Video Screencast Help
new idea 26 Mar 2017
My users tend to release spam messsges without checking them properly. I need to delegate the option to release quarantined messages only to admins and not just every user. On the e-mail they get for blocked spam they now have only the option to view and not release, but when they enter the SMG gui, after pressing View from within the email, they get the option to Release the messages thus ...
updated discussion 26 Mar 2017
Hi everyone Simple question, but I do not seem to find the information I look for so far. What happened: There have been a lot of false-positives detected by new signatures. On a lot of workstations, there has an EXE been quarantined. This EXE, of course, needs to be added to the exceptions. Issue I have here, that each detection has generated an entry in the list of applications to add in ...
updated discussion 26 Mar 2017
we issue code signing certificate to user . how to bind code signing certificate with .exe what is requirement of binding code signing certs with .exe
updated blog entry 25 Mar 2017
作為全球最大的憑證授權中心之一,我們賽門鐵克非常自豪。我們強烈反對Google針對賽門鐵克SSL/TLS憑證在Chrome瀏覽器中所採取的行動。這一行動讓人出乎意料,而且我們認為Google的網路日誌是不負責任的。我們希望這一計畫的目的不是為了在網際網路社區造成對我們的SSL/TLS憑證的不確定性與懷疑。 Google對於我們的頒發實踐以及我們過去誤頒發範圍的聲明是言過其實且具有誤導性的。例如,Google聲稱我們已經誤頒發了30,000個SSL/TLS憑證,這不是事實。在Google所提到的事件中,有127個憑證—而不是30,000個憑證—被認定為誤頒發的憑證,而且它們沒有對消費者造成傷害。我們已經採取了廣泛的補救措施以糾正這一情況,我們立即終止了對涉事合作夥伴的註冊授權中心(RA)任命,而且為了加強對賽門鐵克所頒發的SSL/TLS憑證的信任,我們已經宣佈終止我們的RA項目。這種 ...
updated blog entry 25 Mar 2017
作为全球最大的证书颁发机构之一,我们赛门铁克非常自豪。我们强烈反对谷歌针对赛门铁克SSL/TLS证书在Chrome浏览器中所采取的行动。这一行动让人出乎意料,而且我们认为谷歌的博文是不负责任的。我们希望这一计划的目的不是为了在互联网社区造成对我们的SSL/TLS证书的不确定性与怀疑。 谷歌对于我们的颁发实践以及我们过去误颁发范围的声明是言过其实且具有误导性的。例如,谷歌声称我们已经误颁发了30,000个SSL/TLS证书,这不是事实。在谷歌所提到的事件中,有127个证书—而不是30,000个证书—被认定为误颁发的证书,而且它们没有对消费者造成伤害。我们已经采取了广泛的补救措施以纠正这一情况,我们立即终止了对涉事合作伙伴的注册机构(RA)任命,而且为了加强对赛门铁克所颁发的SSL/TLS证书的信任,我们已经宣布终止我们的RA项目。这种管控的强化是其他公共证书颁发机构(CA)尚未遵循的 ...
updated discussion 26 Mar 2017
Hi everyone Simple question, but I do not seem to find the information I look for so far. What happened: There have been a lot of false-positives detected by new signatures. On a lot of workstations, there has an EXE been quarantined. This EXE, of course, needs to be added to the exceptions. Issue I have here, that each detection has generated an entry in the list of applications to add in ...
updated discussion 26 Mar 2017
we issue code signing certificate to user . how to bind code signing certificate with .exe what is requirement of binding code signing certs with .exe
new discussion 25 Mar 2017
Hello, we have a new dedicated server at HOSTFORWEB, ip 66.225.229.38 , just 10 days old.  Its ip is listed at the blacklist and i have asked for removal over 5 times last 10 days and it was not delisted.  The bad reputation belongs to old owner of the IP. at other blacklists i found over 1.000.000 spam emails sent by this ip, but many many years ago, some from 2009. Please remove ...
updated article 20 Mar 2017
Mostly during our SNAC/NAC 802.1x implementations, we used to sign-off the deployment & leave the city the same day. Next day (and this is almost becoming a trend) we get calls/complaints about Switch performance/throughput having dropped considerably after SNAC/NAC deployment. Their gut feeling was always to contact Cisco for a hardware upgrade and that Symantec to provide the input for ...
