Video Screencast Help
updated discussion 03 Dec 2016
Hi, When I tried was going through a report of the Infected Sites, I found "Not Applicable" in the action field. I went through other action fields in the article : https://support.symantec.com/en_US/article.TECH102052.html ; but I could not find the meaning of the action Not Applicable. I also went through one thread which had a similar question, but that was remain unanswered. The ...
updated discussion 03 Dec 2016
From time to time I receive complains from the First Responders team stating that incidents do not have all attachments visible or possible to download. We double checked the policies and all have a response rule doing the full retention of the incidents. Are we missing something? Thanks for your support.
new discussion 02 Dec 2016
Need one info,Customer is looking to secure and mask the critical information such as account details, credit card and debit cards details, pin code during the communication between bank and customer by user credentials or other encryption mechanism. They are currently doing PoC with Fortimail with secure mail feature. IN POC need to show Block all spam and unwanted mail at gateway ...
new discussion 02 Dec 2016
Hi Guys. Running messaging gateway. I have the control center behind nat on a internal ip 172 range. An external scanner is on a public ip address. When emails need to go to the control center, they are getting stuck in delivery queue. Is there anyway to get around this?
new blog entry 02 Dec 2016
As mentioned on November 10, 2016, we were made aware of a bug in Chrome version 53 that affects some Symantec, GeoTrust, and Thawte SSL/TLS certificates resulting in an untrusted error displaying when visiting affected websites.  There were no issues with the certificates used on the affected websites, but rather, the issue is entirely a Google bug with specific versions of Chrome, ...
new blog entry 02 Dec 2016
During the SEP discussion at the DC User Group meeting on Wednesday (11/30), there was some concern around SEP and ransomware protection. Below are some articles that can help (thank you to Curtis Carroll at InfoLock for sending these over): Ransomware removal and protection with Symantec Endpoint Protection - https://support.symantec.com/en_US/article.HOWTO124710.html Defeat Powerware ...
updated discussion 03 Dec 2016
Hi, When I tried was going through a report of the Infected Sites, I found "Not Applicable" in the action field. I went through other action fields in the article : https://support.symantec.com/en_US/article.TECH102052.html ; but I could not find the meaning of the action Not Applicable. I also went through one thread which had a similar question, but that was remain unanswered. The ...
updated discussion 03 Dec 2016
From time to time I receive complains from the First Responders team stating that incidents do not have all attachments visible or possible to download. We double checked the policies and all have a response rule doing the full retention of the incidents. Are we missing something? Thanks for your support.
new discussion 02 Dec 2016
Need one info,Customer is looking to secure and mask the critical information such as account details, credit card and debit cards details, pin code during the communication between bank and customer by user credentials or other encryption mechanism. They are currently doing PoC with Fortimail with secure mail feature. IN POC need to show Block all spam and unwanted mail at gateway ...
new discussion 02 Dec 2016
Hi Guys. Running messaging gateway. I have the control center behind nat on a internal ip 172 range. An external scanner is on a public ip address. When emails need to go to the control center, they are getting stuck in delivery queue. Is there anyway to get around this?
new discussion 02 Dec 2016
Hi everyone, I've been pulling my hair out trying to figure out a solution. I'm running PGP Universal Server 3.0.1. My SSL Certificate expired and I went through the process of generating a new CSR from the server. I know the new SSL certificate can't be imported in because it's in PEM format. I tried using openSSL to convert the certificate to PKCS 12 but I don't know what I'm doing because ...
updated article 02 Dec 2016
Why does this window pop up? When the Symantec Endpoint Protection Cloud (SEPC) agent is installed on a Mac and the below message appears, it means that SEPC would like to know if the service trying to use the port listed should be allowed or denied:   What can I do about it? You can select from a list of options to allow or deny the service access to the port specified on the ...
updated article 21 Nov 2016
updated article 18 Nov 2016
There are several limitations that i've run into when attempting to replace the sylink.xml file on many machines at once. The communication updater although it works great when you have a very small number of machines to move, it tends to stop working well on anything over 50 machines . On top of that, if it's unable to reach one of those machines the software doesn't just flag ...
updated article 17 Nov 2016
"Dropbox today announced Symantec has joined the Dropbox Partner Network. Expanding on an existing partnership, Symantec and Dropbox will support multiple integration initiatives, helping enterprise customers address access management and data protection challenges. In addition to network control interoperability, the agreement includes data loss prevention integration, which will allow joint ...
new blog entry 02 Dec 2016
As mentioned on November 10, 2016, we were made aware of a bug in Chrome version 53 that affects some Symantec, GeoTrust, and Thawte SSL/TLS certificates resulting in an untrusted error displaying when visiting affected websites.  There were no issues with the certificates used on the affected websites, but rather, the issue is entirely a Google bug with specific versions of Chrome, ...
