Our mail server IP 65.157.63.242 is unable to connect to messagelabs, for example IP 216.82.241.243. We are not on any blacklists. Can you please remove throttling for our IP?
Messagelabs mail servers refuse the network connection
macOS 10.13 High Sierra Support
Can Symatec please give notification on support of macOS 10.13 High Sierra which is set for release at the end of September.
SKEL has been introdcuced for non MDM devices.
Hwever I'm interested to know which version of Endpoint is supported for MDM devices where SKEL is off.
Proxy AV subscriptions
In Proxy AV environment upgrade to Symantec Endpoint Security is there any risk in expiring AV subscriptions? Will Proxy AV continue to operate but without AV updates? Will the Proxy AV fail if no subscription updates?
Apply Device Control in Safe Mode
Definitions update from SEPM
Is necesary and urgent linux update definitios from symanantec endpoint protection manager, any servers cannot update from liveupdate on internal networks, reverse proxy o symantec liveupdate servers.
Protection Engine for NAS 7.8 to 7.9 upgrade
how to upgrade Protection Engine for NAS 7.8 to Protection Engine 7.9 upgrade with 7.8 license?
Education: CloudSOC Class - September
Symantec offers live, instructor-led training for CloudSOC.
The Symantec CloudSOC R1 course is intended for IT professionals who wish to develop the knowledge and skills to deploy and manage Symantec CASB/s solution, CloudSOC. This course is intended for users who want to apply Symantec CloudSOC's capabilities to control Shadow Data and Shadow IT in cloud applications.
Education: CloudSOC Class - October
Symantec offers live, instructor-led training for CloudSOC.
The Symantec CloudSOC R1 course is intended for IT professionals who wish to develop the knowledge and skills to deploy and manage Symantec CASB/s solution, CloudSOC. This course is intended for users who want to apply Symantec CloudSOC's capabilities to control Shadow Data and Shadow IT in cloud applications.
Negative Reputation Repair
For some reason, my domains (all on the same server) have been blacklisted when sending emails sent to AT&T properties. Investigating the issue led me here, where I discovered the following about my IP:
The IP address 162.214.0.132 was found to have a negative reputation. Reasons for this assessment include:
The host has been observed sending spam in a format that is similar to snow shoe spamming techniques.
I am not sure why/where this happened. What can I do to correct the problem?
Importing Solution Pack for DLP 14.5
Hi All, does anyone know if importing a solution pack will turn on any policies? I don't want it to break anything. Any links to symantec documentation would be appreciated.Thanks!
Offline status in SEPM - Incorrect OU
Hi Peeps.
Need help current scenario is we have clients that are showing offline, different OU (we are sync in AD) and different hostname.
Per checking on those machines they are communicating to symantec, uses correct sylink, has online status, updated AV.
Dont know what to check anymore?
Ive search and created support ticket waiting on thier updates. So far i found this but no help on getting solve.
https://www.symantec.com/connect/forums/long-names...
Problem in a multiuser laptop/problemas con una portatil multi usario
Hi everybody, we add multiple users in a laptop but only the last one user who used the laptop is the only one user can log again!!
All users are registered in SEE
Thanks
************************************************************************************************************************************************
Tenemos una portatil multiusuario y a pesar que varios usuario etan registrados solo el ultimo que la utilizo es quien puede volverser a loguear de nuevo.
Alguna sugerencia?
Gracias
Application whitelisting for Unix IPS Policy
Hi All,
We are in process of implementing IPS policy on Unix Servers. These server have different application running. We have already applied sym_unix_protection_sbp policy in disbaled mode (policy will log any event and sent to the DCS Server but won't block any violation).
I would like to know what is the best way to go about the whitelisting of the applicatio/processes using sym_unix_protection_sbp so that any running application won't get affacted.
Appriciate is someone can share any document, menthod to do whitelistig that can be used for the same.
Thanks in advance !!!
Message lab certificate
Hi All,
One of our client using Symantec DLP deployed on premises and they also use Symantec.Cloud (formally known as message lab) for the email. Deployment of Email infra is as below:
sender user --> Exchange --> Symantec DLP --> Symantec.Cloud --> recepient user
In order to stablish TLS between Symantec DLP and .Cloud, we have to import .Cloud cert to the DLP Server keystore (requirement for the integration as per Symantec integration guide). We have already doesnloaded .Cloud cert and imported.
