Quantcast
Channel: Symantec Connect - Products
Viewing all 21587 articles
Browse latest View live

Messagelabs mail servers refuse the network connection

$
0
0
I need a solution

Our mail server IP 65.157.63.242 is unable to connect to messagelabs, for example IP 216.82.241.243. We are not on any blacklists. Can you please remove throttling for our IP?

0

macOS 10.13 High Sierra Support

$
0
0
I need a solution

Can Symatec please give notification on support of macOS 10.13 High Sierra which is set for release at the end of September.

SKEL has been introdcuced for non MDM devices.

Hwever I'm interested to know which version of Endpoint is supported for MDM devices where SKEL is off.

0

Proxy AV subscriptions

$
0
0
I need a solution

In Proxy AV environment upgrade to Symantec Endpoint Security is there any risk in expiring AV subscriptions? Will Proxy AV continue to operate but without AV updates? Will the Proxy AV fail if no subscription updates?

0

Apply Device Control in Safe Mode

Definitions update from SEPM

$
0
0
I do not need a solution (just sharing information)

Is necesary and urgent linux update definitios from  symanantec endpoint protection manager, any servers cannot update from liveupdate on internal networks, reverse proxy o symantec liveupdate servers.

0

Protection Engine for NAS 7.8 to 7.9 upgrade

$
0
0
I need a solution

how to upgrade Protection Engine for NAS 7.8 to Protection Engine 7.9 upgrade with 7.8 license?

0

Education: CloudSOC Class - September

$
0
0
Location: 
Virtual Academy - Americas
Time: 
Thu, 28 September, 2017 - 11:00 - 18:00 EDT

Symantec offers live, instructor-led training for CloudSOC.

The Symantec CloudSOC R1 course is intended for IT professionals who wish to develop the knowledge and skills to deploy and manage Symantec CASB/s solution, CloudSOC. This course is intended for users who want to apply Symantec CloudSOC's capabilities to control Shadow Data and Shadow IT in cloud applications.

For more information, visit go.symantec.com/education.
Protect yourself: go.symantec.com/awareness
 

Education: CloudSOC Class - October

$
0
0
Location: 
Virtual Academy - Americas
Time: 
Thu, 05 October, 2017 - 11:00 - 18:00 EDT

Symantec offers live, instructor-led training for CloudSOC.

The Symantec CloudSOC R1 course is intended for IT professionals who wish to develop the knowledge and skills to deploy and manage Symantec CASB/s solution, CloudSOC. This course is intended for users who want to apply Symantec CloudSOC's capabilities to control Shadow Data and Shadow IT in cloud applications.

For more information, visit go.symantec.com/education.
Protect yourself: go.symantec.com/awareness
 
 

Negative Reputation Repair

$
0
0
I need a solution

For some reason, my domains (all on the same server) have been blacklisted when sending emails sent to AT&T properties. Investigating the issue led me here, where I discovered the following about my IP:

The IP address 162.214.0.132 was found to have a negative reputation. Reasons for this assessment include:

The host has been observed sending spam in a format that is similar to snow shoe spamming techniques.​

​I am not sure why/where this happened. What can I do to correct the problem?

0

Importing Solution Pack for DLP 14.5

$
0
0
I need a solution

Hi All, does anyone know if importing a solution pack will turn on any policies? I don't want it to break anything. Any links to symantec documentation would be appreciated.Thanks!

0

Offline status in SEPM - Incorrect OU

$
0
0
I need a solution

Hi Peeps.

Need help current scenario is we have clients that are showing offline, different OU (we are sync in AD) and different hostname.

Per checking on those machines they are communicating to symantec, uses correct sylink, has online status, updated AV.

Dont know what to check anymore?

Ive search and created support ticket waiting on thier updates. So far i found this but no help on getting solve.

https://www.symantec.com/connect/forums/long-names...

0

Problem in a multiuser laptop/problemas con una portatil multi usario

$
0
0
I need a solution

Hi everybody, we add multiple users in a laptop but only the last one user who used the laptop is the only one user can log again!!

All users are registered in SEE 

Thanks

************************************************************************************************************************************************

Tenemos una portatil multiusuario y a pesar que varios usuario etan registrados solo el ultimo que la utilizo es quien puede volverser a loguear de nuevo.

Alguna sugerencia?

Gracias

0

Application whitelisting for Unix IPS Policy

$
0
0
I need a solution

Hi All,

We are in process of implementing IPS policy on Unix Servers. These server have different application running. We have already applied sym_unix_protection_sbp policy in disbaled mode (policy will log any event and sent to the DCS Server but won't block any violation).

I would like to know what is the best way to go about the whitelisting of the applicatio/processes using sym_unix_protection_sbp so that any running application won't get affacted.

Appriciate is someone can share any document, menthod to do whitelistig that can be used for the same.

Thanks in advance !!!

