Quantcast
Channel: Symantec Connect - Products - Discussions
Viewing all 18527 articles
Browse latest View live

Complete process of migration and upgradation of SEPM from 12.1.6 to 14.1

$
0
0
I need a solution

how I migrate aur upgrade sepm from privious version to new? can automatically copied all clients after upgradation?

0

SEP IPS log has incorrect Begin Time

$
0
0
I need a solution

Hello,

Can everybody give an explaination of Time Stamp, Event Type, Begin Time, End Time in SEP Attack log?

I have the issue on client side when IPS log has different timing on some SEP agents running 12.1RU6MP8. The Begin Time does not comply to Event Time in View Logs -> Security Log (NTP Attack logs).

For example, I filtered Begin Time by October then see Time Stamp or Event Time have timings from December. With my ongoing test the timing are different on some SEP agents.

That means SEPM notifies me with alert that was happend 2 months ago even the host was always online with healthy SEP agent.

Time StampEvent TypeEvent TimeBegin TimeEnd Time
01.12.2017 6:27Intrusion Prevention01.12.2017 6:2612.10.2017 13:2112.10.2017 13:21
01.12.2017 16:40Intrusion Prevention01.12.2017 16:3912.10.2017 23:3412.10.2017 23:34
02.12.2017 17:46Intrusion Prevention02.12.2017 17:4514.10.2017 0:4014.10.2017 0:40
02.12.2017 17:46Intrusion Prevention02.12.2017 17:4514.10.2017 0:4014.10.2017 0:40
03.12.2017 1:12Intrusion Prevention03.12.2017 1:1114.10.2017 8:0614.10.2017 8:06
03.12.2017 8:01Intrusion Prevention03.12.2017 8:0014.10.2017 14:5514.10.2017 14:55
03.12.2017 8:01Intrusion Prevention03.12.2017 8:0114.10.2017 14:5614.10.2017 14:56
04.12.2017 3:46Intrusion Prevention04.12.2017 3:4515.10.2017 10:4015.10.2017 10:40
04.12.2017 15:08Intrusion Prevention04.12.2017 15:0715.10.2017 22:0215.10.2017 22:02
04.12.2017 19:58Intrusion Prevention04.12.2017 19:5716.10.2017 2:5216.10.2017 2:52
05.12.2017 19:27Intrusion Prevention05.12.2017 18:4317.10.2017 1:3817.10.2017 1:38
05.12.2017 19:27Intrusion Prevention05.12.2017 18:4317.10.2017 1:3817.10.2017 1:38
06.12.2017 5:19Intrusion Prevention06.12.2017 5:1817.10.2017 12:1317.10.2017 12:13
06.12.2017 12:18Intrusion Prevention06.12.2017 12:1717.10.2017 19:1217.10.2017 19:12
06.12.2017 12:18Intrusion Prevention06.12.2017 12:1717.10.2017 19:1217.10.2017 19:12
07.12.2017 7:18Intrusion Prevention07.12.2017 7:1718.10.2017 14:1218.10.2017 14:12
07.12.2017 10:44Intrusion Prevention07.12.2017 10:4418.10.2017 17:3818.10.2017 17:38
07.12.2017 10:44Intrusion Prevention07.12.2017 10:4418.10.2017 17:3818.10.2017 17:38
08.12.2017 8:47Intrusion Prevention08.12.2017 8:4619.10.2017 15:4119.10.2017 15:41
08.12.2017 8:47Intrusion Prevention08.12.2017 8:4619.10.2017 15:4119.10.2017 15:41
10.12.2017 5:09Intrusion Prevention10.12.2017 5:0821.10.2017 12:0321.10.2017 12:03
10.12.2017 8:02Intrusion Prevention10.12.2017 8:0121.10.2017 14:5521.10.2017 14:55
10.12.2017 8:02Intrusion Prevention10.12.2017 8:0121.10.2017 14:5621.10.2017 14:56
11.12.2017 7:46Intrusion Prevention11.12.2017 7:4522.10.2017 14:3922.10.2017 14:39
11.12.2017 7:46Intrusion Prevention11.12.2017 7:4522.10.2017 14:4022.10.2017 14:40
12.12.2017 21:20Intrusion Prevention12.12.2017 21:1924.10.2017 4:1324.10.2017 4:13
13.12.2017 18:10Intrusion Prevention13.12.2017 18:0925.10.2017 1:0425.10.2017 1:04
14.12.2017 6:13Intrusion Prevention14.12.2017 6:1225.10.2017 13:0625.10.2017 13:06
15.12.2017 6:52Intrusion Prevention15.12.2017 6:5126.10.2017 13:4526.10.2017 13:45
17.12.2017 8:01Intrusion Prevention17.12.2017 8:0028.10.2017 14:5528.10.2017 14:55
17.12.2017 8:02Intrusion Prevention17.12.2017 8:0128.10.2017 14:5528.10.2017 14:55
18.12.2017 7:49Intrusion Prevention18.12.2017 7:4829.10.2017 14:4329.10.2017 14:43
18.12.2017 10:47Intrusion Prevention18.12.2017 10:4629.10.2017 17:4029.10.2017 17:40
18.12.2017 10:47Intrusion Prevention18.12.2017 10:4629.10.2017 17:4029.10.2017 17:40
18.12.2017 17:29Intrusion Prevention18.12.2017 17:2830.10.2017 0:2230.10.2017 0:22
19.12.2017 0:34Intrusion Prevention19.12.2017 0:3330.10.2017 7:2830.10.2017 7:28
19.12.2017 9:20Intrusion Prevention19.12.2017 9:1830.10.2017 16:1330.10.2017 16:13
19.12.2017 13:35Intrusion Prevention19.12.2017 13:3430.10.2017 20:2830.10.2017 20:28
19.12.2017 23:11Intrusion Prevention19.12.2017 23:1131.10.2017 6:0531.10.2017 6:05
20.12.2017 10:48Intrusion Prevention20.12.2017 10:4731.10.2017 17:4131.10.2017 17:41
20.12.2017 13:07Intrusion Prevention20.12.2017 13:0631.10.2017 20:0031.10.2017 20:00
20.12.2017 15:23Intrusion Prevention20.12.2017 15:2231.10.2017 22:1631.10.2017 22:16
0

