Quantcast
Channel: Symantec Connect - Security
Viewing all 11471 articles
Browse latest View live

Blue screen during windows boot after uninstalling SEE 11.0.1

$
0
0
I do not need a solution (just sharing information)

I am testing out Endpoint Encryption 11.0.1 in a managed AD 2008 R2 environment on Win 7 x86 PCs. Installed Agent, Disk, RME, Autologon all by GPO. Everything was working. I decided to test the uninstall process and removed one PC from the GPO security group - the MSI policy is set to uninstall when a target falls outside of the policy's managment. 

At this point I'm expecting it to decrypt and then unstaill so I reboot the PC and it looks like the Agent and RME are still installed. I reboot again and get pre-boot warning that system has not checked in with SEEMS and needs Help Desk or Administrator recovery.

I log in with Administrator recovery and it gets to the windows logo and fast blue screen reboot. I log in with Help Desk recovery and it gets to the windows logo and fast blue screen reboot. I tried options for Safe Mode, Startup Repair, etc., but I always get bluescreen while it's loading.

I see some instructions online now that say manually decrypt before uninstalling. The setup docs seem to imply this would be done automatically with phrasing like must be decrypted before uninstalling, etc. A bit unclear.

The file system seems to be intact because I can begin loading windows, and the non-SEEMS pre-boot options are clearly working.

So what's my next step here?

0

Report of clients to GUP

$
0
0
I need a solution

Hi All,

I was trying to see if there is a way to get a list of the clients reporting to a GUP. I checked the schema and there does not appear to be a table or view that links this information. So the only way I think this might be able to be done is to get the GUP list and parse the subnet info and compare to the client subnet info. Has anyone does this already? Writing SQL is not a forte for me, so I am hoping someone has done it and could share the SQL.

Thanks

Martin

0

SMSME 7.5 error after install

$
0
0
I need a solution

Recently installed SMSME 7.5 on Server 2012 for Exchange 2013. I receive the following error when opening the console. Can't seem to get by it.

"Access us debued. User is unauthorized or has limited rights on server   ********.local.

Logged in as administrator to server. Not sure what I'm missing.

0

Problem adding additional SEPM 12.1.6 server to existing site

$
0
0
I need a solution

Hi,

I have SEPM 12.1.6 in my site which is running on Windows Server 2008 R2 server. I was previosuly using embedded database. Then i moved from embedded database to MS SQL Server 2008 database on same machine by following the steps outlined in below article.

https://support.symantec.com/en_US/article.TECH102547.html

Everything was fine so far. However when today i was trying to add additional SEPM 12.1.6 server to existing site, i am getting the following error

“The server schema is higher than the database schema, the configuration cannot continue for adding new server”

Can anyone help in resolving this issue?

0

Symantec Endpoint Protection client upgrade from 12.1.5 to 12.1.6 MP3

$
0
0

Hi,

Please help me to upgarde SEP client from 12.1.5 to 12.1.6 MP3 and let me know any impact\issues after upgrading the windows client.

regards,

Vinu

Tech support scams redirect to Nuclear EK to spread ransomware

$
0
0
Tech support scammers may have bolstered their arsenal by using the Nuclear exploit kit to drop ransomware onto victims’ computers.

Read More

Preparing Database

$
0
0
I do not need a solution (just sharing information)

I am currently in the process of upgrading from 12.1.1 to 12.1.6, I will be installing 12.1.6 on Windows Server 2012 R2. When I get to adding the database(using existing database) I get "The server schema is higher than the database schema. The configuration cannot continue for adding new server"

12.1.1 is on a Windows Server 2003 box and the database is SQL Server version 10.0.

How do I go about fixing this issue?

Thanks,

Adrian

0

Symantec Protection Engine for NAS with High Availability

$
0
0
I need a solution

Hello, I have one requirement in which we need to deploy Symantec Protection Engine for NAS with High Availability. Can someone please help me to get best practice or step by step approach along with architectural model which I can follow.

I have searched but could not find any useful information on High Availability for NAS.

Thanks.

Anurag

0

Bulk Deleting groups

$
0
0
I need a solution

Hello,

We are doing some reorganizing of SEPM groups.  I have one main group with thousands of sub groups in it.  All subgroups and main group are empty with no clients.  Now I want to delete them all, do i have to click each one and delete or is there a way to bulk delete the groups?

