Video Screencast Help

Vulnerabilities & Exploits

Results for Vulnerabilities & Exploits

In SMG, there is a "feature" for the Suspected Virus Quarantine, that automatically releases email after 24 hours if it is still there and no one has deleted it. 24 hours is the maximum allowed time limit. I am told that this triggers the ...
Idea by Keri King | 03 Jul 2017 | 0 comments
I do not need a solution (just sharing information) Symantec Control Compliance Suite provides a mechanism to quickly identify the computers on which the Microsoft Security Bulletin ...
Forum Discussion by AndyN | 29 Jun 2017 | 0 comments
Hello All, On June 27th, 2017 we all became aware of a new variant of the Petya malware which is spreading over the Microsoft Windows SMB protocol. The malware appears to use the ETERNALBLUE exploit tool to accomplish this. This is the same exploit ...
Article by Mithun Sanghavi | 28 Jun 2017 | 0 comments
https://www.symantec.com/about/webcasts?commid=259917 Thu, 29 June, 2017 - 10:00 - 11:00 PDT ...
Event by Mary Verducci | 20 Jun 2017 | 0 comments
In April 2017, an attack group calling itself the TheShadowBrokers, released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and tools the attack group state were used by Equation. ...
Article by Brandon Noble | 20 Jun 2017 | 0 comments
I need a solution Below is what I am seeing when I press F-12 while I am logged into my email. Any ideas on how to stop the hijacking of my email. I have limited cookies and even tried ...
Forum Discussion by Jesse Zumwalt | 14 Jun 2017 | 0 comments
I have PR.COMET.YAHOO.COM/COMET (among other things like commands written into the coding or element of the email service) running rampant on my computer IN MY EMAIL. WHY does Symantec feel it beneath them to allow some kind of mitigation, or the ability ...
Idea by Jesse Zumwalt | 12 Jun 2017 | 0 comments
Bonjour, Il serait plus que souhaitable que les clés échangées pour se loguer sur le site : https://hostedendpoint.spn.com soit en ECDHE, comme pour le site global de Symantec : https://www.symantec.com  plutôt qu'en RSA. Un simple ...
Idea by sscfss | 19 May 2017 | 0 comments
Many of your customers are expressing an urgent need to receive Attacker IP Address in SEP email alerts . In addition, I would like to find this information somewhere in the affected computer's log files or Windows event log . Without ...
Idea by IT User 123 | 19 May 2017 | 0 comments
I need a solution I am looking for your expert advice on blocking port 135 and 445 in our corporate environment on servers i.e 2008,2012,2003 What are the functionalities we will ...
Forum Discussion by interchk | 14 May 2017 | 2 comments