Video Screencast Help
discussion comment 16 Dec 2018
updated discussion 15 Dec 2018
Hello to everyone, I like to probe ICT with dlp 14,6 and no cant find a videos for the configuracion of rules in both products , anyone has a videos with examples to share? Regards Miguel Angel
updated discussion 15 Dec 2018
Hi all I testing connect to admin console 1.IE           http,https >>>> success 2.firefox    http,https >>>> success  3.Chrome http >>>> success                  https >>> fail The ICT don't support chrome https ???????
updated discussion 15 Dec 2018
Hi All After, I add roles in ICT console. The ICT automatic to create group in AD name "RIGHTSWATCH_SECURITY_ROLE_xxxx" . How to change format group name in AD???
updated discussion 15 Dec 2018
I don't know how to install ict .then please guide me
updated discussion 15 Dec 2018
I have added a new rule to Office documents policies on ICT web console and this policy contains sixty three regex. Now I want to apply this policy to email but I don't want to do manual. Because there are so many policies in this way. How can I make it easier ?
discussion comment 16 Dec 2018
updated discussion 15 Dec 2018
Hello to everyone, I like to probe ICT with dlp 14,6 and no cant find a videos for the configuracion of rules in both products , anyone has a videos with examples to share? Regards Miguel Angel
updated discussion 15 Dec 2018
Hi all I testing connect to admin console 1.IE           http,https >>>> success 2.firefox    http,https >>>> success  3.Chrome http >>>> success                  https >>> fail The ICT don't support chrome https ???????
updated discussion 15 Dec 2018
Hi All After, I add roles in ICT console. The ICT automatic to create group in AD name "RIGHTSWATCH_SECURITY_ROLE_xxxx" . How to change format group name in AD???
updated discussion 15 Dec 2018
I don't know how to install ict .then please guide me
updated discussion 15 Dec 2018
I have added a new rule to Office documents policies on ICT web console and this policy contains sixty three regex. Now I want to apply this policy to email but I don't want to do manual. Because there are so many policies in this way. How can I make it easier ?
updated article 13 Dec 2018
Information Centric Tagging (ICT) https://www.symantec.com/products/information-centric-tagging --- 15.1 Product Guides for version 15.1 of Symantec Information Centric Tagging and Symantec Information Centric Security Module (Documentation Library) https://support.symantec.com/en_US/article.DOC11006.html Symantec Information Centric Tagging and Symantec Information Centric Security Module ...
updated article 12 Dec 2018
Machine learning, artificial intelligence, the vanishing perimeter…more than buzz words trending on Twitter, instead, sparks of the technological revolution. What business problems can ML solve? What types of insights can AI provide to accelerate business objectives? As we are living in an era of rapid innovation resulting in the refinement of operational efficiencies and cultural progress, ...
updated article 06 Dec 2018
Identifying the Problem Location The key to fixing Inventory problems is identifying what is causing them in the first place. The difficulty is that a myriad of problems will result in the same basic symptoms: Inventory is out of date or stale Inventory reports are not accurate – This includes specific data points, such as reporting on Processor only Inventory is missing from some to many ...
updated article 06 Dec 2018
Target Systems Not Running Inventory If target systems are not running Inventory, here are the questions to ask: Does the system have the Plug-in? Is the computer part of the target filter for the policies? Does a custom schedule have an End Date that’s passed? Does the schedule only run once?   Does the system have the Plug-in? This question has two answers that indicate ...
updated article 06 Dec 2018
Does a custom schedule have an End Date that’s passed? By default Inventory Policies have no end date to their schedules. If using the default schedules (listed on the policy as Daily, Weekly, and Monthly) no end date will ever be applied. If using a Custom schedule, the end date is not checked by default, however a user can check the end date. Use the following process to determine if an end ...
updated article 06 Dec 2018
Applies To / Compliance By default every Inventory Policy, including new ones created, are targeted to the filter: Computers with Inventory Plug-in. The default filter cannot be edited, so it should be removed and a new one added if you wish to change what systems are targeted. This is useful if you are targetting different groups of systems to keep the amount of systems sending inventory in ...
updated article 03 Dec 2018
Often enough, you're placed in a position where a new version of your software has been released, which includes new support for operating systems, along with additional functionality or fixes. It's beneficial to keep your version of Symanec GSS up-to-date, especially considering the speed at which vendors are releasing new patches and software revisions these days. This places you in a ...
