Video Screencast Help
new event 19 Feb 2019
NetX has been a Symantec Authorized Training Partner for over 15 years. We deliver Instructor-led Training Classes with Instructors that are engineers that have real-world experience that you may use in your organization. The courses are available both virtual and on-site.  We offer over 20 different Symantec Classes. Please review our complete list of authorized training ...
updated event 19 Feb 2019
Join us for the kickoff to our newly formalized Chicago SEP user group! Come ready to eat, drink, and mingle with fellow SEP users as we gear up for the year ahead while watching the March Madness game. Space is limited, so be sure to register early! Also, be sure to register here for the first official meeting on April 25, 2019. **YOU WILL NEED TO LOG INTO CONNECT BY CLICKING "LOG ...
updated idea 19 Feb 2019
As per your own support article (https://www.symantec.com/theme/sha2-transition) you understand that SHA-1 algorithms are not secure. Please update the certs in Symantec Endpoint Manager to SHA-2 in your next release. (Note: I undertsand that this process can currently be done by a system administrator, but the current documentation, is very general and not specific about the process. I have ...
updated idea 19 Feb 2019
Can ISV application whitelisting be based on certificate? Other AV software vendors have this ability and it would reduce the submissions for whitelisting.
updated idea 19 Feb 2019
When a certiifcate request is generated by SMG, it doesn't allow for a FQDN in the Subject Alternative Name. When a certificate is used by an internal CA it is not trusted by Chrome version 58 or higher. The work around is to make Chrome ignore this security feature, meaning Chrome is less secure that it could be. In Chrome 58 if you get the error NET::ERR_CERT_COMMON_NAME_INVALID you need to ...
updated idea 19 Feb 2019
Hello Team, Abhishek from IBM . we have been struggling with this issues for quite long time. We get the malicious hashes on daily bases and need to manually add on Symantec ATP. This is very critical project and need to blacklist more than 1000 or more hashes on daily basis. I have been told, same will be fixed in next release of ATP, but still it is not done. There are multiple hashes which ...
updated discussion 19 Feb 2019
I'm new to DLP so I'm sorry if this is an obvious solution. How would one go about making a DCM policy that detects when the word "Top Secret Document" is detected if it's spelled in a similar fashion to "70P S3cre37" or "Topsec retdocum ent"?
updated article 19 Feb 2019
    Good evening community in the most recent article I made a focused emphasis of what is SQL Server, its functions, advantages, disadvantages, common mistakes and how to correct some problems that are presented now in this article will talk about a topic related to the comparison between SQL Server and Oracle are both recognized in the market for their functions and for the final ...
updated article 19 Feb 2019
    Happy evening community is approaching another day full of challenges and I want to take this article to talk a little about what Oracle is in the previous article talk about the comparison between SQL Server and Oracle as well as the caraceristicas and disadvantages.     Now let's define what Oracle is and its functions.             ...
updated article 19 Feb 2019
The Context When performing a DLP installation, there is a point in which two (or more, depending on installation tiers) .msi files must be executed to install the server JRE and Detection Server. This then involves inputting the required information through the wizard for each file before moving on with the installation. This is what the directory  for a Detection Server upgrade looks ...
updated article 19 Feb 2019
  The Context Continuing the journey of mapping out DLP and its relationship to the Oracle database it sits on, we today look at how the server settings can be viewed and updated (if needed) in the database. As usual, the full query is at the bottom, and we break it down step by step throughout the article. While working on a larger project that involves optimising DLP, I discovered ...
updated article 18 Feb 2019
    Happy community week is time to start with new goals and meet the challenges of day to day, in the previous article that I had written I was talking about what is a Proxy and its risks to have an indiscriminate use and consenquences that can present and the risk of exposing the information and the security of a company and additional recommendations to have a use oriented to the ...
updated article 17 Feb 2019
Full OS platform support Official supportability matrices for the Symantec Management Platform and Altiris solutions included in IT Management Suite. Also, official full support statements for recently-released OS versions. IT Management Suite 6.x/7.x/8.x Platform Support Matrix Windows 10 October 2018 Update (1809) and Windows 10 Enterprise LTSC 2019 Windows 10 April 2018 Update (Windows ...
updated article 17 Feb 2019
    Happy weekend community as always I hope that everything is going excellently, in this article I want to emphasize a common and simple but important issue to clarify since many times due to lack of certainty we do not correctly distinguish the differences between what are Virus, Malware and Ransomware and their operations, that's why I wrote this article to clarify some doubts ...
updated article 17 Feb 2019
    Good evening, community, I send a big greeting to all of you and I hope that you have achieved your personal goals of the week as I always say the continuous duty and there is no rest to improve every day in the previous article that I wrote I had talked a bit about the differences between a Virus, Ransomware, and Malware since it is always good to clarify those doubts to have a ...