live update administrator ccs 11.5,12 product

$
0
0
I need a solution

hello

i have two ccs 11.5 application server in a close network

i wnat to confiugre my live update administrator server to download protuct to my version but they don't listded 

i only have 11.0 and 11.1 

what do u need to do in order to download via live update server the lateset ccs updates ?

shahar

0

ProxySG | Please recommend to implement about access logging

$
0
0
I need a solution

Dear All,

  My customer want to implement about access logging. they want to keep access logging only action "allow"  

this requirement can do or not ?

if can please recommend to me about way to implement for this requirement from customer.

Thank you so much for kindly to help.

0

Grant rights to forward a blocked email?

$
0
0
I need a solution

I’m hoping someone can help me. I am working with a client and a policy they have works correctly 95% of the time, but 5% of the time it generates a false positive and blocks the file from being sent. I was wondering if there is a way to grant a user the rights to inspect and forward an email?

Scenario :

  • A message is sent from a user via email.
  • The message is blocked by DLP.
  • The user’s manager is notified of the blocked message.
  • The manager inspects the message, determines it is a false positive.
  • Info Sec/DLP engineers inspects the message and determines the message is a false positive.
  • The manager then forwards the message to the initial mail recipient.

Is it possible to give the manager rights to forward the email? If so, how?

I’ve read about Forward Mode, but I’m not sure about it’s real world application.

0

Symantec ATP can prevent https traffic

$
0
0
I need a solution

Hi all, 

I read ATP solution of Symantec and has the question: 

- If I use Symantec SEP and now I will buy ATP appliance with license for Network and Endpoint. With all traffic https, how can ATP appliance see and block? I am going to deploy ATP appliance for Inline mode. 

Thanks, 

Peter

0

DLP Licensing

$
0
0
I need a solution

 Hello, 

        I am not sure how the Symatect DLP license work. So, where can I get documentation that talks about Symantec DLP?

Thanks, 

Ken 

0

Unable to launch MS Word

$
0
0
I do not need a solution (just sharing information)

Suddenly SEP has decided the my Microsoft Word is a virus or something.

If I try to open a word doc or launch word directly I get a Windows 10 notification from SEP saying:

Attack: Return Oriented Programming API Invocation Detected
SEP will terminate c:\program Files....

