Petya Ransomware - Next Global Threat
Hello All,On June 27th, 2017 we all became aware of a new variant of the Petya malware which is spreading over the Microsoft Windows SMB protocol. The malware appears to use the ETERNALBLUE exploit...
View ArticleWhats new in CCS SCU 2017-1
Following are the highlights of the SCU 2017-1:New featuresThe SCU 2017-1 includes the following new features:Command-based data collection support for UNIX platform From SCU 2017-1 onwards,...
View ArticleData Loss Prevention Bespoke Flex Responses
Protirus were asked to solve the problem of providing additional functionality to Symantec’s DLP Endpoint Agent without impacting the end user. We did this by creating a development framework that...
View ArticleThe Ultimate WordPress Plugin Security Testing Cheat Sheet
The security documentation provided by WordPress and found online for plugin security is sparse, outdated or unclear. This cheat sheet is intended for Penetration Testers who audit WordPress plugins or...
View ArticleSymantec Endpoint Protection Start Quick Guide
This will helps download, install and configure Symantec Endpoint Protection (SEP) and desinged for defult, first time managed client installation of 500 or fewer.Preinstall: Check System...
View ArticleHow to read / parse what the current definitions are on Symantec Endpoint...
Dear All,I'd tried to get information about how to read current definitions on Symantec via Python on your site but unfortunately I could not. After that I tried to get it by myself and created on...
View ArticleA guide of Endpoint Protection files on FileConnect
Hello again, With your serial number when you log on to fileConnect for SEP (Symantec Endpoint Protecation). There are the file that you can download. What you download from...
View ArticleSecure One Services: SGARS
Lorem ipsum dolor sit amet, mei idque nihil cu. Dicta diceret mel ad. Nam te omnis petentium, movet ubique nec ad, ei dicant graeco quaestio quo. Nam causae omnium quaestio ex, ne nonumy maiestatis...
View ArticleSecure One Services: Resources
Lorem ipsum dolor sit amet, mei idque nihil cu. Dicta diceret mel ad. Nam te omnis petentium, movet ubique nec ad, ei dicant graeco quaestio quo. Nam causae omnium quaestio ex, ne nonumy maiestatis...
View ArticleInstallation guide of SEP 12.1 in windows 7
This is only for windows 7 and installation of SEP 12.1 --> First Download SEP_Package_unmanaged from following linkDownload the latest version of Symantec Endpoint Protection--> After Download...
View ArticleA Graphical Guide to Implement Remote EDM Indexing
Think about this scenario: a department neet to protect an account and password table, but, it cannot be provided to the DLP administrator to create the EDM index as it's sensitive to other...
View ArticleCall to Action - SEP Deep Dive - Understanding Sylink Debugging/Logging
Who: SEPM Administrator What: Sylink Debugging/Logging When: When you determine there is a communication issue between SEP client(s) and the SEPM Where: Enabled via the registry (Windows) Why:...
View ArticleScript: Checking if a sample is detected as malware by Symantec by its hash
On the Symantec site, you can not search malwares by its hash, as for now. I made two scripts to help you, if there is a need to check a lot of hashes. You will need a free VirusTotal account, to use...
View ArticleAre your Trusted Workloads Protected!?
The Zero Trust Model, a conviction where by both internal and external entities can never be trusted, is a mature security principle seen in cyber security as Nirvana which has become quite relevant...
View ArticleHappy SysAdmin (System Administrator) Day!
SysAdmin Day is an annual event celebrated on the last Friday in July and exists to show appreciation for the work of Sys Admins and other IT workers.Your network is secure, your computer is up and...
View ArticleHow to utilize SEP for Incident Response - PART 10
This article is the tenth installment in an on-going series of articles on how to utilize SEP for Incident Response. The complete index to my SEP Incident Response articles can be found here:How to...
View ArticleHow to utilize SEP for Incident Response - Complete Index
Below are links to my articles on using SEP for incident response with a brief description of what each one entails. Please feel free to have a look and leave questions, comments, or feedback. Ideas...
View ArticleSymantec DLP Enforce GUI SSL Certificate: Create and Import
Note: The following is based on Symantec Data Loss Prevention v.14.6.01. Always backup your system before making any modifications.Creating / Importing the New .Keystore, Certificate Signing Request...
View ArticleRequired systems for Endpoint Protection 12.1.6 MP7 and MP8
The system requirements for (SEPM) Symantec Endpoint Protection Manager and the (SEPC) Symantec Endpoint Protection clients are the same as those of the operating systems on which they are...
View ArticleWhat NOT to Click
IntroductionThis is the eighteenth in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View Article