Video Screencast Help
We've launched some major improvements to the interface and community structure. Learn about them here!
updated discussion 28 Jun 2017
Hi;     My SEP server 14MP1 (new installtion), does not download the update for SEP clients 12.1.6MP4 I checked at console level "Console SEP -> Admin -> Servers -> Local Site -> Show LiveUpdate downloads, I have not found the SEP 12.1.6MP4 update Is that I can add the SEP 12.1.6MP4 update to the server manually or there is a method to do it
new discussion 28 Jun 2017
How can i monitor the application control without blocking? Thanks
updated discussion 28 Jun 2017
Hi, I send a mail to 'CLOUDfeedback@feedback-87.brightmail.com' yesterday, with some false positive mails attached. When sending mails to customers, who we regularly stay in touch with, we keep receiving this 553 error. It just suddenly started to happen. We haven't made any changes to our setup, so i really don't understand why we suddenly gets these errors? We really need to be able to ...
updated discussion 28 Jun 2017
Hi;     My SEP server 14MP1 (new installtion), does not download the update for SEP clients 12.1.6MP4 I checked at console level "Console SEP -> Admin -> Servers -> Local Site -> Show LiveUpdate downloads, I have not found the SEP 12.1.6MP4 update Is that I can add the SEP 12.1.6MP4 update to the server manually or there is a method to do it
new discussion 28 Jun 2017
How can i monitor the application control without blocking? Thanks
updated discussion 28 Jun 2017
Hi, I send a mail to 'CLOUDfeedback@feedback-87.brightmail.com' yesterday, with some false positive mails attached. When sending mails to customers, who we regularly stay in touch with, we keep receiving this 553 error. It just suddenly started to happen. We haven't made any changes to our setup, so i really don't understand why we suddenly gets these errors? We really need to be able to ...
new article 22 Jun 2017
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that allegedly detail activities and capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016 and again allegedly include details on the agency's software capabilities, such as the ability to compromise cars, ...
updated article 22 Jun 2017
In April 2017, an attack group calling itself the TheShadowBrokers, released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and tools the attack group state were used by Equation. TheShadowBrokers said that the data dump was a sample of what had been stolen from hacking Equation and that the “best” files would be auctioned ...
new article 13 Jun 2017
Hello DLP Users.. I wanted to share some information on how to get DLP to Scan using SSH. I had a customer who wanted to scan their File Server (EMC Isilon), but NOT all of the File System was accesible via NFS or CIFS shares. They were able to provide me a ROOT account that I could SSH directly to the File server. So I began to figure out how to be able to Mount a file system using SSH as ...
new article 13 Jun 2017
  Hello DLP Users.. I wanted to share some information on how to get DLP to Scan Amazon AWS Buckets. I had a customer who wanted to scan their Amazon AWS Storage (S3), there is no documentation on how to do this and it is currently NOT supported by Symantec So I began to figure out how to be able to Mount a S3 file system using fuse. This lead me to S3FS! S3FS is a FUSE (File System in ...
new blog entry 27 Jun 2017
昨晚,一个名为Petya的勒索软件开始大肆传播,许多企业遭遇攻击。与WannaCry勒索病毒类似,Petya同样是利用 “永恒之蓝” 漏洞实现传播。 企业是否能够抵御Petya勒索软件攻击? Symantec Endpoint Protection(SEP)解决方案和诺顿产品能够主动帮助用户抵御Petya勒索软件利用 “永恒之蓝” ...
updated blog entry 27 Jun 2017
2017 年 6 月 27 日、Petya ランサムウェアの新種が拡散を始め、多くの組織に影響を及ぼしています。WannaCry と同様、Petya も悪用コード Eternal Blue を利用して拡散します。 Petya ランサムウェアに対する保護の状況 Symantec Endpoint Protection(SEP)とノートン製品をお使いのお客様は、Eternal Blue による Petya 拡散の試みから、プロアクティブに保護されています。SONAR の動作検出テクノロジでも、Petya への感染に対する保護が有効です。 シマンテック製品は、Petya のコンポーネントを Ransom.Petya として検出します。 Petya とは何か Petya は、2016 ...
updated blog entry 27 Jun 2017
A new strain of the Petya ransomware started propagating on June 27, 2017, infecting many organizations. Similar to WannaCry, Petya uses the Eternal Blue exploit as one of the means to propagate itself. Am I protected from the Petya Ransomware? Symantec Endpoint Protection (SEP) and Norton products proactively protect customers against attempts to spread Petya using Eternal Blue. SONAR ...
updated blog entry 27 Jun 2017
Presidential budget requests can always be a little hard to decipher. By the time congressional leaders make their changes, the budget that gets passed usually looks little like the one that was first proposed. With that said, the budget request provides insight into the administration’s priorities. With President Trump having released his 2018 budget request the question for state and local ...
updated blog entry 27 Jun 2017
The “Identify” function of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) lays the groundwork for all cybersecurity actions that will follow. After all, it’s only possible to protect what you know exists. In the second part of Symantec’s webinar series demystifying the NIST CSF for Healthcare, Symantec’s Axel Wirth and Vishal Gupta highlighted the key ...
