Quantcast
Channel: Symantec Connect - Products - Articles
Browsing all 694 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to check specific process with Host Integrity Policy

Is it possible to monitor specific progress status with Host Integrity (HI) policy in endpoint protection? The answer is yes.Here is a simple example of how to set the requirement in HI policy. Details...

View Article


Image may be NSFW.
Clik here to view.

Blacklisting and Whitelisting Domains and e-mail Address in Symantec...

Blacklisting and White listing domains in Symantec Messaging Gateway 10x: 1. Log On to Symantec Messaging Gateway.2.1 Blacklisting a domain: (a)    Go To Reputation> Policies> Bad Senders.(b)...

View Article


Image may be NSFW.
Clik here to view.

Exceptions, Illustrated: Part One

IntroductionThis is the sixteenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

Image may be NSFW.
Clik here to view.

Exceptions, Illustrated: Part Two

IntroductionThis is the seventeenth in my Security Series of Connect articles.  For more information on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec...

View Article

Script: Checking if a sample is detected as malware by Symantec by its hash

On the Symantec site, you can not search malwares by its hash, as for now. I made two scripts to help you, if there is a need to check a lot of hashes. You will need a free VirusTotal account, to use...

View Article


Image may be NSFW.
Clik here to view.

Help us spread the word about SEP 14 and get a $25 Amazon gift card!

 It’s simple: Click here and log into G2 Crowd using your LinkedIn Account.    You must contribute a detailed, balanced and complete review! After your review is verified, G2 Crowd will send the first...

View Article

Image may be NSFW.
Clik here to view.

Help us spread the word about DLP and get a $25 Amazon gift card!

It’s simple: Click here and log into G2 Crowd using your LinkedIn Account.  You must contribute a detailed, balanced and complete review! After your review is verified, G2 Crowd will send the first 40...

View Article

Support Perspective: PUA.Winexe

In May of 2017, Symantec added a RISK detection for the tool Winexe.Winexe is a Linux based application that allows the execution of commands remotely on Windows based OSes. It installs a service on...

View Article


System requirements for Endpoint Protection 14

System requirements for Symantec Endpoint Protection Manager and the Symantec Endpoint Protection clients are the same as those of the operating systems on which they are supported.Symantec Endpoint...

View Article


Data Loss Prevention DLP and Scanning Amazon AWS S3 and using S3FS

 Hello DLP Users..I wanted to share some information on how to get DLP to Scan Amazon AWS Buckets.I had a customer who wanted to scan their Amazon AWS Storage (S3), there is no documentation on how to...

View Article

Data Loss Prevention DLP and Scanning via SSH and using SSHFS

Hello DLP Users..I wanted to share some information on how to get DLP to Scan using SSH.I had a customer who wanted to scan their File Server (EMC Isilon), but NOT all of the File System was accesible...

View Article

Support Perspective: TheShadowBrokers and Equation Tools

IMPORTANT: As of June 20th this page is still being updated with additional coverage information. It should be considered a "Work in Progress"  In April 2017, an attack group calling itself the...

View Article

Support Perspective: Vault 7

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that allegedly detail activities and capabilities of the United States Central Intelligence Agency to perform...

View Article


Image may be NSFW.
Clik here to view.

Petya Ransomware - Next Global Threat

Hello All,On June 27th, 2017 we all became aware of a new variant of the Petya malware which is spreading over the Microsoft Windows SMB protocol. The malware appears to use the ETERNALBLUE exploit...

View Article

Whats new in CCS SCU 2017-1

Following are the highlights of the SCU 2017-1:New featuresThe SCU 2017-1 includes the following new features:Command-based data collection support for UNIX platform From SCU 2017-1 onwards,...

View Article


Image may be NSFW.
Clik here to view.

Data Loss Prevention Bespoke Flex Responses

Protirus were asked to solve the problem of providing additional functionality to Symantec’s DLP Endpoint Agent without impacting the end user. We did this by creating a development framework that...

View Article

The Ultimate WordPress Plugin Security Testing Cheat Sheet

The security documentation provided by WordPress and found online for plugin security is sparse, outdated or unclear. This cheat sheet is intended for Penetration Testers who audit WordPress plugins or...

View Article


Image may be NSFW.
Clik here to view.

Symantec Endpoint Protection Start Quick Guide

This will helps download, install and configure Symantec Endpoint Protection (SEP) and desinged for defult, first time managed client installation of 500 or fewer.Preinstall: Check System...

View Article

How to read / parse what the current definitions are on Symantec Endpoint...

Dear All,I'd tried to get information about how to read current definitions on Symantec via Python on your site but unfortunately I could not. After that I tried to get it by myself and created on...

View Article

A guide of Endpoint Protection files on FileConnect

Hello again,            With your serial number when you log on to fileConnect for SEP (Symantec Endpoint Protecation). There are the file that you can download.             What you download from...

View Article
Browsing all 694 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>