updated article 20 Mar 2017
It common especially, some of the newer featured to not be configured no the switch. Use of IEEE 802.1D and not Rapid-STP is one such common examples which greatly affects the SNAC Implementations. This article is the second steps in identifying/fixing performance/throughput issues on a switch after a SNAC deployment. The first step ofcouse is to configure the legacy STP (which is the ...
updated article 20 Mar 2017
I would continue from the point where we left with knowing what FILE FINGERPRINT in SEP is and how to generate a FILE FINGERPRINT using the checksum.exe, how to edit, append or merge a FILE FINGERPRINT. Now lets look at how to configure a SYSTEM LOCKDOWN which is a protection setting that you can use to control the applications that can run on the client computer Previous Articles: What is ...
updated article 19 Mar 2017
Just received an alert on an Security Advisories for the following products: * SEP v12.1 RU6 MP6 and earlier * SEP v14.0 The security advisories are: CVE-2016-9093 - Local Privilege Escalation Vulnerability http://www.securityfocus.com/bid/96294 CVE-2016-9094 - Local Command Injection Vulnerability http://www.securityfocus.com/bid/96298 If you're on SEP v12, you're strongly recommended to ...
updated article 17 Mar 2017
Usually first question for DLP customers who want to used DLP mail prevent is “What will be impact on mail delivery?” Yes, DLP will introduce a latency in mail delivery but I will try to show you with below tests that it will not be noticeable for most end users. Testing system All test were performed on a Windows 2012 multi-tier environment and using SYMANTEC DLP v14.5MP1 solution. Mail were ...
updated article 21 Feb 2017
Ultimamente o Powershell tem sido uma das ferramentas escolhidas para distribuição de malware - Essa onda tem crescido de acordo com o WhitePaper de dezembro de 2016. PowerShell threats surge: 95.4 percent of analyzed scripts were malicious.  Frequentemente, os usuários finais são levados a abrir um anexo malicioso e se deparam com uma poderosa ferramenta voltada contra eles. Os ...
updated blog entry 25 Mar 2017
作為全球最大的憑證授權中心之一,我們賽門鐵克非常自豪。我們強烈反對Google針對賽門鐵克SSL/TLS憑證在Chrome瀏覽器中所採取的行動。這一行動讓人出乎意料,而且我們認為Google的網路日誌是不負責任的。我們希望這一計畫的目的不是為了在網際網路社區造成對我們的SSL/TLS憑證的不確定性與懷疑。 Google對於我們的頒發實踐以及我們過去誤頒發範圍的聲明是言過其實且具有誤導性的。例如,Google聲稱我們已經誤頒發了30,000個SSL/TLS憑證,這不是事實。在Google所提到的事件中,有127個憑證—而不是30,000個憑證—被認定為誤頒發的憑證,而且它們沒有對消費者造成傷害。我們已經採取了廣泛的補救措施以糾正這一情況,我們立即終止了對涉事合作夥伴的註冊授權中心(RA)任命,而且為了加強對賽門鐵克所頒發的SSL/TLS憑證的信任,我們已經宣佈終止我們的RA項目。這種 ...
updated blog entry 25 Mar 2017
作为全球最大的证书颁发机构之一,我们赛门铁克非常自豪。我们强烈反对谷歌针对赛门铁克SSL/TLS证书在Chrome浏览器中所采取的行动。这一行动让人出乎意料,而且我们认为谷歌的博文是不负责任的。我们希望这一计划的目的不是为了在互联网社区造成对我们的SSL/TLS证书的不确定性与怀疑。 谷歌对于我们的颁发实践以及我们过去误颁发范围的声明是言过其实且具有误导性的。例如,谷歌声称我们已经误颁发了30,000个SSL/TLS证书,这不是事实。在谷歌所提到的事件中,有127个证书—而不是30,000个证书—被认定为误颁发的证书,而且它们没有对消费者造成伤害。我们已经采取了广泛的补救措施以纠正这一情况,我们立即终止了对涉事合作伙伴的注册机构(RA)任命,而且为了加强对赛门铁克所颁发的SSL/TLS证书的信任,我们已经宣布终止我们的RA项目。这种管控的强化是其他公共证书颁发机构(CA)尚未遵循的 ...