0

Message lab certificate

$
0
0
I need a solution

Hi All,

One of our client using Symantec DLP deployed on premises and they also use Symantec.Cloud (formally known as message lab) for the email. Deployment of Email infra is as below:

sender user --> Exchange --> Symantec DLP --> Symantec.Cloud --> recepient user

In order to stablish TLS between Symantec DLP and .Cloud, we have to import .Cloud cert to the DLP Server keystore (requirement for the integration as per Symantec integration guide). We have already doesnloaded .Cloud cert and imported.

The Symantec.Cloud cert which we have imported, is set to expire in 2018. My question is, how shall we get to know when Symantec will be renewing Symantec.Cloud cert which we need to import to the DLP Server keystore manually. Can we get notification when new cert is available or any best practice?

Note: Symantec.Cloud cert need to be imported manually to the DLP Server keystore and if we didn;t import valid cert of Symantec.Cloud before it gets expired, Email flow will be intruppted.

Appriciate any input.

0

Cannot configure NIC teaming (LACP mode) on server run SEP client 12.1.x

$
0
0
I need a solution

Dears,

I have a windows server 2008 run BACS (Broadcom NIC driver). Before I install SEP Client 12.1.x, my computer worked normally with NIC teaming mode LACP ( 2 NIC card of server connect to 2 port of a Cisco Switch run LACP mode). But after installed the NIC teaming not work, show on Cisco switch the port is up but port protocol is down.  Does the SEP Client prevent LACP Protocol on NIC Teaming mode? Can you have any solution for my problem? thank you very much!

0

Distinguish Between Standard and Dark Network Clients

$
0
0
I need a solution

I am trying to find some place that will tell which type of SEP 14 client is installed any given computer.  Every client view displays, at most, the client version and policy serial number.  Similarly, I have not found a report that lists the client type.  The only place I've found the information is an individual client's properties, which is not very useful.

I have to think I'm missing somethihng; I'd really appreciate someone telling me what it is.

Thank you!

0

SEPM Upgrade to 12.1 RU6 MP8

$
0
0
I need a solution

Hi,

I have SEPM 12.1.6 (RU6) - 12.1.6168.6000 with clients of different versions (like 12.1 RU6 MP8, MP4 etc) I want to upgrade SEPM to 12.16. (RU6 - MP8) 12.1.7266.6800.

My questions are what precautions (other than backup the database) should consider before to make an inplace upgrade.

1. Do I need to withdraw policies - if not, after upgrade will the policies be intact?

2. What about the groups? 

3. Do I need to backup server private key?

4. How can I prevent restarting of SEPM PC after the upgrade?

5. If (worst case) upgrade failed then, how can I restore SEPM to the one before to the upgrade?

Thanks,

0

Anti spoofing rule

$
0
0
I do not need a solution (just sharing information)

Hi,

im have some dificult to block email that spooging my domain. What is the best way to block these e-mails?

Thanks.

0

Anti spoofing rule

$
0
0
I do not need a solution (just sharing information)

Hi,

im have some dificult to block email that spooging my domain. What is the best way to block these e-mails?

Thanks.

0

Oracle Database Multiple Vulnerabilities (July 2017 CPU) (POODLE) (SWEET32)

$
0
0
I need a solution

Where can I find the Oracle Fix \ Download for this vulnrability ?  We have the Oracle Licenses through Symantec 

Oracle Database Multiple Vulnerabilities (July 2017 CPU) (POODLE) (SWEET32)

Synopsis

The remote database server is affected by multiple vulnerabilities.

  • Description

    The remote Oracle Database Server is missing the July 2017 Critical Patch Update (CPU). It is, therefore, affected by multiple vulnerabilities :

    - A man-in-the-middle (MitM) information disclosure vulnerability, known as POODLE, exists due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A MitM attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.
    (CVE-2014-3566)

    - A vulnerability exists, known as SWEET32, in the 3DES and Blowfish algorithms due to the use of weak 64-bit block ciphers by default. A man-in-the-middle attacker who has sufficient resources can exploit this vulnerability, via a 'birthday' attack, to detect a collision that leaks the XOR between the fixed secret and a known plaintext, allowing the disclosure of the secret text, such as secure HTTPS cookies, and possibly resulting in the hijacking of an authenticated session.
    (CVE-2016-2183)

    - An unspecified vulnerability exists in the RDBMS Security component that allows a local attacker to impact integrity. Note that the attacker would need to have Create Session or Select Any Dictionary privileges.
    (CVE-2017-10120)

    - An unspecified vulnerability exists in the OJVM component that allows an authenticated, remote attacker to impact confidentiality, integrity, and availability.
    Note that the attacker would need to have Create Session or Create Procedure privileges. (CVE-2017-10202)

  • Solution

    Apply the appropriate patch according to the July 2017 Oracle Critical Patch Update advisory.

0
Viewing all 21587 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>