How to point DCS Server to migrated SQL database.
After the SQL database has been migrated to a new instance the "server.xml" file will need to be updated with the new database information. The default location of this file on the DCS Server is as...
View ArticleHow to collect and add fingerprint of any app or location to SEP manager...
Hi all,In this article, I will explain the procedure to collect file fingerprint of any file or location within the system and add the same to Symantec Endpoint Protection Manager.So, Let's get...
View ArticleRansomware Discovery
Hi All,Theseday we are hearing many cases of ransomware infection which is not only badly impacts bussiness but also the crticial data. As this virus encrypt the sensetive data with private key...
View ArticleHow to install SEPM 14 MP1 with embedded database (Graphical)
Dear all,This tutorial will give the overall ideal on how to install newly available Symantec Endpoint Protection 14 MP1 with embedded database.So lets get started -Step 1 - Download and extract the...
View ArticleHow to disable Device Control switch option in SEP 14.0 for Mac
Steps to disable Device Control switch option in SEP 14.0 for Mac within Client Management Settings.From version SEP for Mac 14.0.x & later, there is now an switch option to enable/disable for...
View ArticleRansomware Preventive Methodology
Hi All,As I shared the little research, history and different ways how ransomware propagates into the network and system, now this article will be focused on prevention methodology which is prepared...
View ArticleCreating Custom Content Filtering Policy in Symantec Messaging Gateway
In this article, a brief description is given about how to create a custom content filtering policy in Symantec Messaging Gateway.The steps are as below:Log in the Symantec Messaging Gateway GUI...
View ArticleHow to check specific process with Host Integrity Policy
Is it possible to monitor specific progress status with Host Integrity (HI) policy in endpoint protection? The answer is yes.Here is a simple example of how to set the requirement in HI policy. Details...
View ArticleBlacklisting and Whitelisting Domains and e-mail Address in Symantec...
Blacklisting and White listing domains in Symantec Messaging Gateway 10x: 1. Log On to Symantec Messaging Gateway.2.1 Blacklisting a domain: (a) Go To Reputation> Policies> Bad Senders.(b)...
View ArticleExceptions, Illustrated: Part One
IntroductionThis is the sixteenth in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleExceptions, Illustrated: Part Two
IntroductionThis is the seventeenth in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleScript: Checking if a sample is detected as malware by Symantec by its hash
On the Symantec site, you can not search malwares by its hash, as for now. I made two scripts to help you, if there is a need to check a lot of hashes. You will need a free VirusTotal account, to use...
View ArticleHelp us spread the word about SEP 14 and get a $25 Amazon gift card!
It’s simple: Click here and log into G2 Crowd using your LinkedIn Account. You must contribute a detailed, balanced and complete review! After your review is verified, G2 Crowd will send the first...
View ArticleHelp us spread the word about DLP and get a $25 Amazon gift card!
It’s simple: Click here and log into G2 Crowd using your LinkedIn Account. You must contribute a detailed, balanced and complete review! After your review is verified, G2 Crowd will send the first 40...
View ArticleSupport Perspective: PUA.Winexe
In May of 2017, Symantec added a Risk detection for the tool Winexe.Winexe is a Linux based application that allows the execution of commands remotely on Windows based OSes. It installs a service on...
View ArticleSystem requirements for Endpoint Protection 14
System requirements for Symantec Endpoint Protection Manager and the Symantec Endpoint Protection clients are the same as those of the operating systems on which they are supported.Symantec Endpoint...
View ArticleData Loss Prevention DLP and Scanning Amazon AWS S3 and using S3FS
Hello DLP Users..I wanted to share some information on how to get DLP to Scan Amazon AWS Buckets.I had a customer who wanted to scan their Amazon AWS Storage (S3), there is no documentation on how to...
View ArticleData Loss Prevention DLP and Scanning via SSH and using SSHFS
Hello DLP Users..I wanted to share some information on how to get DLP to Scan using SSH.I had a customer who wanted to scan their File Server (EMC Isilon), but NOT all of the File System was accesible...
View ArticleSupport Perspective: TheShadowBrokers and Equation Tools
In April 2017, an attack group calling itself the TheShadowBrokers, released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and...
View ArticleSupport Perspective: Vault 7
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that allegedly detail activities and capabilities of the United States Central Intelligence Agency to perform...
View Article