updated blog entry 24 Mar 2017
Symantecは業界をリードする認証局の一つであることを誇りに思っています。私たちはGoogle社がChromeブラウザにおいてSymantec ...
new blog entry 24 Mar 2017
At Symantec, we are proud to be one of the world’s leading certificate authorities. We strongly object to the action Google has taken to target Symantec SSL/TLS certificates in the Chrome browser. This action was unexpected, and we believe the blog post was irresponsible. We hope it was not calculated to create uncertainty and doubt within the Internet community about our SSL/TLS ...
new blog entry 22 Mar 2017
WEBINAR: ZERO-DAY ATTACKS AND WHAT TO DO ABOUT IT TIME: 10:00 AM PST / 1:00 PM EST SPEAKER: CHRIS CANDAFFIO, SYSTEM ENGINEER, SYMANTEC 5-Part Webinar Series: Endpoint Protection…what really matters? Part 3 of 5: Zero-Day Attacks and What To Do About It? All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it ...
updated blog entry 22 Mar 2017
A spam campaign Symantec observed in January 2017 targeting people who live in Germany appears to be, once again, using detailed, real personal information to enhance the believability of the messages. Victims who open the message attachments are likely to have their Windows computers infected with malware that steals banking information. First seen in the UK Symantec is aware of only one ...
updated download 31 Oct 2016
Script is intended to help with asset cleanup by searching and removing assets from a given assets list. When CCS and your asset management application are not directly connected, this script will help you perform clean-up by providing it the list of "hostnames" to be removed (asset_list.txt). Script will search for the assets that matches the "hostname" provided in the list and delete it. ...
new event 22 Mar 2017
WEBINAR: ZERO-DAY ATTACKS AND WHAT TO DO ABOUT IT DATE: MARCH 23, 2017 SPEAKER: CHRIS Candaffio, Systems Engineer, Symantec 5-Part Webinar Series: Endpoint Protection…what really matters? Part 3 of 5: Zero-Day Attacks and What To Do About It? All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains ...
updated event 21 Mar 2017
Please join us for the next Symantec Washington D.C. Combined User Group meeting -- on Thurs., April 6 from 1:00 to 5:00 p.m., at the National Institutes of Health: 6555 Rock Spring Dr, Bethesda, MD 20817 (Room #3E02). Our meeting will be a good mix of Symantec and a partner presentation, and time for discussion and networking with other Symantec Endpoint Management (Altiris), ...
updated event 15 Mar 2017
WEBINAR: Data-Centric Security: A Best Practice Approach TIME: 10:00 AM PT / 1:00 PM ET SPEAKERS: Guest Speaker Heidi Shey - Senior Analyst at Forrester and Nico Popp - SVP Engineering,  Information Protection at Symantec Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should ...
new event 13 Mar 2017
12:00     Arrive and lunch 13:00     Welcome from Thomson Reuters 13:15     A Customer Story: The Governance side of implementation 14:00     How a Cloud Access Security Broker (CASB) extends data visibility of the DLP Platform into the cloud? 14:45     BREAK 15:00     ...
updated event 09 Mar 2017
Please join us for the next Tri-State Data Loss Prevention User Group meeting on Wednesday, March 15 from 2:00 pm to 5:00 pm at Great American Insurance (Dixie Terminal North - Room 1) in Cincinnati. Lunch will be served! (Some of the agenda is set now, and some will be nailed down as we get closer.) Agenda 2:00 – 2:30  Lunch - Networking 2:30 – 3:00  ...
updated event 08 Mar 2017
Please join us for our next Symantec Bay Area Data Loss Prevention User Group meeting – Thursday, March 9, 2017 from 11:00 to 2:00 pm at eBay: 2525 North 1st Street, San Jose, CA. Lunch will be served! Welcome & Introductions Customer Lunch & Q&A and Discussion Symantec Presentation – Salil Sane - DLP Update on 14.6 and beyond / Blue Coat integration Customer Use Case [Please ...