(screenshot attched)

I tried removing SEP, cleanwipe and reinstall hoping it was just a setting.

No other users are affected.  Just my workstation.  Any idea what is going on?

(Word works fine with SEP uninstalled)

0

14.0.1 MP1 available in file connect

Symantec Endpoint Desktop Encryption 10.3.2- Black screen with blinking cursor

$
0
0
I need a solution

I have Symantec Endpoint Desktop Encryption 10.3.2 on a Dell Latitude E6440 laptop running Windows 7. When the computer boots up and asks for the password to unlock the hard drive, it goes straight to a black screen with a blinking cursor and stays like that so Windows doesn't boot up for me.

Also, when I try using the recovery key to unlock I get the same screen. 

And, the bypass option isn't working for me either.

The user of the laptop needs to be able to use the computer.

Some help would be extremely appreciated!!!

0

DLP chnaging of Solutions Pack

$
0
0
I need a solution

Is it possible to Change the Solutions pack after installation? I'hv installer the General.vsp solutions pack and we want to try to change it to Retail.vsp solutions pack. Also we are using DLP 15.0.

0

CAS error logs

$
0
0
I need a solution

Hello Gents,

I found two errors in CAS logs.

kaspersky[27241]: ERROR    : Kaspersky ThreadHandler: failed to check url 2147942487(0x80070057)
kaspersky[27241]: ERROR    : Kaspersky ThreadHandler: failed: 0x80070057(-2147024809)

avservice[8837]: SyslogEndpoint::Log: No thread to service messages

does anyone knows about these errors and the reason why do I receive them.

thanks in advance.

0

Need help with MD5 Hash Values

$
0
0
I need a solution

Dear Team,

Client is providing me Hash Values to blacklist in Symantec ATP. These values are usually SHA-256 or SHA-1. I use VirusTotal to convert these values to MD5.

There are many hash values which are not showing in VirusTotal Database. Kindly suggest me a reliable online file has value converter other than VirusTotal that can be used.

Thanks in advance.

0

MessageLabs' Email Attachment Size Limit

$
0
0
I need a solution

Can someone tell me MessageLabs' email attachment size limit or the default size limit? Thanks

0

Linux clients cannot get new definitions

$
0
0
I need a solution

 Hi all,

 We are using Symantec LiveUpdate Administrator as a server from which linux clients automatically get their antivirus definitions. But last few weeks they stop getting update. I've started manual update for test and i get error message: "sep::lux::Cseplux: Failed to run session, error code: 0x80010830 Live update session failed. Please enable debug logging for more information Unable to perform update".

In lux.log file i get:

 [Server Selection - START]
         Result Code: 0x80010830
         Result Message: FAIL - failed to select server
         [Server - START]
                 Host ID: {00E6655A-A58F-475E-9A42-B90985F04C0D}
                 Status Code: 1
                 Status Message: Server was not selected
                 Transport Return Code: 0x80010737
                 Transport Return Message: FAIL - failed to connect to server or proxy
                 Protocol: HTTP
                 Hostname: liveupdate.symantecliveupdate.com
                 Port: 80
                 Path:
                 Proxy ID: {00000000-0000-0000-0000-000000000000}
                 Proxy Bypass: false
         [Server - END]

It looks like that clients are trying to update definitions from internet instead of the LUA server. How can i configure them to use LUA server?

Thanks in advance!

0

Security Attention not reporting correctly on a Mac

DLP Uninstall batch script

$
0
0
I need a solution

Any tips how can I uninstall multiple computers to remove DLP agent installed on them? thanks.

0

Notification Condition - Script

$
0
0
I need a solution

I have an alert the will list all computers that have virus definition older than 3 days. 

I notice that I can run a batch or any executable file when triggered by the notification. 

Question: What do you recommend to run when it triggers? any script to update those outdated dat?

0

API for DLP Servers

$
0
0
I need a solution

I was wondering if there is an API available where I can grab the status of servers and detectors in Symantec DLP? I'd like grab that information for a live health status dashboard that I'm developing.

0

symantec encryption server storing too much mail

$
0
0
I do not need a solution (just sharing information)

We're recibing this alert from Symantec Encryption Server:

"We're sorry. Your message cannot be delivered to the following recipient(s) because Symantec Encryption Server is already storing too much mail for them."

0
Viewing all 18527 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>