Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 818 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Petya Ransomware - Next Global Threat

Hello All,On June 27th, 2017 we all became aware of a new variant of the Petya malware which is spreading over the Microsoft Windows SMB protocol. The malware appears to use the ETERNALBLUE exploit...

View Article


Whats new in CCS SCU 2017-1

Following are the highlights of the SCU 2017-1:New featuresThe SCU 2017-1 includes the following new features:Command-based data collection support for UNIX platform From SCU 2017-1 onwards,...

View Article


Image may be NSFW.
Clik here to view.

Data Loss Prevention Bespoke Flex Responses

Protirus were asked to solve the problem of providing additional functionality to Symantec’s DLP Endpoint Agent without impacting the end user. We did this by creating a development framework that...

View Article

The Ultimate WordPress Plugin Security Testing Cheat Sheet

The security documentation provided by WordPress and found online for plugin security is sparse, outdated or unclear. This cheat sheet is intended for Penetration Testers who audit WordPress plugins or...

View Article

Image may be NSFW.
Clik here to view.

Symantec Endpoint Protection Start Quick Guide

This will helps download, install and configure Symantec Endpoint Protection (SEP) and desinged for defult, first time managed client installation of 500 or fewer.Preinstall: Check System...

View Article


How to read / parse what the current definitions are on Symantec Endpoint...

Dear All,I'd tried to get information about how to read current definitions on Symantec via Python on your site but unfortunately I could not. After that I tried to get it by myself and created on...

View Article

A guide of Endpoint Protection files on FileConnect

Hello again,            With your serial number when you log on to fileConnect for SEP (Symantec Endpoint Protecation). There are the file that you can download.             What you download from...

View Article

Secure One Services: SGARS

Lorem ipsum dolor sit amet, mei idque nihil cu. Dicta diceret mel ad. Nam te omnis petentium, movet ubique nec ad, ei dicant graeco quaestio quo. Nam causae omnium quaestio ex, ne nonumy maiestatis...

View Article


Secure One Services: Resources

Lorem ipsum dolor sit amet, mei idque nihil cu. Dicta diceret mel ad. Nam te omnis petentium, movet ubique nec ad, ei dicant graeco quaestio quo. Nam causae omnium quaestio ex, ne nonumy maiestatis...

View Article


Image may be NSFW.
Clik here to view.

Installation guide of SEP 12.1 in windows 7

This is only for windows 7 and installation of SEP 12.1 -->  First Download SEP_Package_unmanaged from following linkDownload the latest version of Symantec Endpoint Protection--> After Download...

View Article

Image may be NSFW.
Clik here to view.

A Graphical Guide to Implement Remote EDM Indexing

Think about this scenario: a department neet to protect an account and password table, but, it cannot be provided to the DLP administrator to create the EDM index as it's sensitive to other...

View Article

Call to Action - SEP Deep Dive - Understanding Sylink Debugging/Logging

Who: SEPM Administrator What: Sylink Debugging/Logging When: When you determine there is a communication issue between SEP client(s) and the SEPM Where: Enabled via the registry (Windows) Why:...

View Article

Script: Checking if a sample is detected as malware by Symantec by its hash

On the Symantec site, you can not search malwares by its hash, as for now. I made two scripts to help you, if there is a need to check a lot of hashes. You will need a free VirusTotal account, to use...

View Article


Are your Trusted Workloads Protected!?

The Zero Trust Model, a conviction where by both internal and external entities can never be trusted, is a mature security principle seen in cyber security as Nirvana which has become quite relevant...

View Article

Image may be NSFW.
Clik here to view.

Happy SysAdmin (System Administrator) Day!

SysAdmin Day is an annual event celebrated on the last Friday in July and exists to show appreciation for the work of Sys Admins and other IT workers.Your network is secure, your computer is up and...

View Article


Image may be NSFW.
Clik here to view.

How to utilize SEP for Incident Response - PART 10

This article is the tenth installment in an on-going series of articles on how to utilize SEP for Incident Response. The complete index to my SEP Incident Response articles can be found here:How to...

View Article

How to utilize SEP for Incident Response - Complete Index

Below are links to my articles on using SEP for incident response with a brief description of what each one entails. Please feel free to have a look and leave questions, comments, or feedback. Ideas...

View Article


Symantec DLP Enforce GUI SSL Certificate: Create and Import

Note: The following is based on Symantec Data Loss Prevention v.14.6.01. Always backup your system before making any modifications.Creating / Importing the New .Keystore, Certificate Signing Request...

View Article

Required systems for Endpoint Protection 12.1.6 MP7 and MP8

The system requirements for (SEPM) Symantec Endpoint Protection Manager and the (SEPC) Symantec Endpoint Protection clients are the same as those of the operating systems on which they are...

View Article

Image may be NSFW.
Clik here to view.

What NOT to Click

IntroductionThis is the eighteenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article
Browsing all 818 articles
Browse latest View live