Quantcast
Channel: Symantec Connect - ブログエントリ
Viewing all 5094 articles
Browse latest View live

Why Can't I Work an Incident in Servicedesk

$
0
0
No More Fat Fingers in the Local Machine Editor
Publish to Facebook: 
No

Sometimes It pays to be careful in the Local Machine Editor on your Servicedesk Server.  Recently an error message came to me along with a complaint that Incidents in Servicedesk could not be opened or worked on.  In fact, Process Manager was even not able to open for a short while.  In review of the log files, we discovered the following error, shortened and focused:

Exception: Can't create RuleAction type 'Symantec.ServiceDesk.Cm.Automation.CmRulesetArgumentsProvider'.
[global] Can't create RuleAction type 'Symantec.ServiceDesk.Cm.Automation.CmRulesetArgumentsProvider'.
[global] System.Exception: Can't create RuleAction type 'Symantec.ServiceDesk.Cm.Automation.CmRulesetArgumentsProvider'. ---> System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation. ---> System.ArgumentException: The Message Exchange Factory failed to fetch an exchange by the given name ---> System.ArgumentNullException: Value cannot be null.
[global] Parameter name: name

 

One might think that a rule set is missing, or a ruleset automation dll file has been deleted, but none of those were at fault.  Deeper inspection found that the Object Storage Default Exchange Name value had been cleared from the LocalMachine Editor utility.  A quick entry of Local.orm, the default value, and a restart of services quickly resolved the issue.  

As you peruse the various settings in that editor, possibly configuring additional publishing destinations, or maybe adding a load-balancing configuration, just be careful to NOT change that setting, especially for Servicedesk.  It might come back to haunt you in the future. 


Symantec CA’s Initial Response to Google’s Revised Proposal

$
0
0
Background Image on Blogs "Quilted" Page: 
Publish to Facebook: 
No
Twitter カードのスタイル: 
summary

Today, Google put forward a revised proposal regarding our CA business, which we are currently reviewing. Google’s proposal follows collaborative and constructive community discussions. Our goal has been to reach a solution that minimizes disruption for our customers and is in the best interests of the entire Internet community.

While there remain details to be considered, we believe Google has put forth a new proposal that limits business disruption for customers as compared to prior proposals. Notably, Google’s revised proposal would not require Symantec to move to shorter-term validity certificates beyond what was approved by the CA/B forum in Ballot 193 for all CAs and Symantec’s Extended Validation certificates would remain intact. Given the potential impact of any changes that might be implemented, we are carefully reviewing this proposal and will respond shortly with feedback for the community’s consideration.

We thank our customers and the community for their patience and participation in this important discussion.

Best Regards,

Roxane Divol

Executive Vice President & GM, Symantec Website Security

An Integrated Defense Strategy to Fight Ransomware at Every Attack Point

$
0
0
Background Image on Blogs "Quilted" Page: 
Publish to Facebook: 
No
Twitter カードのスタイル: 
summary

The WannaCry ransomware attack has wreaked havoc across the globe and dominated headlines for days. There is a lot of good research out there that has covered this attack. Unfortunately, this is just the latest – and perhaps the starkest—reminder that ransomware is on the rise. As noted in Symantec’s latest Internet Security Threat Report (ISTR-22), in just the last year, we saw more than one million new malware variants every day and the number of ransomware “families” tripled.

Given those trends, we can be sure the WannaCry ransomware attack will not be the last.

As has been pointed out innumerable times in the last week, it’s critical that organizations implement all available security patches as quickly as possible. But to fully protect your organization against today's most serious threats, you should have a good understanding of the latest and most advanced technologies for complete security.

Most ransomware threats arise from either malicious email (as per ISTR-22, 1 in 131 emails contain malware including ransomware) or a malicious website (an estimated 76% of websites scanned have vulnerabilities that can be exploited by attackers to serve malware). Advanced ransomware protection solutions offer integrated defense across ALL control points – email, web and endpoint – to stop ransomware.