0
1448987838

Programmatically add folder/path to anti-virus exception list

$
0
0
I need a solution

Is there any way to add folders programmatically to the exception list?

Possibly windows batch file or c# program?

We have multiple test machines and they get anti-virus installed as a IT policy. So we need to exclude our testarea folder.

0

SEP 12.1.x - automate the generation of detailed log

$
0
0

Scenario: During issues involving network communication issues, on scenarios like Branch Offices or Automated Systems (POS systems, shop-floor systems, etc.) with SEP 12.1 Enterprise, the generation of Advanced Logs, as Sylink.log for example, usually occurs belatedly. In those cases, the problem investigation may occur retroactively, affecting in identifying the problem's cause.

Proposition: Considering these scenarios, for instance, after reaching a count of recurrent events of SYLINK erros resulting from SEPM HTTP 500/503 or "Downloaded new content update from Group Update Provider failed", the client can automatically enable the generation of Advanced Logs like Sylink.log and Debug.log.

Unable to decrypt removable drive contents in-place

$
0
0
I need a solution

Here's the scenario:

Windows 7 Pro with SEE 11.0.0 MP1 installed in standalone mode.

Main HDD encrypted. 2 Removable drives (1 TB each) encrypted.

When removable drive is connected, the Symantec Lock icon shows up for each file on the drive in Windows Explorer, so I know encryption has worked.

Windows 10 upgrade arrives and I realize after days of research that SEE installed is not compatible.

So I Decrypt HDD using command line, but do not decrypt removable drives thinking those can be done later.

Uninstall SEE after decrypting HDD, and then upgrade to Windows 10 Pro successfully.

Now, with some time available after upgrade, want to decrypt removable drives as well.

So launched the Removable Media utility on the drive and then realized it doesn't allow decryption in place! Must decrypt to another location if using Utility.

Reinstalled SEE 11.0.0 MP1 as before on the computer with Windows 10 Pro (but did not try to encrypt the HDD drive).

Now when the removable drive is connected, there is no lock icon on the files. However, when launching any file it asks for the encryption password, so I know files are still encrypted (as expected).

So, here's the question: How do I decrypt the files on the removable drives in-place i.e. without having to "decrypt to another location" (using the removable media utility) as I don't have available empty 2 TB space for both removable drives to decrypt there.

Right clicking on the removable drive letter or even on individual files on the removable drive using windows explorer, only gives the option to "Add to encrypted archive" and no option to Decrypt.

Any help is much appreciated!

0

How to configure inbound file / print sharing via client policy??

$
0
0
I need a solution

I edited group policy to allow inbound file/print sharing via Windows Firewall with Advanced Security in Group Policy, taking all the defaults.

I need to configure the client firewall policy in SEP to do the same thing, am I correct that I edit the global firewall policy??

I need this so I can do remote updates with remote update software. It's not possible for us to go around manually updating every computer to allow File/Print Sharing.

I found this Symantec link: https://support.symantec.com/en_US/article.TECH909......

My apologies for getting GP and SEP mixed up, my real question is how to configure SEP client policy to enable inbound connections like this.

Thank you, Tom

0
1449004495

ADC Behavior

$
0
0
I need a solution

I'm trying to lock down the USB ports on a machine, but allow only a specific USB keyboard and mouse to function.  It's behaving strangely.

I started by adding "USB" and "Human Interface Devices" to the Blocked Devices list.  Now, whenever I plug in the keyboard, I get a message saying that it is disabled, but sometimes it still works.  I have two USB ports on the left side and two on the right side of the machine.  If I plug the keyboard in on the left side, I get the Disabled message, but the keyboard still allows me to type.  If I plug the keyboard in on the right side, I get the Disabled message, and the keyboard does not allow me to type.

Why am I getting this behavior?

0

The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season

$
0
0
12 Downloadable Tips for Employees to Help IT This Holiday Season
Twitter Card Style: 
summary

2015-12-Ways-Everyone-Can-Help-IT-This-Holiday-Season-001.jpg

As the holidays approach, everyone gets caught up in the season of giving. As IT professionals, this time of year allows us to share a gift with our users, which actually can help them give an even greater gift to us in return—the gift of users educated in ways that make our jobs easier. Give your users the gift of patience—and these tips—to keep yourself from becoming an IT humbug.