The Symantec.Cloud cert which we have imported, is set to expire in 2018. My question is, how shall we get to know when Symantec will be renewing Symantec.Cloud cert which we need to import to the DLP Server keystore manually. Can we get notification when new cert is available or any best practice?
Note: Symantec.Cloud cert need to be imported manually to the DLP Server keystore and if we didn;t import valid cert of Symantec.Cloud before it gets expired, Email flow will be intruppted.
Appriciate any input.
Cannot configure NIC teaming (LACP mode) on server run SEP client 12.1.x
Dears,
I have a windows server 2008 run BACS (Broadcom NIC driver). Before I install SEP Client 12.1.x, my computer worked normally with NIC teaming mode LACP ( 2 NIC card of server connect to 2 port of a Cisco Switch run LACP mode). But after installed the NIC teaming not work, show on Cisco switch the port is up but port protocol is down. Does the SEP Client prevent LACP Protocol on NIC Teaming mode? Can you have any solution for my problem? thank you very much!
Distinguish Between Standard and Dark Network Clients
I am trying to find some place that will tell which type of SEP 14 client is installed any given computer. Every client view displays, at most, the client version and policy serial number. Similarly, I have not found a report that lists the client type. The only place I've found the information is an individual client's properties, which is not very useful.
I have to think I'm missing somethihng; I'd really appreciate someone telling me what it is.
Thank you!
SEPM Upgrade to 12.1 RU6 MP8
Hi,
I have SEPM 12.1.6 (RU6) - 12.1.6168.6000 with clients of different versions (like 12.1 RU6 MP8, MP4 etc) I want to upgrade SEPM to 12.16. (RU6 - MP8) 12.1.7266.6800.
My questions are what precautions (other than backup the database) should consider before to make an inplace upgrade.
1. Do I need to withdraw policies - if not, after upgrade will the policies be intact?
2. What about the groups?
3. Do I need to backup server private key?
4. How can I prevent restarting of SEPM PC after the upgrade?
5. If (worst case) upgrade failed then, how can I restore SEPM to the one before to the upgrade?
Thanks,
Anti spoofing rule
Hi,
im have some dificult to block email that spooging my domain. What is the best way to block these e-mails?
Thanks.
Anti spoofing rule
Hi,
im have some dificult to block email that spooging my domain. What is the best way to block these e-mails?
Thanks.
Oracle Database Multiple Vulnerabilities (July 2017 CPU) (POODLE) (SWEET32)
Where can I find the Oracle Fix \ Download for this vulnrability ? We have the Oracle Licenses through Symantec
Oracle Database Multiple Vulnerabilities (July 2017 CPU) (POODLE) (SWEET32)
Synopsis
The remote database server is affected by multiple vulnerabilities.
Description
The remote Oracle Database Server is missing the July 2017 Critical Patch Update (CPU). It is, therefore, affected by multiple vulnerabilities :
- A man-in-the-middle (MitM) information disclosure vulnerability, known as POODLE, exists due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A MitM attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.
(CVE-2014-3566)- A vulnerability exists, known as SWEET32, in the 3DES and Blowfish algorithms due to the use of weak 64-bit block ciphers by default. A man-in-the-middle attacker who has sufficient resources can exploit this vulnerability, via a 'birthday' attack, to detect a collision that leaks the XOR between the fixed secret and a known plaintext, allowing the disclosure of the secret text, such as secure HTTPS cookies, and possibly resulting in the hijacking of an authenticated session.
(CVE-2016-2183)- An unspecified vulnerability exists in the RDBMS Security component that allows a local attacker to impact integrity. Note that the attacker would need to have Create Session or Select Any Dictionary privileges.
(CVE-2017-10120)- An unspecified vulnerability exists in the OJVM component that allows an authenticated, remote attacker to impact confidentiality, integrity, and availability.
Note that the attacker would need to have Create Session or Create Procedure privileges. (CVE-2017-10202)Solution
Apply the appropriate patch according to the July 2017 Oracle Critical Patch Update advisory.