updated blog entry 26 Jun 2017
Introduction:CIO Sheila Jordan We’re back with our fifth in a series of IT Showcase blogs that chronicle our IT transformation journey over the past three years. Our topic today is how best to use and manage your offshore teams, authored by Himanshu Shah, IT Vice President of our India operations. With so many companies using offshore teams, it is important to keep these teams connected, ...
updated blog entry 26 Jun 2017
There was a very large, sophisticated phishing attack on May 3 using a malicious application called Google Docs. This attack and others like it can be identified, tracked and remediated in CloudSOC.  How users experienced the attack Users received a phishing email with an invitation to view a Google document from one of their contacts. Users who clicked on it were redirected to ...
updated blog entry 26 Jun 2017
We are so happy to announce that we did it! We created the industry’s first integrated cloud security solution with true enterprise DLP and full cloud access security broker (CASB) capabilities. And it’s available now. From the moment the Symantec acquisition of Blue Coat closed in August, our joined development teams went all in to solve this critical issue.  And we did it in just over ...
updated download 22 Jun 2017
This Page has information on AWS Cloud formation Template (CFT) based test drive that can be used by CWP users to validate CWP features. This template automates the creation of instances, subnets, VPC's etc. Multi-tier Organisation Setup ABC Trade Corporation is a leading multi-national company. It has typical N-tier architecture, separating front-end and back-end of the organisation. Each ...
updated download 24 Apr 2017
Symantec DCS Policy Utility v1.0.0.11 For Windows OS (Note .NET Framework 4.5 is required) Designed to help you tune your policy by processing the log files from an Agent. There's a getting started tab that explains the best steps to get the logs and events you need to troubleshoot your policy. The program does not make any changes to the machine or policy. It parses the sisidsevents and ...
updated download 17 Apr 2017
The database space reclamation utility lets you reclaim unused incident LOB space in your Symantec Data Loss Prevention Oracle 11g Standard database. This can use the database space reclamation utility after migrating incident attachments to external storage, or after deleting a large number of incidents.
updated event 27 Jun 2017
NetX a Symantec Authorized Training Partner (ATP) delivers Instructor-led Training Classes either on-site or remotely.  We offer over 20 different Symantec Classes, for a complete list please visit netxinc.com/training Attend from your home, office or one of our convenient locations.   Our training classes are Guaranteed to Run, We Never Cancel!  Next Class: July ...
updated event 26 Jun 2017
2 Min Video:  Speaker: Mark Urban, VP Prod Mgmt / Prod Mktg, Symantec This short video highlights the key capabilities of Secure Web Gateway proxies that enterprises need to implement to secure their use of web and cloud applications.  View Today (click here)
new event 26 Jun 2017
2 Min Video: On-Demand: Comparing Next Generation Firewalls to Proxy Speaker: Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Learn about the complementary capabilities of Secure Web Gateways and Next Generation Firewalls and why each is important in an enterprise’s security infrastructure View Now (Click Here)
updated event 26 Jun 2017
2 Min Video On Demand: Taking Proxy to the Cloud Speaker: Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec This quick video reviews the important capabilities a cloud-based proxy solution can provide enterprises and discusses key aspects of Symantec’s Web Security Service. View Now (click here)
new event 26 Jun 2017
2 Min Video: Watch On-Demand: Protecting Sensitive Data in the Cloud Speaker: Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Protecting Sensitive Data in the Cloud: In this short video learn how Proxy and DLP enables information security on prem or in the cloud. View Now (Click Here)
new event 26 Jun 2017
On-Demand Webinar: The Power of Proxy Speaker: Timothy Chiu is a Senior Director of Product Marketing for Symantec ​ Have you wondered why security companies use proxy technology? Listen to our recorded webinar on the “Power of the Proxy” and find out why proxy architecture is the most secure technology available on the network, and how it enables the most advanced security products ...
updated event 20 Jun 2017
Symantec has just released new advanced threat protection capabilities for Messaging Gateway 10.6 based on integration with Symantec's Content & Malware Analysis platform. This new advanced threat defense option for Messaging Gateway provides offloading of messages to Content & Malware Analysis for further inspection and comprehensive malware detonation.  Join Symantec product ...
