Ransomware and other threats - High Risks on Android Devices.
It has been reported that a new ransomware called DoubleLocker targeting Android devices. The malware spreads through counterfeit applications (mostly fake Adobe Flash Player) via compromised websites....
View ArticleNow You Can Protect Your AWS S3 Buckets Too! Symantec Introduces Cloud...
Many organizations are migrating workloads to Amazon Web Services (AWS), seeking improved business agility, operational efficiency, and cost savings. Some are even going “all-in” with AWS, choosing to...
View ArticleHow Does Symantec Email Security Stack Up Against the Competition?
Email is by far the most popular method for attackers to spread malware and breach organizations, as the ubiquity of email and ease of impersonation makes email attacks lucrative for cybercriminals....
View ArticleWhat You Can Do About Powershell Threats
IntroductionThis is the twentieth in my Security Series of Connect articles. For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...
View ArticleNovember 28, 2017
In this release, we've made it even easier to manage SEP Cloud.Two-factor authentication for administrators - simple and secureWith the flip of a switch, you can now ensure that all of your...
View ArticleCollect full memory dump of a VMware virtual machine (VM)
First of all, We will download the files locally in a windows 7 Machine and later on, we will use the vmss2core tool locally to convert to .DMP file.1) Download and install vmss2core tool:1.1 Navigate...
View ArticleRecolectar un volcado completo de memoria en máquina virtual (VM)
En primer lugar, descargaremos los archivos localmente en una máquina , en este caso Windows 7 y más adelante, usaremos la herramienta vmss2core localmente para convertirla a un archivo .DMP1)...
View ArticleDecember 14, 2017
In this release, we continue to improve SEP Cloud with user experience enhancements and bug fixes.Better support for the latest versions of Mac and iOS.The OS Distribution widget on the Dashboard now...
View ArticleHow to fix CIS Microsoft Windows Server 2012 R2 v2.2.0/v2.2.1
Predefined CCS Technical standards "CIS Microsoft Windows Server 2012 R2 v2.2.0" and "CIS Microsoft Windows Server 2012 R2 v2.2.1" have issue with following checks:1.2.3 Is the 'Reset account lockout...
View ArticleData Center Security: Meltdown and Spectre Situation Update
Meltdown and Spectre Situation UpdateTwo newly discovered processor chip vulnerabilities, dubbed Meltdown and Spectre, could permit attackers to gain unauthorized access to a computer’s memory. Spectre...
View ArticleMeltdown & Spectre Vulnerability: Symantec Critical System Protection
Meltdown & Spectre Vulnerability: Symantec Critical System ProtectionA series of new vulnerabilities has been discovered which affect the processor chips and potentially permits attackers to gain...
View ArticleHow to exclude particular Files and Folders from all Scanning on SEPM(GUI based)
How to exclude particular Files and Folders from all Scanning on SEPMIn Symantec console Go to Policies Tab --> ExceptionsRight Click on Blank Space and Choose AddGive name to PolicyChoose Add...
View ArticleChanging Dynamic Sub Partitions.
This issue was found on version 11.9.1.4 Build 209785 When changing a dynamic subpartition only new partitions created from that time on will have the new characteristics. Existing dynamic...
View ArticleHandy SQL Queries for SEPM v14
Below is a handy collection of SQL queries that might be useful for day to day admin work. All of these queries has been tested & confirmed as working for SEPM v14.Fancy reading up the Database...
View ArticleSymantec DCS 6.7 Management Server pictured Installation.
Symantec DCS 6.7 Server installation step by step as shown below:1.Install management server, for that extract the setup, locate DCS server advanced folder--> double click server.exe to install the...
View Article关于对 macOS 10.13 上 Symantec Endpoint Protection 的内核扩展进行授权
从 macOS 10.13 起,要求对内核扩展 (kexts) 进行授权是一项新安全功能:https://developer.apple.com/library/content/technotes/tn2459/_index.htmlSymantec Endpoint Protection 14.0.1 增加了对 macOS 10.13 的支持。您必须对 Symantec Endpoint...
View ArticleData Centre Security (DCS) & UMC - Ad login failure
Common Data Centre Security & UMC - Ad login failureHi,In this article, I will cover how to troubleshoot a very common error that occurs when enabling Active Directory within DCS. It's not always...
View ArticleTrace SMB Double Pulsar Attack Source Machines
At times you may be reported by users about Symantec Client tray icon Notification "[SID: <pid number> Attack: SMB Double Pulsar..]" Similiar as below First measure no need to panic your machine...
View ArticleData Loss Prevention (DLP) - Create custom file type signature
Data Loss Prevention (DLP) - Create custom file typesHi,This article will cover the process that is required to create a custom file type signature in DLP. This is traditionally used for Zip files on...
View ArticleWorkflow - REST - Response Header
A question from @epkpej was asked on another of my ArticlesUsing the REST Generator (Response Content) in Workflow...
View Article