new blog entry 02 Dec 2016
During the SEP discussion at the DC User Group meeting on Wednesday (11/30), there was some concern around SEP and ransomware protection. Below are some articles that can help (thank you to Curtis Carroll at InfoLock for sending these over): Ransomware removal and protection with Symantec Endpoint Protection - https://support.symantec.com/en_US/article.HOWTO124710.html Defeat Powerware ...
updated blog entry 02 Dec 2016
If you have ever worked on a crucial web service, you know that one obstacle to expanding the service is user account management and authentication services.  The days of creating a simple MySQL with PHP frontend page will not cut it anymore in any enterprise space.  The security is too limited, the asset is too valuable, and the risk is too high.  However, an investment in a ...
new blog entry 01 Dec 2016
17 種以上のマルウェアファミリーによって使われていたインフラストラクチャが摘発され、マルウェアをホストしていた Avalanche ネットワークが致命的な一撃を受ける結果となりました。この一斉摘発は、複数の国際的な法執行機関、検察局、そしてシマンテックなどのセキュリティ・IT 企業が合同で進めてきたものです。最終的に、Avalanche ネットワークの背後に潜んでいた犯罪グループが利用していた 39 のサーバーと、数十万のドメインが押収されました。 シマンテックのはたした役割 2012 ...
new blog entry 01 Dec 2016
执法机关捣毁了至少17种恶意软件共同使用的基础设施,使Avalanche恶意软件主机网络遭受重创。这次捣毁行动的由多个国际执法机构、检察部门,以及包括赛门铁克的多家网络安全及信息技术机构共同参与,没收了Avalanche ...
download comment 25 Nov 2016
updated download 31 Oct 2016
Script is intended to help with asset cleanup by searching and removing assets from a given assets list. When CCS and your asset management application are not directly connected, this script will help you perform clean-up by providing it the list of "hostnames" to be removed (asset_list.txt). Script will search for the assets that matches the "hostname" provided in the list and delete it. ...
updated download 11 Aug 2016
Symantec DCS Policy Utility v1.0.0.11 For Windows OS (Note .NET Framework 4.5 is required) Designed to help you tune your policy by processing the log files from an Agent. There's a getting started tab that explains the best steps to get the logs and events you need to troubleshoot your policy. The program does not make any changes to the machine or policy. It parses the sisidsevents and ...
updated event 29 Nov 2016
Join security experts from Novacoast and Symantec on December 14th to discuss how to leverage intelligent solutions to protect your network against ransomware, zero days, and other advanced persistent threats Advanced Threats call for Intelligent Solutions. As attacks become more complex, the tools attackers use are faster than ...
new event 28 Nov 2016
Webinar: December 8, 2016 Time: 8:00 AM (PST) / 11:00 AM (EST) Speakers: Jane Wong, Sr. Director, Product Management Gateway Security Group, Symantec and Nirav Shah, Email Security Cloud Product Marketing Manager, Symantec Email continues to be the #1 threat vector for targeted and advanced attacks.  The ubiquity of email and the widespread adoption of traditional email security solutions ...
updated event 28 Nov 2016
Please join us for the next Phoenix Security User Group meeting (with a DLP focus) on Thursday, Dec. 8 from 1:30 to 4:00 p.m. at LifeLock – 60 E. Rio Salado Parkway in Tempe. Agenda 1:30 – 2:00: Welcome and Introductions 2:00 – 2:45: Customer Presentation: Carolyn Willey, Optum – Lessons learned from our DLP 14.5 upgrade 2:45 – 3:15: Symantec DLP Presentation: Joshua Carter – ...
updated event 23 Nov 2016
Please join us for our first-ever Toronto Data Loss Prevention User Group meeting -- Thursday, February 2, 2017 at the new offices of Healthcare of Ontario Pension Plan (HOOPP): One York Street, Suite 1900, Toronto. (Note: This is a new address for HOOPP as of 12-7-16.) Lunch will be served! AGENDA: • 1:00 – 2:00: Welcome & Introductions / Networking Lunch • 2:00 – 3:00: ...
updated event 23 Nov 2016
Please join us for the next Symantec Washington D.C. Combined User Group meeting -- on Wed., Nov. 30 from 2:00 to 5:00 p.m., with an optional social hour from 5:00 to 6:30, at Convene (Tysons Corner) in McLean, VA.  Our meeting will be a good mix of customer presentation and time for discussion and networking with other Symantec Endpoint Management (Altiris), Endpoint ...
updated event 23 Nov 2016
Please join us for the next Atlanta User Group meeting on Wednesday, February 8 from 11:00 a.m. to 2:30 p.m. at the offices of Georgia System Operations Corporation (GASOC): 2100 E Exchange Pl, Tucker, GA 30084 (Training room A). Our meeting will be a good mix of customer presentation and time for discussion and networking with other Symantec Endpoint Management (Altiris), Endpoint ...