updated event 19 Jun 2017
Please join us for the next Columbus Data Loss Prevention User Group meeting, Tuesday June 20, 2017, from 12 noon to 4:00 pm -- at the offices of DSW in Columbus. Food will be served! Location: DSW Designer Shoe Warehouse – 810 DSW Drive, Columbus, OH 43219. Tentative Agenda: 12:00 - 1:00:  Networking lunch at DSW's Cafe! 1:00 - 2:00:    Symantec Presentation - ...
new video 27 Apr 2017
This video forms part of a series which describes the actions administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video focuses on creating the correct user permissions in the ClientNet portal to ensure that the quarantine administrator may take all necessary actions.
new video 27 Apr 2017
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video looks at the Quarantine portal and some of the more common actions that administrators may wish to take, such as customizing the Email Notifications that are generated to end ...
new video 27 Apr 2017
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Security.cloud service. This video looks at the Quarantine options in ClientNet itself and the various options available for quarantine administrators to configure.
updated video 27 Apr 2017
This video forms part of a series which describes the actions that administrators will need to take in order to setup the Symantec Email Quarantine when they are using the Symantec Email Secrurity.cloud service. In this video you will be walked through how to turn on quarantine settings for the services that are included in your bundle: either Anti-Spam only, or Anti-Spam, Data Protection ...
updated idea 27 Jun 2017
SEPM's home screen has a dashboard where Out-of-Date clients can be easily viewed. However, there is no way to sort the list that pops up. We have a large environment sorted by group, so this makes tracking down and fixing OoD clients extremely inconvenient. A feature that allows filtering would make dealing with problem clients much easier. For example, if we could sort clients by group, ...
new idea 27 Jun 2017
ATP should be able to change timezone -> we can easy to review incidents or events in real time b/c we dont need to do calculation :) Openldap should be officially supported by Symantec DLP.
new idea 26 Jun 2017
For those of us who run Linux with 64-bit filesystems (XFS which is the default for Red Hat/CentOS these days), need support from SEP to scan 64-bit inodes.  Without support, we will be forced to change our AV solution to meet policy requirements pertaining to AV since current SEP cannot support it.  I would not be surprised to find many government agencies and companies in this same ...
new idea 26 Jun 2017
SEP 14 Application control logs arguments used by applications blocked by application control. The complete arguments can be found on the client, but it seems like SEPM truncate the logs so you can't see the entire argument. This is quite annoying. This should be easy to fix and is most likely caused by a max string size in the database.
new idea 21 Jun 2017
In SEPM 14 (MP1 and MP2) the feature Add a Computer has been removed. Previously when you right click on a container under Clients. The drop down menu provided an option to Add a Computer. That feature has been completly removed from SEPM 14. We were using this feature on a daily basic. Please put it back.
new idea 20 Jun 2017
Currently, you cannot select multiple workstations if you convert it from Computer Mode to User Mode or vice versa.
new idea 20 Jun 2017
Request: Add support for %USERPROFILE% environment variable to Custom Exclusions Path Macro. Use Case: Current Path Macros focus on all user pathing but do not provide coverage for per user pathing.  It is difficult to exclude common resources used by many users which are stored under per user pathing.
updated idea 20 Jun 2017
Request: Add support for environment variables in exclusions. Use case: Resources with variable pathing based on environmental variables are difficult to exclude.  As an example resources stored under "%USERPROFILE%\Application\Extensions" would require a static exception for every user in the environment which needs their Extensions folder excluded.
new idea 19 Jun 2017
There used to be a setting to never log out of the remote Java console. I have multiple customers who have the SEPM console up in their NOC's and they constantly have to log back in. This is the only console in their BNOC that times out.
Member Name
ArticlesSolved
Mithun Sanghavi
1,267
60
SMLatCST
435
1
jjesse
107
24
ℬrίαη
2,794
22

A Message From Your Community Manager: RGMDonaldson

Welcome to the Security Community on Symantec Connect.

The Security Community covers many different security products from Symantec and provides valuable technical information for each.

Please feel free to contact me via private message with any questions you may have.

I look forward to hearing from you and answering any questions about the Community.

Login to contact the Community Manager.