updated event 07 Mar 2017
You’re invited to our second Seattle Data Loss Prevention User Group meeting – Thursday, March 23 from 11:00 am to 2:00 pm – at the offices of T-Mobile: 3625 132nd Ave SE, Bellevue, WA 98006 (Two Newport building) Hope you can join! Agenda: 11:00 – 11:30: Welcome & Introductions (Lunch is served) 11:30  – 12:15: Symantec DLP Product Overview & Roadmap - Daphne Zhao 12:15 – 1:00: ...
updated video 10 Feb 2017
The world is changing. We are entering another era of IT, where enterprises are experiencing a fundamental shift in the way their workforce consumes technology. Personally owned devices ubiquitously connected in today’s world, are giving way to cloud-based applications and repositories in almost every region and vertical. The shift of workloads to cloud applications such as Office365, Google ...
updated video 03 Jan 2017
In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which  provides IT security teams with the best visibility in their endpoint environment.   Advanced Threat Protection - Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console.   Download our ATP whitepaper at ...
updated video 03 Jan 2017
Bay Dynamics recently announced the availability of the standalone IT Analytics Server 2.1, which includes an enhanced web based cube browser. This video walks you through how as an existing Symantec Endpoint Protection customer, you can leverage IT Analytics Server to visualize your cube data and take advantage of its benefits.
updated video 03 Jan 2017
Bay Dynamics recently announced the availability of the standalone IT Analytics Server 2.1, which includes an enhanced web based cube browser. This video walks you through how as an existing Symantec customer, you can leverage IT Analytics Server to visualize your cube data and take advantage of its benefits.
updated video 03 Jan 2017
This video shows you the new features in Advanced Threat Protection 2.0.2.
new idea 26 Mar 2017
My users tend to release spam messsges without checking them properly. I need to delegate the option to release quarantined messages only to admins and not just every user. On the e-mail they get for blocked spam they now have only the option to view and not release, but when they enter the SMG gui, after pressing View from within the email, they get the option to Release the messages thus ...
new idea 24 Mar 2017
Would like to see the ability to whitelist files based on certificate in ATP. This would be useful for situations where an application server, for example, generates files with a new hash frequently and whitelisting via hash is impracticle as a result.
updated idea 24 Mar 2017
Good morning, We have implemented Application and Device control by creating a policy that blocks USB mass storage connected to a computer. I have applied the policy to a computer container successfully. We would like to be able to apply this policy to user objects instead. This way the policy will follow the user to any computer she/he logs in. Thank you.
new idea 23 Mar 2017
This field would eliminate the need for parallel control for audit and historical purposes. This item will also make it easier to review exceptions created. We can enter in the field, for example, the change request number or support ticket number.
new idea 23 Mar 2017
Si suggerisce il miglioramento dell'admin audit logs sulla Control Center relativo all'attivià degli amministratori. Due punti in particolare: aumentare notevolmente il numero di azioni loggate e non solo un piccolo set come adesso creare un tracciato record con campi ben definiti (es. timestamp, user, action) Grazie Saluti
new idea 22 Mar 2017
Customer would like to be able to configure static routes without needing to re-boostrap the appliance.
new idea 22 Mar 2017
(Submitting this Idea on behalf of Symantec Customer) Would like to be able to configure SEPM to send a user with a risk detection an email to alert them that they have a detected risk. Currently, Admins can be configured to receive emails when risk(s) are found on endpoints, but not to users when they have contracted a risk on their endpoints.
updated idea 20 Mar 2017
Hi Team, A recent version of clean wipe is not asking password while uninstalling the SEP client. Cleanup is available over the internet and any user can download and uninstall the SEP client without knowing the system administrator. This a big loophole which we have observed.
updated idea 20 Mar 2017
The article: https://support.symantec.com/en_US/article.TECH233932.html describes a few procedures in regards to malware FP and FN procedures but there seems to be 1 aspect not mentioned there. We cannot find any information that states how a FP detection should be reported for detection adjustment. We have been informed by your colleagues in chat that this FP mail should be submitted via the ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
Mithun Sanghavi
1,266
60
SMLatCST
430
1
jjesse
107
24
ℬrίαη
2,700
21

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.