 11 Oct 2017
When creating a HI Policy to check and download latest definitions, have the policy check to see if the definitions are available at the site. This requires the site to have either a script to download the files or the intelligent update available to download.
new idea 11 Oct 2017
Hello All, Is it possible to improve the schedule report tab by providing an option to Schedule .CSV file format. Thanks & Regard syed valiulla
new idea 11 Oct 2017
Alert Rules should be configurable to email alerts to not only the System Administrator, but also the device user/owner.  It is important that the device owner knows of specific conditions on their device.   Currently, the Alert Rules only allow for hard coded email addresses.  The rules should also include a replacement variable for the device user/owner so that they will ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
Mithun Sanghavi

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.