How to subscribe to content on Symantec's Support site
From a web browser, navigate to https://support.symantec.com/Once on the page, at the top right select 'Sign In/Register' and you'll be prompted to enter your Symantec Connect credentials:Once you've...
View ArticleSystem requirements for Endpoint Protection 14
System requirements for Symantec Endpoint Protection Manager and the Symantec Endpoint Protection clients are the same as those of the operating systems on which they are supported.Symantec Endpoint...
View ArticleData Loss Prevention DLP and Scanning Amazon AWS S3 and using S3FS
Hello DLP Users..I wanted to share some information on how to get DLP to Scan Amazon AWS Buckets.I had a customer who wanted to scan their Amazon AWS Storage (S3), there is no documentation on how to...
View ArticleData Loss Prevention DLP and Scanning via SSH and using SSHFS
Hello DLP Users..I wanted to share some information on how to get DLP to Scan using SSH.I had a customer who wanted to scan their File Server (EMC Isilon), but NOT all of the File System was accesible...
View ArticleGhost Solution Suite Upgrade Guide
The upgrade process for Ghost Solution Suite is fairly simple and the newest version of GSS can be directly installed overtop of the previous version*This guide informs on the upgrade process for Ghost...
View ArticleSupport Perspective: TheShadowBrokers and Equation Tools
In April 2017, an attack group calling itself the TheShadowBrokers, released a trove of data it claims to have stolen from the Equation cyberespionage group. The data contains a range of exploits and...
View ArticleWorkflow - Finding a model name using the model GUID
Finding a model name using the model GUIDThere has been an occasion where an error was occurring within the logs and mentions only the GUID of the model in the error and therefore there is no way of...
View ArticleImageInvoker for GSS... beta is open now
For those of you who have been using Inage Invoker, provided by Ian Atkin, one of our partners have taken this code up and improved on it. The beta is open now!!Please see here...
View ArticleSupport Perspective: Vault 7
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that allegedly detail activities and capabilities of the United States Central Intelligence Agency to perform...
View ArticlePetya Ransomware - Next Global Threat
Hello All,On June 27th, 2017 we all became aware of a new variant of the Petya malware which is spreading over the Microsoft Windows SMB protocol. The malware appears to use the ETERNALBLUE exploit...
View ArticleWhats new in CCS SCU 2017-1
Following are the highlights of the SCU 2017-1:New featuresThe SCU 2017-1 includes the following new features:Command-based data collection support for UNIX platform From SCU 2017-1 onwards,...
View ArticleHow to configure a remote console in Ghost Solution Suite 3.X
*Note - the purpose of this guide is to assist with the remote console setup in support environments. Please see the Ghost Support Matrix for client operating systems that are supported. Initial...
View ArticleData Loss Prevention Bespoke Flex Responses
Protirus were asked to solve the problem of providing additional functionality to Symantec’s DLP Endpoint Agent without impacting the end user. We did this by creating a development framework that...
View ArticleThe Ultimate WordPress Plugin Security Testing Cheat Sheet
The security documentation provided by WordPress and found online for plugin security is sparse, outdated or unclear. This cheat sheet is intended for Penetration Testers who audit WordPress plugins or...
View ArticleSymantec Endpoint Protection Start Quick Guide
This will helps download, install and configure Symantec Endpoint Protection (SEP) and desinged for defult, first time managed client installation of 500 or fewer.Preinstall: Check System...
View ArticleHow to read / parse what the current definitions are on Symantec Endpoint...
Dear All,I'd tried to get information about how to read current definitions on Symantec via Python on your site but unfortunately I could not. After that I tried to get it by myself and created on...
View ArticleA guide of Endpoint Protection files on FileConnect
Hello again, With your serial number when you log on to fileConnect for SEP (Symantec Endpoint Protecation). There are the file that you can download. What you download from...
View ArticleWorkflow - ProcessManager - WebPart - Developer Guide - SQL
In this Article we will see how to connect to the Process Manager Database to retrieve data to display in a WebPart.ArticlesListSetupSimpleDeployInspecting other WebPartsControlsStyling a WebPartWF/PM...
View ArticleWorkflow - ProcessManager - WebPart - Developer Guide - Connection String
In this Article we will see how to get the WF/PM Connection String to use within the WebPart.ArticlesListSetupSimpleDeployInspecting other WebPartsControlsStyling a WebPartWF/PM Connection String...
View ArticleWorkflow - ProcessManager - WebPart - Developer Guide - Styling
In this Article we will see how to style a WebPart to match the Process Manager (PM) theme.ArticlesListSetupSimpleDeployInspecting other WebPartsControlsStyling a WebPart (this)WF/PM Connection...
View Article