updated blog entry 31 Jan 2019
As you may know, we recently added the ability to import a CSV or XLSX file of users to Endpoint Cloud for user enrollment. This leaves on-premises AD admins with the task of building that file, so I did some looking and found a very nice example Powershell script for pulling AD users to a CSV. https://gallery.technet.microsoft.com/scriptcenter/Powershell-script-to-5edcdaea Of course, I had to ...
updated blog entry 30 Jan 2019
Stolen or lost laptops are the most common type of data breach.  You read about these cases on a daily basis in the news.  Why?  It’s obvious to both employees and employers when laptops go missing and companies report the losses at a much higher rate than any other type of data breach.  But there’s a public misperception that these missing machines translate into identity ...
updated blog entry 26 Jan 2019
Now you can experience the ultimate in convenience and security with Symantec™ VIP Access for Apple Watch, turning your watch into your next generation mobile token.  VIP takes advantage of all the features of the Apple Watch including the easy to read display and the haptic technology for VIP Push notifications (alerts).  VIP is used not only for securing access to your ...
updated blog entry 19 Jan 2019
The recording of the Launch webcast for IT Management Suite 7.6 and Ghost Solution Suite 3.0 is now available.  https://www-secure.symantec.com/pop.jsp?popupid=webcast-it-management-suite-ghost-solution-suite-201503 Learn more about IT Management Suite 7.6 Upgrade to 7.6 What’s new in 7.6? Quickstart Upgrade Guide Download Trialware 7.6 Documentation Learn more about ...
updated blog entry 19 Jan 2019
You may have noticed that VIP Access, the flagship mobile application for Symantec Validation and ID Protection Service (VIP), is now available to download for BlackBerry 10 devices! Download the free app from BlackBerry World. Symantec VIP Access is a free download available for over 900 mobile device models, including BlackBerry, Windows Phone, Android, and iOS. Symantec VIP enables ...
updated blog entry 11 Jan 2019
Symantec Connect Rewards membership and related benefits are offered at the sole discretion of Symantec Corporation (“Symantec”). Symantec retains the right to change, limit, modify or cancel program rules, regulations, rewards, and reward levels at any time, with or without notice, even though such changes may affect the value of points already accumulated, the ability to use accumulated ...
updated blog entry 10 Jan 2019
  Informative Live Demo Webinar: Tuesday, December 8, 2015 (9:00am PST / 12:00pm EST)   Speakers: Piero DePaoli, Sr. Director, Global Product Marketing Enterprise Security at Symantec                   Morgan Wright LLC, National Media Analyst, Center for Digital Government.     What you will ...
updated blog entry 08 Jan 2019
To make it easier to find past and upcoming webcasts related to Symantec Endpoint Management solutions, I'm creating this blog post and will keep it updated over time. The links below for past webcasts will include the recording and Q&A. The links for upcoming webcasts will send you to the registration page. Enjoy! Webcast Topic: Ghost Solution Suite 3.3 Date: December 5, ...
updated download 09 Oct 2018
download comment 03 Sep 2018
updated download 29 Aug 2018
New Ebook: Cloud Workload Protection   How Snapper protects customer data on AWS with Cloud Workload Protection for Storage. Protecting data stored in Amazon Simple Storage Service (Amazon S3) buckets from malware and advanced threats can be a daunting task, as hackers develop new ways to infiltrate cloud environments. Symantec Cloud Workload Protection for Storage (CWP for Storage) ...
new event 19 Feb 2019
NetX has been a Symantec Authorized Training Partner for over 15 years. We deliver Instructor-led Training Classes with Instructors that are engineers that have real-world experience that you may use in your organization. The courses are available both virtual and on-site.  We offer over 20 different Symantec Classes. Please review our complete list of authorized training ...
updated event 19 Feb 2019
Join us for the kickoff to our newly formalized Chicago SEP user group! Come ready to eat, drink, and mingle with fellow SEP users as we gear up for the year ahead while watching the March Madness game. Space is limited, so be sure to register early! Also, be sure to register here for the first official meeting on April 25, 2019. **YOU WILL NEED TO LOG INTO CONNECT BY CLICKING "LOG ...
updated event 19 Feb 2019
We are excited to invite you to our first official Chicago SEP User Group meeting on April 25 at Maggiano's.  The agenda include will include lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. **YOU ...
updated event 15 Feb 2019
We are excited to invite you to our next New England DLP User Group meeting on May 2!  Join your peers and Symantec experts for exclusive insights into future Symantec DLP product roadmap, tips and tricks, and customer presentations. **YOU WILL NEED TO LOG INTO CONNECT BY CLICKING "LOG IN" AT THE TOP RIGHT CORNER OF THE SCREEN BEFORE YOU CAN REGISTER**  Agenda TBD
new event 15 Feb 2019
Save the date for our Fall Nashville DLP User Group meeting on October 8, 2019!  The agenda include will include lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. **YOU WILL NEED TO LOG INTO ...
new event 15 Feb 2019
We are excited to invite you to our next Nashville DLP User Group meeting on May 7, 2019!  The agenda include will include lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. **YOU WILL NEED TO LOG ...