updated event 22 Nov 2016
Please join us for the next Symantec Dallas User Group meeting, January 19 from 11am to 1:30 pm – with time for networking – at the offices of Experian in Allen, TX Lunch will be served! Agenda: 11:00 – 11:30  Introductions and Symantec Security & Strategy overview -- Lewis Etheridge 11:30 – 12:15  Customer Presentation: Richard Cannon, Experian -- How We Started Our DLP ...
new event 17 Nov 2016
(The agenda will be set in early 2017.)
updated video 18 Nov 2016
This video shows how to configure a custom plugin in Symantec DLP v14.5 (but it did not change a lot since v 11.6). You need to first create a new plugin (custom) then you will configure: - Plugin name : You could use what you want, it will be visible only in plugin configuration page. - Description - Main program to run your plugin (it could be python, perl, powershell,......) - Your ...
updated video 31 Oct 2016
Data Loss Prevention 14.5 : Import Policy You are now able to import policy into a DLP enforce even if they were created with an other one. All related object (a part EDM/IDM which must be created on their own) will be imported. You can only import policy one by one (if you have performed a global export you have to extract xml file before performing import). You will be notified of impact on ...
updated video 31 Oct 2016
Data Loss Prevention 14.5 : Export policy It is now possible to export policy detail information and some related object (status,response rule,...) in order to import them to an other enforce server (cf other video). You could export one policy to an XML file or all your policies to a zip file which contains each policy XML file. XML file name contains name of the policy and a timestamp which ...
updated video 31 Oct 2016
This video shows new policy rule type available from Data Loss Prevention 14.5. We could now define some policies based on number of attachment available in an email or total size files attached to an email. this rule type is only available on SMTP flows. This new rule type is added to existing "file size" rules (which is still available but renamed "single file"). This new rule type could ...
updated video 13 Oct 2016
A common misconception is that security is not required in a containerized environement as any threat would only impact the attacked containers.  There are a number of vulnerabilities in both containers and underlying infrastructure which give attackers the ability to use a container to take over the host.  The most common risk is containers like NGiNX and MySQL which require ...
updated video 04 Oct 2016
This video forms part of a series which describes the actions administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video focusses on creating the correct user permissions in the ClientNet portal to ensure that the quarantine administrator may take all necessary actions.
updated video 04 Oct 2016
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video looks at the Quarantine options in ClientNet itself and the various options available for quarantine administrators to configure.
updated video 04 Oct 2016
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Secrurity.cloud service. In this video you will be walked through how to turn on quarantine settings for the services that are included in your bundle: either Anti-Spam only, or Anti-Spam, Data ...
updated video 03 Oct 2016
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video looks at the Quarantine portal and some of the more common actions that administrators may wish to take, such as customizing the Email Notifications that are generated to end ...
updated idea 02 Dec 2016
Hi, We noticed our users get this norton toolbar installation pop-up for their browser. Now as an administrator of my domain I don't want to let my users do anything else then work on their computer. So I want to manage the installation of this Norton toolbar on the clients in my domain. I contacted technical support for this issue but I got the answer that there is no way to control this as ...
new idea 02 Dec 2016
For an MSP account that contains multiple clients, I would like to propose the ability to set a limit on the number of installations allowed for each speicific client.  Symantec bills the MSP for # of installations. In turn the MSP bills the client for # of installations. The MSP would need to periodically double check that the # of instllations Symantec bills and what they bill the ...
new idea 02 Dec 2016
Issue mentioned in case TECH231286 is still not solved in version 14.  If it is not fixed in version 14 ,which should be fixed in v. 12.1.6.3, I think it is time to release some hotfix https://support.symantec.com/en_US/article.TECH231...
updated idea 25 Nov 2016
  i have recently updated my SEP (350)MAC CLIENTS TO 12.1.7061.6600 version after that we experimented  that a lot of  were trying to reach stats.qalabs.symantec.com domain   but this domain name could not  resolved by any DNS server(internal nor External,,, example http://network-tools.com/),this domain name no longer exists,we resolved the problem ...
new idea 24 Nov 2016
It would be important to be able to prevent and / or register attachments downloads sent within Web Email Protection. 
new idea 23 Nov 2016
When an intruding incident occurs, the IP address of current PC is important when deciding how to deal with it.  For example, when an incident occurs while you are outsite of company or  when an incident occurs while you are inside the company, how we choose to respond  will be changed. If there are serveral bases, the current IP address can judge whether you are ...
updated idea 23 Nov 2016
When an intruding incident occurs, the physical position of the current PC is important in deciding how to deal with it. For example, when an incident of intrusion occurs while they are out and when an incident occurs while they are inside the company, the subsequent action will change. In case of an intrusion incident within the company, if it is a clear attack, you have to investigate the ...
Member Name
Reward Points
All Time
Member Name
Reward Points
Last 30 Days
Member Name
ArticlesSolved
Mithun Sanghavi
1,264
60
SMLatCST
422
1
jjesse
106
24
ℬrίαη
2,606
21

A Message From Your Community Manager: Jami

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.