Video Screencast Help
updated discussion 21 May 2018
We have let our CASB expire, as it didn't have the flexibility that was needed at our office.  How do we remove the CASB settings that were embedded in Office365 and how do we tear down the settings in ElasticSOC?  Thank you. E.
updated article 21 May 2018
Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix & Agent installer troubleshooter Purpose The purpose of this article is to help others who have installed DCS 6.7 troubleshoot any issues they may face after installation (The issues are mainly around Sign in issues). Most of the issues are around logging into DCS Manager and DCS Web portal. I have also added a brief ...
updated discussion 21 May 2018
We have let our CASB expire, as it didn't have the flexibility that was needed at our office.  How do we remove the CASB settings that were embedded in Office365 and how do we tear down the settings in ElasticSOC?  Thank you. E.
updated article 21 May 2018
Steps after installing Data Centre Security 6.7 With DCS AD/sign in fix & Agent installer troubleshooter Purpose The purpose of this article is to help others who have installed DCS 6.7 troubleshoot any issues they may face after installation (The issues are mainly around Sign in issues). Most of the issues are around logging into DCS Manager and DCS Web portal. I have also added a brief ...
updated article 17 May 2018
Setting up CCS-VM using a remote SQL Database Purpose The purpose of this article is to help guide people who may get a little stuck on the setup of CCS-VM when using a remote Database. When setting up an instance of CCS-VM using a remote Database I ran into SQL issues, which I could not resolve using the Symantec forums or via Googling. Hopefully my findings will help others who run into ...
updated article 16 May 2018
Introduction This is the sixth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions), see Mick's Greatest Hits: Index of Helpful Connect Security Articles. This article was last updated May 2018. This new "Symantec Insider ...
updated article 15 May 2018
Full OS platform support Official supportability matrices for the Symantec Management Platform and Altiris solutions included in IT Management Suite. Also, official full support statements for recently-released OS versions. IT Management Suite 6.x/7.x/8.x Platform Support Matrix Windows 10 Fall Creators Update (Windows 10 version 1709) Windows 10 Creators Update (Windows 10 version ...
updated article 08 May 2018
For scanning Oracle DB, CCS requires privileges to import and scan CCS Oracle asset. When requesting DBA to create a user for CCS, answering their question on what are the permissions required takes a bit of research. Starting with CCS Planning and Deployment guide, under section “Configuring credentials for asset import and data collection”, Symantec lists general requirements for querying ...
updated article 04 May 2018
FIDO stands for "Fast Identity Online" The Symantec VIP Security Key follows the U2F (Universal 2nd Factor) standard, a FIDO protocol that allows for a single security key to authenticate to all your corporate resources. It's simple, and it maintains a strong level of security, which explains why it's so popular. FIDO U2F is widely accepted by the industry, natively supported by browsers and ...
new blog entry 09 May 2018
We are pleased to announce that SEP Cloud partners can now use ConnectWise Automate to fulfill their remote monitoring & management (RMM) use cases. Partner Management Console (PMC) now allows partners to download a ConnectWise Integration Package as well as generate device enrollment token per customer to support RMM use cases. Partners need to follow a 2-step process (download the ...
updated blog entry 02 May 2018
After the disclosure of a recent Denial of Service (DoS) tactic involving legitimate websites using WordPress, Symantec MSS has been applying additional scrutiny to customers that may have been involved. According to a blog post from Sucuri, “a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect source amplification vectors” has been uncovered in the wild. ...
updated blog entry 18 Apr 2018
Most people today rely on email as their method for business communication – sending and receiving hundreds of emails every day. This dependence on email can create a weak link in securing corporate information and expose a company to attacks. While hackers still use general spam emails and social engineering (or phishing) attacks against organizations, they are now increasingly ...
updated blog entry 10 Apr 2018
This is the third part of a four-part series covering twelve fundamentals for choosing a managed PKI solution, and questions to ask in the buying process. In Part 2, we shared three key differences between DigiCert and other managed public key infrastructure (PKI) providers around administration and deployment. This week, we will discuss four features of Symantec Managed PKI*, Powered by ...
updated blog entry 07 Apr 2018
Over the years I always wondered what all these files in C:\Windows\System32 are doing in my Windows XP. I collected most of them and I added the function to them to keep track of what is going on in Windows. Below you find a part of this list. This list is the work of many people who give this information. I collected them and finally compled them into one list. In the near future I will also ...