SECURITY

TIP #1: Phishers often trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Appoint someone on your team to contact IT if your department receives suspicious calls.

TIP #2: Avoid leaking intellectual property. Sharing a picture with a whiteboard or computer screen in the background online could reveal more than a competitor should see.

TIP #3: Report security warnings from your anti-virus software to IT immediately, don’t assume they know about all threats that occur.

TIP #4: Alert IT before you travel if you’re going to be using public wireless Internet, and make sure you know how to connect to the company’s Virtual Private Network (VPN).

TIP #5: Be wary of links in emails from senders you don’t recognize. Phishers prey on employees who open links and attachments without checking them out, opening the door to malware.

BEHAVIOR

TIP #6: Don’t steal. Taking intellectual property and divulging professional secrets are likely against corporate policies. Your company may track the movement of sensitive documents and you could get into hot water.

TIP #7: Read your company’s Acceptable Electronic Use (AEU) policy, and follow the policies for safe use of your system and devices.

TIP #8: When backing up to cloud services, consult the IT department for a list of acceptable cloud solutions first. Organizations can make this part of their AEU policy and make it a fire-able offense.

SUPPORT

TIP #9: Call IT before you get in over your head. Often what starts as a simple update can be made more complex by attempting to “fix” the problem.

TIP #10: When you Bring Your Own Device, ask your IT department if your device is approved to receive corporate data before you upload anything to it. Use officially sanctioned applications to access sensitive documents. 

TIP #11: Learn the process for allowing IT to connect virtually to your system. This can save time when you contact support and they need access to resolve an issue.

TIP #12: Learn basic computer hardware terms. This can save valuable time when you contact support and don’t have to describe the “mouse connector-thingy.”

Employees are on the front lines of information security. The more that can be done to regularly educate and remind them of the small things they can do goes a long way towards protecting your organization.

As our holiday gift to you unsung hero IT admins, we thought we’d provide some useful tips to pass along to employees to help make your job a little bit easier next year. Feel free to download and share!

{Editor's note: This article was previously published on 12-02-14 but has been updated}


file with .vvv extension

$
0
0
I need a solution

This morning I found all my icons in white. I have restarted my pc and now I have all my files with .vvv extention.

I fearthat I havethe virusTeslaCrypt.

Can you help me? Is it possible to restore the files?

Thanks

0

Howto: Switch language of installed client during upgrade?

$
0
0
I need a solution

Hello,

we have a sep environment running for multiple clients (EXSP)

We are currently upgrading from 12.1.5.x to 12.1.6 MP3.

We have one group, where we did install the german version of the symantec endpoint client, but these clients should be switched to the frensch version of the client.

I did put in the FR Win32+64 Clients, but the clients in that group remain on the 12.1.5.x level.

All other groups, where the client languages match the ones in the group upgrade just fine.

Is there a way to force the clients to "switch" to the language specified/available in the group?

With best regards

0

SEPM in DMZ

$
0
0
I need a solution

I've been searching for solid documentation on setting up a SEPM in the DMZ for our off network clients to pull updates from. I've found the following documentation but, it doesn't address my specific situation.

https://support.symantec.com/en_US/article.TECH178...

Questions I have are:

     1. When installing the DMZ SEPM what are the advantages to replicating to our internal SEPM? Is it required, and which way would I replicate with an imbedded DB?

     2. After the SEPM is installed, if I'm replicating will that import my current MSL's? I don't want all the clients pointing to this server.

          2a. For the off network clients, I'll have to create a specific SEP install package that contains the proper group that the MSL is assigned to?

     3. Will my clients receive their definitions from the server directly or does that default to Live Update on the DMZ?

Thank you in advance

0
1449066696

Fake LinkedIn accounts want to add you to their professional network

$
0
0
Scammers copy information from real LinkedIn profiles to pose as recruiters and attract new connections.

Read More

No puedo loguear SEPM

$
0
0
I need a solution

Hola,

He borrado uno de los servidores bajo Admin -> Servers y quiero reemplzarlo con el otro que estaba en el mismo sitio (solo habia dos) con motivo de una migracion. Al otro servidor lo nombre como elprimero debido a que este ultimo ya poseia Windows 2012 y demas cosas actalizadas. Ahora no puedo loguearme a SEPM a pesar de que todo parece estar bien.

Alguna sugerencia?

Saludos

0
Viewing all 11471 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>