updated article 03 Dec 2018
Once you have all the prerequisites in place (backups, new software, disabling your AV if you need too), it's time to upgrade the current installation itself. The process is fairly straight-forward and doesn't hold any hidden "gotchas", but you need to keep an eye on it in case it does fail, or rollback for whatever reason. In this case, reviewing the logs or Event Viewer will be key to any ...
updated article 03 Dec 2018
Symantec offers three live, instructor-led training courses for Symantec Endpoint Protection 14. The Symantec Endpoint Protection 14: Plan and Implement course is designed for the network, IT security, and systems administration professional in a Security Operations position tasked with planning and implementing a Symantec Endpoint Protection environment. This course covers how to architect ...
updated blog entry 15 Dec 2018
 If you are looking for Google Chrome standalone offline installer, then you can find below the links for 32 bit and 64 versions. Google Chrome 32-bit (x86): 32-bit Google Chrome Offline Installer  (Single user account, 40MB) 32-bit Google Chrome Offline Installer  (All user accounts, 40MB) Google Chrome 64-bit (x64): 64-bit Google Chrome Offline Installer  (Single user ...
updated blog entry 03 Dec 2018
Hi!   My last post back in October 2011 introduced the beta program for a new application for our messaging security customers. I'm delighted to announce that we achieved our Generally Available (GA) milestone yesterday on March 19th meaning that the Symantec Email Submission Client is now available for all of our customers to download and install.  This is my first "1.0" product ...
updated blog entry 03 Dec 2018
Following on from our recent webinar on the theme of website optimisation we have developed a series of three blog posts. These are high level blogs and not intended to be all encompassing, but rather have been written to kick start thoughts on concepts such as analytics, website security and to start off with some thoughts on search engine optimisation. Five steps to search engine success. ...
updated blog entry 03 Dec 2018
A few weeks ago, a couple of my co-workers visited a workshop about a new course: ethical hacking. In short, it teaches system administrators how to try and hack your own system, to check it's vulnerabilities and find out whether your security needs working on. The course is also available for pretty much everyone else, but that on a side note. When i heard about it, the only thing that ...
updated blog entry 23 Nov 2018
Thanks to regulatory requirements most everyone in the corporate world in the US is required to have official annual information security awareness/education/training. This isn't a bad thing per se, but I doubt few of us go beyond a stack of presentation slides with 10 multiple choice questions at the end. The compliance box gets checked, sure, but is anyone more knowledgeable about security? ...
updated blog entry 20 Nov 2018
Online training, or eLearning, is a great way to learn about SVS. Altiris Education has just finished a new eLearning course that will make you an SVS expert in no time. Get a free sample here. Altiris Education has just released a Software Virtualization Solution (SVS) eLearning course, which compliments the award winning SVS product. Take the course to learn about the many benefits SVS ...
updated blog entry 19 Nov 2018
We are excited about hosting the CA/Browser Forum meeting this week in Mountain View and have a great set of attendees from the leading browser vendors and Certificate Authorities as well as several other interested third parties.  At Symantec, we believe that the CA/B Forum efforts to improve the SSL ecosystem have become even more important given the breaches and attacks over the past ...
updated download 09 Oct 2018
download comment 03 Sep 2018
updated download 29 Aug 2018
New Ebook: Cloud Workload Protection   How Snapper protects customer data on AWS with Cloud Workload Protection for Storage. Protecting data stored in Amazon Simple Storage Service (Amazon S3) buckets from malware and advanced threats can be a daunting task, as hackers develop new ways to infiltrate cloud environments. Symantec Cloud Workload Protection for Storage (CWP for Storage) ...
updated download 27 Jul 2018
Last Updated: Jan 31 2018 This Page has information on AWS Cloud formation Template (CFT) based test drive that can be used by CWP users to speed up creation of a demo/test stack on AWS. This template automates the creation of instances, subnets, VPC's etc. and documents describe various use cases that can be leveraged for Proof of Concept and validations. Multi-tier Organisation Setup ABC ...
updated event 14 Dec 2018
We are excited to announce our next Dallas Security User Group meeting on January 17, 2019!  The agenda include will include lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. **YOU WILL NEED ...
updated event 13 Dec 2018
We are excited to invite you to our next Chicago DLP User Group meeting on April 11!  The agenda include will include lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. **YOU WILL NEED TO LOG ...
updated event 12 Dec 2018
We are excited to announce our next Toronto DLP User Group meeting on January 15, 2019!  The agenda include will include lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. **YOU WILL NEED TO ...
