Support Perspective: W97M.Downloader Battle Plan
IntroductionThis is the tenth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleSecurity Advisories Relating to Symantec Products : SYM15-011
Hi ,A recent vulnerability has been identified and it is SYM15-011 and all SEP 12.1.x versions are affected.To fix the vulnerability either the SEPM or the clients needed to upgraded to 12.1.6 MP3For...
View ArticleMick's Greatest Hits: Index of Helpful Connect Security Articles
IntroductionBy popular demand, below is an index of my Connect articles. Illustrated, semi-formal and mildly amusing, I hope they assist admins and individuals along their neverending quest to find a...
View ArticleHow BCS Customers can Sign Up for Alerts and Notifications
IntroductionThis is number eleven in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleStress testing of the DLP environment while improving detection capabilities
Most of us run the DLP Solution under different banners. Most of us call it the Data Loss Prevention program while some call it the Malicious insider Program or even the Data Breach Prevent program as...
View ArticleHow to decrypt the drive from Windows PE (Symantec Encryption Desktop 10.x)
In order to be able to boot affected machine using the Recovery CD, you need to create first custom Windows PE iso, which can be then burned on CD. Here is the document which describes in details the...
View ArticleDoes Symantec Detect This: An Illustrated Guide to Public Hash Submission
IntroductionThis is number twelve in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleSEP Manual Castellano
Buenas,Como es complicado acceder a los recursos en castellano, os adjunto los enlaces donde podeis descargar.Manual SEP 12.1.6 Guía de administración e instalación de Symantec™ Endpoint Protection...
View ArticleEnforce HTTPS certificate upgrade/replace
If you want to use your own certificate when connecting by HTTPS to an Enforce console, you can take advantage of Java "keytool" utility. You can find a lot of guidelines on the internet. One of them...
View ArticleSymantec Endpoint Protection Small Business Edition Adds Consumer Features...
In mid-January 2016, Symantec began releasing an update to the Endpoint Protection component of their cloud-based Endpoint Protection Small Business Edition offering. The cloud Agent itself is a...
View ArticleCombined Protection against w32.Ramnit!.html : DCS:SA and SEP
Real Use Case:An Apache Web Server was compromised and the following folders were used to store malware code. /home/XXX/public_html/XXXX/...
View ArticleSymantec Endpoint Protection : Virus Incident Management
Hi All,As I am working on Symantec Endpoint Protection 12.1.since more than year, I went through different issues on Symantec Manager and client and most important different Viruses, Worms and Trojans....
View ArticleBlock specific Chrome browser extensions with a SEP Application Device...
Using ADC to block Chrome extensionsThere may be situations where you wish to block end-users from utilizing a specific Google Chrome browser extension. This can be accomplished, fairly easily, via...
View ArticleWhy Would a Security Product Interfere with Windows Task Scheduler?
One day, you look in the Windows Task Scheduler and see the message:The selected task “{0}” no longer exists. To see the current tasks click RefreshWell after you click OK and then click Refresh, you...
View ArticleWindows DCS Agent Installation steps
Windows DCS Agent InstallationManual InstallIn the Welcome panel, click Next.In the Agent Configuration panel, accept or change the default settings and then click on NextIn the Management Server...
View ArticleStandard Practice to manage Symantec Endpoint Protection Client related issues
Roles and responsibilities as Symantec AdminMonitor client-to-SEPM communication.Maintain a Symantec Endpoint Protection environment.Upgrade the Symantec Endpoint Protection environment.Monitor and...
View ArticleHow a Data Loss Prevention (DLP) Solution can help achieving PCI 3.0 compliance?
The PCI 3.0 Standards touches the lives of hundreds of millions of people worldwide (as stated by the Security Standards Council themselves). A global organization, it maintains, evolves and promotes...
View ArticlePowershell Script to Sync with Active Directory Sites and Services Subnets
Hello,I wanted to share this in case if this can be of help to other SEPM admins.Problem: Default group or the default installation group in SEPM keeps getting populated by machines every time there...
View ArticleStrengthening anti-virus security to prevent Ransom-ware derivative...
Because of increasing number of CryptoLocker-like infections, attacks and fast malware mutations the need to enforce the user application policy in our SEP managed systems became urgent.Presently, the...
View ArticleFile Share Encryption configuration
The purpose of this article is to show how to properly configure File Share Encryption using Symantec Encryption Desktop (SED) and/or Symantec Encryption Management Server (SEMS). It is assumed that...
View Article