Here is a primer on the latest capabilities your solutions should include:

Integrated Email and Web Control Point Protection

  • Advanced heuristics engine to examine every attribute of an email, including the header, body and payload.
  • Integrated Threat Intelligence that can proactively learn from the global context and inform the deployed products and solutions on emerging threats. And if the deployed email solution can inform the web solution regarding discovered threats and vice versa, that results in superior protection
  • Reputation analysis to block bad files and urls by comparing them against known malicious files and websites using global threat intelligence information
  • Comprehensive script analyzers to block ransomware embedded within a script or that deploy macros. Attackers are increasingly “living off the land” and are using macros or PowerShell scripts to deploy ransomware. According to recent research, 95% of analyzed PowerShell scripts were malicious
  • Advanced machine learning to identify malware variants in real time. As per ISTR-22, more than a million new malware variants were released per day last year.
  • Holistic URL inspection to follow, evaluate and block “link” ransomware at either email delivery or when the user clicks on the link (to protect against latently planted malware)
  • Anti-malware scans to verify and inspect all website content before it gets to the endpoint
  • Advanced sandboxing to detonate any suspicious files not just in virtual environments but also physical servers to catch VM-aware malware. Such a sandbox will also employ behavioral analysis and network traffic analysis

Endpoint Protection

The endpoint is the last line of defense. Superior endpoint security solutions should include the following technologies ideally with a single light weight agent that does not hamper user productivity:

  • Advanced machine learning to analyze trillions of examples of good and bad files contained in a global intelligence network and block new malware variants at the pre-execution point
  • Exploit Prevention. Almost every week you hear about a new 0-day vulnerability discovered in popular software like browsers and productivity software. IT organizations cannot keep up with testing and applying patches fast enough as was proved by the Wanncry attack which leaves a vulnerable attack surface on these software that are exploited by attackers, many a times with memory based attacks. Exploit prevention technology protects against such 0-day vulnerabilities and memory based attacks.
  • File reputation analysis to examine billions of correlated linkages from users, websites, and files to identify and defend against rapidly-mutating malware
  • High-speed emulation at the endpoint acts like a light and fast ephemeral sandbox allowing for the detection of polymorphic or mutating malware.
  • Behavioral monitoring. Should a threat make it this far along the chain, behavioral monitoring can tap into the power of machine learning to monitor a wide variety of file behaviors to determine any risk and block it. Again a great defense against ransomware and stealthy attacks such as malicious Powershell scripts.
  • Intrusion Prevention and Host based Firewall to prevent initial incursion and lateral movement of malware. This technology was extremely efficient in preventing the Wannacry worm from spreading through the organization.
  • Integrated Endpoint Detection and Response that can uncover incidents, hunt for indicators of compromise, detonate suspicious files in a sandbox and provide easy one-click remediation like isolating endpoints, blacklisting and deleting files.

Network Security + Endpoint Security = Better Together

One area that is often neglected and where Organizations should pay particular attention is integrating their network security products with the endpoint security. For too long, information security has been a piecemeal battle. Security practitioners have been forced to stitch together an array of point products that weren’t designed to work together.

The best endpoint and network security products should be able to learn from each other to strengthen the security posture of the Organization. If a malware is identified at the network say at the Proxy or Email gateway or at an endpoint, a blacklist of such a file pushed out to the rest of the organization in near real time will ensure that the infection is contained.

As organizations struggle to deal with the rising security demands associated with complex networks and myriad, ever-mutating external threats (it’s sobering to consider that the WannaCry cyber attack was actually a pretty simplistic virus), it's imperative to ensure you’re following best practices and that the right security solutions are in place. This means complete security across email, web and endpoints.

The consequences for operating with more limited protection have never been more clear.

For additional and more detailed information from Symantec regarding the WannaCry virus and how you can be better protected, visit https://www.symantec.com/outbreak/?id=wannacry.

IT Management Suite 8.1 and Ghost Solution Suite 3.2 Launch Webcast - May 16

$
0
0

May 2017 Endpoint Management Technical Workshop - Slides and Videos

$
0
0
Publish to Facebook: 
No

IMG_1882_0.JPG

We just held our Endpoint Management Technical Workshop in Chicago! We kicked things off with a Live Webcast to officially launch IT Management Suite 8.1 and Ghost Solution Suite 3.2. Following the webcast, we had 11 sessions and 4 labs. 