updated event 05 Dec 2018
Have you seen an increase in threats hitting your endpoints since implementing a Next Generation Firewall? And how many of these threats are delivered by uncategorized or risky websites?   Lior Dolphin, the Symantec expert for Web Isolation will join us for a session on how to make browsing safe again. DATE: December 13, 2018 TIME: 3:30 PM LOCATION: Symantec Papendorp Park AGENDA: ...
new event 04 Dec 2018
We are excited to invite you to our next New York DLP User Group meeting on February 20!  The agenda include will include lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. **YOU WILL NEED TO LOG ...
new event 14 Nov 2018
Webinar: Security that Scales: Automating Security and Compliance for DevOps Date/Time: December 18, 2018 (10:00am PT / 1:00pm ET) Speakers: Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of ...
new event 05 Nov 2018
Webinar: Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring Date: December 6, 2018 Time: 10:00am PT / 1:00pm ET Speakers: Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, ...
updated video 08 Dec 2018
Working with Ghost Solution Suite 3.3 and PC Transplant.   Editing a built in template and then gathering and deploying the profile from one system to another.
updated video 29 Nov 2018
This video will walk through an example of how to use the specific features and functionality in Symantec Information Centric Analytics to find malicious insiders within the organization. 
updated video 29 Nov 2018
This video will walk through an example of how Symantec Information Centric Analytics can detect active cyber breaches and stop risks earlier in their lifecycle.
updated video 29 Nov 2018
This video will walk through an example of how Symantec Information Centric Analytics simplifies the DLP triage and remediation process, and prioritizes users with the highest risks.
updated video 22 Nov 2018
In this video we will cover downloading and installing windows PE from the Microsoft ADK.  Importing Linpe and WinPe to the boot disk creator. Building a automation folder and building a pxe automation environment. 
updated video 20 Nov 2018
This is a quick video with pointers on installing Ghost Solution Suite 3.3 on a clean windows 2016 server.  The SQL Express that is included with GSS is used to keep this a simple environment.  Small note on license file locaiton and how to add licenses to the console post install. 
updated video 13 Nov 2018
This video will guide you through how to troubleshoot SQL processing jobs associated with Symantec Information Centric Analytics.
updated video 13 Nov 2018
This video will guide you through how to create dashboards utilizing the Analyzer capabilities within Symantec Information Centric Analytics.
updated video 13 Nov 2018
This video will guide you through configuring the Integration Wizard to import BlueCoat ProxySG data into Symantec Information Centric Analytics.
updated idea 15 Dec 2018
Allow the use of variables in folder level exceptions so that hundreds of SQL instances wil recieve the exception.  For example: to exclude following directory: Program Files\Microsoft SQL Server\MSSQL$instancename\FTDATA per Microsoft.  See case number: 28211256 The current method is impractical for hundreds of SQL instances that change frequently.  Adding exceptions to ...
updated idea 13 Dec 2018
(Note to admins: due to being new to the Symantec Connect site, I posted the following request at another section just now, but found out thereafter that the "Idea" section is where it needs to get posted, so here it is. Apologize for the duplicate posting, and the other posting (@ "My Workspace"?) can be removed.) Last week, we signed on with Symantec Email Security.cloud and I'm looking for ...
idea comment 13 Dec 2018
updated idea 13 Dec 2018
Please support creating file hash threat exceptions in addition to the current file/folder/cert-based exception methods. There are situations where a false positive occurs on unsigned code without consistent file/path names and the hash is the only good method of identifying the file.
new idea 13 Dec 2018
Please add the ability to send an email notification when a client has been disabled. We have had several instances of the endpoint client becoming disabled on recent Windows 10 releases after applying Windows Updates. We have kept endpoint and the management console up-to-date, yet this is still an ongoing issue. Right now, we log in daily to make sure there are no disabled clients. An ...
new idea 11 Dec 2018
We have the option for Log Only in most detections, including SONAR, but if you look at the page with Bloodhound we can only enable/disable, and set to Automatic or Agressive.  No option to *only* log Bloodhound detections without a remediation attempt. My customer this week also brought this up, so not just my opinion.  Hopefully in future versions we can configure Bloodhound for ...
new idea 06 Dec 2018
"Critical NDC detection" it is not expected to associate event2 with event1 in the same incident based on the one day tracking window.  This situation causes customers to troubleshoot the incident, please help improve
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.