Ransomware Everywhere
Little known before 2014, Ransomware is now one of the most popular methods used by hackers to attack corporations. 2018 was the year Ransomware, 2019 is even worse. For those who don’t know,...
View ArticleInitial filtering in Security Analytics
A logical first step when looking for a suspected event In Security Analytics is using the Timespan filtering capability. The reason for this is that by reducing searches down to a specific window of...
View ArticleDownloading file extractions
File extractions are a valuable part of a forensic investigation. In Security Analytics, these extractions are the reconstruction of files found within the payload of packets captured traversing a...
View ArticleSymantec Endpoint Protection Manager 14.0 Videos
Hi All, I have created Videos for Symantec Antivirus 14.0 , Below are the links to access the videos. Please comment if I can make any improvements.Step by Step Installation Symantec Antivirus 14.0...
View ArticleICDx
ICDxSymantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against...
View ArticleICDx - Documentation
ICDxSymantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against...
View ArticleICDx - Apps
ICDxSymantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against...
View ArticleICDx - API
ICDxSymantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against...
View ArticleICDx - Collectors and Forwarders
ICDxSymantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against...
View ArticleCyber-Enabled Financial Fraud on the Rise Globally
FYI for our community: Some of our Symantec customers have reported receiving phone calls from scammers impersonating Symantec and seeking to socially engineer financial information from them.This...
View ArticleInstalling Windows clients with Microsoft SCCM/SMS 2016
Installing Windows clients with Microsoft SCCM/SMS 2016Follow “Steps1” to “Step 4” from below procedures provided by Symantec Support or download the attached file for step-by-step procedures with...
View ArticleVirus definitions version/revision is not updating using Sonicwall Firewall
Follow the below procedures provided by Symantec Support.Ports and hostnames used by Messaging GatewayTECH94152Last Updated October 04, 2019Situation Symantec Messaging Gateway (SMG) scanner, control...
View ArticleWorkflow - Publishing
In this Article I'm going to show you how to Publish a project in Workflow.There are a number of options you can usePublish LocallyPublish to ManagedCreate Publishing InstallerCreate SMP Solution...
View ArticleCallout on SEDR 4.3 post-update AD login functionality
We have seen quite a few cases come in, so I figured I would post publicly.With the SEDR 4.3 update, we introduced the ability to add multiple AD Domains for AD login to the web interface of SEDR....
View ArticleAndroid Monokle Malware
A new mobile remote access trojan (RAT) for Android called Monokle, has been reported using novel techniques to exfiltrate data. Monokle uses a range of intrusive capabilities to conduct various types...
View ArticleClipsa Malware
It has been reported that a malware named “Clipsa” is spreading. The malware mainly spreads in the form of executable files masquerading as an installer for media players. The malware is capable of...
View ArticleLinux: Lilu/Lilocked Ransomware
It has been reported that the malware named as Lilu/Lilocked having ransomware capabilities targeting Linux machines is spreading. The infection vector used by the ransomware is currently unknown....
View ArticleWin/Phorpiex Worm
It has been reported that the variants of a worm named “phorpiex” is spreading. The worm mainly targets the Windows operating systems and spreads by means of removable devices and instant messaging...
View ArticleRansomware: Facts, Threats, and Countermeasures
‘Your files have been encrypted!’ These five words have the potential to instill alarm as the realization dawns that your system has fallen victim to ransomware. How it happened and what happens next,...
View ArticleSEP v14.2.2.1 Released!
Hi all,SEP v14.2.2.1 has been released and is available for download. This version is also known as v14.2 RU2 MP1You can find the PDF of the Release Notes at...
View Article