updated blog entry 03 Apr 2018
This is the second part of a four-part series covering twelve fundamentals for choosing a managed PKI solution, and questions to ask in the buying process. In Part 1, we shared four key differences between managed public key infrastructure (PKI) providers. This week, we will discuss three features of Symantec Managed PKI Service, Powered by DigiCert®[1], that provide your organization with the ...
updated download 01 Mar 2018
Last Updated: Jan 31 2018 This Page has information on AWS Cloud formation Template (CFT) based test drive that can be used by CWP users to speed up creation of a demo/test stack on AWS. This template automates the creation of instances, subnets, VPC's etc. and documents describe various use cases that can be leveraged for Proof of Concept and validations. Multi-tier Organisation Setup ABC ...
updated download 04 Feb 2018
It will list all machines login to domain and give status of SEP service if installed or is running on login machine.  1. Script is vbs will easily work on any winndows client Windows 7, 8, 8.1, 10  2. It can check any service like Symantec Endpoint Protection, Symantec Altris Client Management Suite or any service you want to track 3. Script will log result centrally at a ...
updated download 23 Jan 2018
The below tool is used to clean unistall the PGP 10.4 agent from laptop which removes the PGP entries from Registry, system 32 & .dll files. This tools clean wipes the files as shown in the below arcticle which is required to completely uninstall the product https://support.symantec.com/en_US/article.TECH225...
updated download 08 Jan 2018
Attached is CCS standard containing fixed checks from CIS Microsoft Windows Server 2012 R2 v2.2.0/v2.2.1: 1.2.3 Is the 'Reset account lockout counter after' parameter set to '15 or more minute(s)'? 18.4.13.1 (18.4.14.1) Is the 'Hardened UNC Paths' parameter set to 'Enabled, with "Require Mutual Authentication" and "Require Integrity" set for all NETLOGON and SYSVOL shares'? 18.9.22.3 ...
updated download 07 Nov 2017
This guide describes a process to test engine updates and security content before you implement the updates on all client computers. Reference link: http://www.symantec.com/docs/DOC10649
new event 17 May 2018
Webcast: GDPR: Identifying and Responding to a Data Breach Date: May 22, 2018 / Time: 6:00AM PST / 9:00AM EST With GDPR coming, businesses are endeavouring to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR’s data breach notification requirements continue to present a challenge for many.  Join Duncan Brown, IDC and ...
updated event 14 May 2018
Join Symantec and your peers for conversations around Endpoint/Network Security, Data Protection, and User Management at Mastro's Steakhouse. The agenda includes lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also provide product updates and will be available ...
updated event 09 May 2018
We are excited to invite you to our next London DLP User Group meeting on 23 May 2018. The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common DLP challenges and success stories. Symantec teams will also provide product updates and will be available for discussions. The event will run from 10am-5pm ...
updated event 08 May 2018
We are excited to invite you to our next Toronto DLP User Group meeting on May 17. Join Symantec and your peers for conversations around Data Loss Prevention topics and issues.  The agenda includes lunch and an opportunity to have interactive conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also ...
updated event 07 May 2018
We are excited to invite you to our next Chicago EPM User Group meeting on May 11. Join Symantec and your peers for conversations around Endpoint Management topics and issues.  The agenda includes lunch and an opportunity to have interactives conversations with your peers and local Symantec representatives around common challenges and success stories. Symantec teams will also ...
new event 03 May 2018
Webinar: Accelerating Incident Response with Intelligence-Driven Security Orchestration Speakers:  Al Cooley,Director Product Mgmt, Symantec / Meny Har, VP Product, Siemplify / Nimmy Reichenberg, CMO, Siemplify Security operations teams are modern-day detectives, combing through clues to thwart cyberthreats. But the deluge of alerts from disparate technologies, manual processes and ...
updated video 13 Apr 2018
This how-to video covers the upgrade process from Altiris 7.1 to Symantec IT Management Suite 7.5 powered by Altiris technology. Links to learn more: 7.5 Migration and Upgrade landing page 7.5 Presentations and Hands-on Labs from the 7.5 Summit IT Management Suite 7.5 Documentation Migration Guide 7.0 to 7.5 7.5 Installation and Upgrade Guide 7.5 Planning for Implementation Guide
updated video 14 Nov 2017
Web Isolation Demo Videos : - Web Isolation Overview - Web Isolation Phishing  - Selective Isolation
updated idea 11 May 2018
Make it so the default Web link and Email mail refers to the primairy management server instead of a local address. That way remote users can be sent an email without needing the support of IT.
idea comment 11 May 2018
idea comment 04 May 2018
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
Mithun Sanghavi
1,279
63
SMLatCST
444
1
jjesse
109
24
ℬrίαη
3,108
25

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.