Special thanks to the Symantec Product Management and Education teams who created and delivered most of the content and to all the customers, partners, and employees who attended and helped make the event a success.

To download the slides from the sessions and labs, click on the links below. We did film many of the sessions. Videos will be posted as soon as they are available.

May 2017 Endpoint Management Technical Workshop - Sessions:

May 2017 Endpoint Management Technical Workshop - Labs:

2017 Endpoint Management Technical Workshop - ITMS 8.1 and Ghost 3.2 Deep Dive (Presentation)

$
0
0
Publish to Facebook: 
No

2017 Endpoint Management Technical Worklshop held May 16-17

  • Session: IT Management Suite 8.1 and Ghost 3.2 Deep Dive (Presentation)
  • Presenter: Brian Sheedy and Tomas Chinchilla, Symantec

Video coming soon...

2017 Endpoint Management Technical Workshop - ITMS 8.1 Migration Best Practices (Presentation)

$
0
0
Publish to Facebook: 
No

2017 Endpoint Management Technical Worklshop held May 16-17

  • Session: IT Management Suite 8.1 Migration Best Practices (Presentation)
  • Presenter: Tomas Chinchilla, Symantec and Ian Atkin (Oxford University)

Video coming soon...

2017 Endpoint Management Technical Workshop - ITMS and CCS Integration (Presentation)


2017 Endpoint Management Technical Workshop - Zero to Cloud-enabled Management in 60 minutes (Presentation)

$
0
0
Publish to Facebook: 
No

2017 Endpoint Management Technical Worklshop held May 16-17

  • Session: Zero to Cloud-enabled Management (Presentation)
  • Presenter: Tomas Chinchilla and Brian Sheedy, Symantec

Video coming soon...

2017 Endpoint Management Technical Workshop - Windows 10 Migration (Presentation)

$
0
0
Publish to Facebook: 
No

2017 Endpoint Management Technical Worklshop held May 16-17

  • Session: Windows 10 Migration (Presentation)
  • Presenter: David Evans, Symantec

Video coming soon...

2017 Endpoint Management Technical Workshop - ServiceDesk 8.1 (Presentation)

$
0
0
Publish to Facebook: 
No

2017 Endpoint Management Technical Worklshop held May 16-17

  • Session: ServiceDesk 8.1 (Presentation)
  • Presenter: Brent Ring, Symantec

2017 Endpoint Management Technical Workshop - Mac Management (Presentation)

$
0
0
Publish to Facebook: 
No

2017 Endpoint Management Technical Worklshop held May 16-17

  • Session: Mac Management (Presentation)
  • Presenter: David Evans, Symantec

Video coming soon...

2017 Endpoint Management Technical Workshop - Business Analytics using IT Analytics Reporting (Lab)

2017 Endpoint Management Technical Workshop - Introduction to Asset Management Suite (Lab)

2017 Endpoint Management Technical Workshop - Extending the ITMS CMDB using Custom Inventory (Lab)


2017 Endpoint Management Technical Workshop - Achieving Software License Compliance in ITMS (Lab)

WannaCry: Ransomware attacks show strong links to Lazarus group

$
0
0
Similarities in code and infrastructure indicate close connection to group that was linked to Sony Pictures and Bangladesh Bank attacks

続きを読む

WannaCry ランサムウェア: Lazarus グループとの関係が濃厚に

$
0
0
コードやインフラストラクチャの類似点から、Sony Pictures Entertainment とバングラデシュの銀行に対する攻撃に関与したグループとの密接な関係が浮き彫りになってきました。

続きを読む

WannaCry:勒索软件攻击事件与Lazarus团伙有紧密关联

$
0
0
代码和基础设施中的相似之处表明:最近的勒索软件攻击事件与攻击索尼影业公司和孟加拉银行的网络犯罪团伙紧密相关

続きを読む

CAA checking: what is it, and why should it be mandatory?

$
0
0
Publish to Facebook: 
No
Twitter カードのスタイル: 
summary

The Public Key Infrastructure (PKI) ecosystem relies on root certificates issued by various certification authorities (CAs) like Symantec. This is what browsers use to decide which websites can be trusted, and which ones can’t.