updated event 14 Feb 2019
We are excited to invite you to our next Houston Security User Group meeting on May 1 at TopGolf!  The agenda include will include lunch, an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories, and lots of TopGolf fun. Symantec teams will also provide product updates and will be available for ...
updated event 12 Feb 2019
Webcast: The Importance of Building Your Zero Trust Program on a Solid Platform Date / Time: 10:00am PT / 1:00pm ET Speakers: Gerry Grealish, Symantec and Salah Nassar, Symantec Zero Trust is an architectural model that guides security teams on how to apply Zero Trust tenants to address the modern threat landscape. The model advocates a holistic approach to information security and puts ...
updated video 07 Feb 2019
This video will provide additional tips and techniques for creating dashboards utilizing the Analyzer capabilities within Symantec Information Centric Analytics.
updated video 06 Feb 2019
How to install windows cleanly using a Scripted OS Install job.   How to add an OS to the console, how to configure the unatended.xml file and how to modify the unatended.xml file to work with a multi edition of windows install DVD.  How to mount the install.wim to add additional drivers for install. 
updated video 06 Feb 2019
In this video we will cover pushing the agent using the remote agent install tool. Manual agent install. Information on how the agent can be scripted. 
updated video 06 Feb 2019
host Solution Suite 3.3 video series Automation folders configuration, building, deploying via Push job and directly from a client
updated video 06 Feb 2019
This is a quick video with pointers on installing Ghost Solution Suite 3.3 on a clean windows 2016 server.  The SQL Express that is included with GSS is used to keep this a simple environment.  Small note on license file locaiton and how to add licenses to the console post install. 
updated video 06 Feb 2019
In this video we will cover downloading and installing windows PE from the Microsoft ADK.  Importing Linpe and WinPe to the boot disk creator. Building a automation folder and building a pxe automation environment. 
updated video 06 Feb 2019
Run script jobs,  how to set up a run script job, the options for what account to execute the job as and how to import a run script job that would help with sysprep preparation. 
updated video 06 Feb 2019
Creating a back up image job and using the quick disk image to make a back up to be prepared to restore if needed.   Setup and deploy an image also is covered. 
updated video 06 Feb 2019
Working with Ghost Solution Suite 3.3 and PC Transplant.   Editing a built in template and then gathering and deploying the profile from one system to another.
updated video 06 Feb 2019
How to run a hot image job and check that it finishes, and some pointers to troubleshoot if it fails for any reason. 
updated idea 19 Feb 2019
As per your own support article (https://www.symantec.com/theme/sha2-transition) you understand that SHA-1 algorithms are not secure. Please update the certs in Symantec Endpoint Manager to SHA-2 in your next release. (Note: I undertsand that this process can currently be done by a system administrator, but the current documentation, is very general and not specific about the process. I have ...
updated idea 19 Feb 2019
Can ISV application whitelisting be based on certificate? Other AV software vendors have this ability and it would reduce the submissions for whitelisting.
updated idea 19 Feb 2019
When a certiifcate request is generated by SMG, it doesn't allow for a FQDN in the Subject Alternative Name. When a certificate is used by an internal CA it is not trusted by Chrome version 58 or higher. The work around is to make Chrome ignore this security feature, meaning Chrome is less secure that it could be. In Chrome 58 if you get the error NET::ERR_CERT_COMMON_NAME_INVALID you need to ...
updated idea 19 Feb 2019
Hello Team, Abhishek from IBM . we have been struggling with this issues for quite long time. We get the malicious hashes on daily bases and need to manually add on Symantec ATP. This is very critical project and need to blacklist more than 1000 or more hashes on daily basis. I have been told, same will be fixed in next release of ATP, but still it is not done. There are multiple hashes which ...
updated idea 19 Feb 2019
Hello, There are several areas like Bypassed Sites/Domains, or source/destination lists under Content Policy that could have several entries. Currently there is no way to export them for backup or for other analysis purposes. Having an export feature would certainly help for many of the maintenance actvities as well. I would like to see this feature added in one of the futrue ...
updated idea 19 Feb 2019
Hello, The reason we are writing to you is to find a valid email where requests related to issues with Symantec blacklist could be sent. We have comunicated with Symantec representatives via investigation@review.symantec.com and now the following error are back when we try to contact Investigations Team - 554 5.1.2 Recipient address rejected: User unknownPlease note that the following form ...
updated idea 19 Feb 2019
Currently when an incident happens an automatic email is send to responder. However this is limited to one email address. Would like to have options to add more than one receiptent
updated idea 19 Feb 2019
Hi Symantec, As a feature request, i want to submit this idea. Scenario :- Some of the end machines are still using the Legacy browser due to application restriction but at the same time the OCS (Origin Content Server) changed the SSL, TLS and all the required tems to latest version. concern :- lets suppose browser doesn't support TLS 1.2 and OCS only support TLSv1.2, this traffic should work ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.