Currently, any CA can issue a TLS certificate for any domain. That’s how the system works, and it’s good in the sense that it gives website owners choice; they can change CAs if they want to. But the downside is that unregulated certification can lead to ‘mis-issuance’, either by mistake or by rogue CAs.

A number of technologies have been created in an attempt to limit instances of miscertification, such as Certificate Pinning and Certificate Transparency. These have been effective in making the internet a safer, more trustworthy place but they’re reactionary. Both are only able to address mis-issuance after it’s happened.

But is it possible to prevent certificates from being mistakenly or inappropriately issued? Yes. Enter: Certification Authority Authorization (CAA).

CAA prevents mis-issuance by:

  1. allowing domain owners to specify which CAs are authorized to issue certificates for their domains; and
  2. giving CAs the ability to check this authorization before issuing a certificate.

In this article we’ll explain how CAA works, and why making CAA checking mandatory is a good move for both customers and CAs.

What is Certification Authority Authorization?

A Certification Authority Authorization (CAA) record is a DNS Resource Record. It allows a domain owner to specify which CAs are authorized to issue certificates for their domain and, by implication, which aren’t.

The idea is that a CA will check the CAA record(s) for a domain before issuing a certificate. If it finds that a domain has no CAA record, then it’s free to issue a certificate for it if all other validation checks succeed. However, if it does encounter one or more records, then the CA can only issue a certificate if it’s named in one of the records, indicating that it is authorized to issue a certificate for that domain. The whole process is designed to prevent CAs from inappropriately or mistakenly issuing TLS certificates.

Sounds great. Why isn’t everyone doing this?

Symantec has been checking CAA records for years, but it’s not a common practice. There are two reasons why CAA checking isn’t widely practiced:

  1. many domains don’t have a CAA Resource Record; and
  2. checking the record is not mandatory.

Because it may take some work to create a CAA record, it’s a matter of consciously opting-in, not opting-out. Many domain owners use a DNS hosting provider and CAA is not yet supported in some DNS implementations.

This is why CAA records are expected to be used by most high-value domains. These enterprises keep CAA records for their domains because it limits inappropriate (or malicious) certificate requests, and makes it easier to enforce company policies i.e. only using a particular set of CAs.

The limitations of CAA checking

Of course, CAA checking has its limitations.

For one thing, a newly-issued CAA record does not invalidate any previously-issued certificates that may have been issued by a different CA than the one named by the domain owner. Secondly, it doesn’t flag whether a certificate presented by a web server is a legitimate certificate for that domain.

Furthermore, in order for CAA checking to be effective, all CAs need to be doing it; it doesn’t work if only one or two CAs are checking CAA records as matter of process. CAA checking must be widely adopted if it is to serve its purpose, but the good news is that more than ninety percent of CAs (who are members of the CA/Browser Forum) are in favor of it.

The times are changing: CAA checking will become mandatory

In February 2017, the CA/Browser Forum passed a motion (on which Symantec voted in favor) requiring all CAs (even those who aren’t a member of the Forum) to check for a CAA record as part of the certificate issuance process for each domain. In accordance with RFC 6844, CAs can no longer issue a certificate for a domain unless:

  1. The CA does not find any CAA records for the domain
  2. The certificate request is consistent with the applicable CAA Resource Record(s)

The rule is effective as of 8 September 2017. You can read the motion in full here.

A good outcome for all companies

Mandatory CAA record checking requires CAs to abide by the rules set out in specific CAA records, giving domain owners more control over certificate issuance. This makes it easier for companies (especially larger ones) to enforce a certificate issuance policy across business units. With CAA records applicable to every domain, a company can whitelist a set number of CAs, knowing no other authority can issue a certificate. 

On a broader level, the new rules will mean that CAs can properly reconcile a certificate request at the domain owner’s discretion, holding themselves accountable for any mis-issuance. At Symantec, we believe this is an important step towards a securer, more transparent online ecosystem.

Viewing all 5094 articles
Browse latest View live


Latest Images