Quantcast
Channel: Symantec Connect - ブログエントリ
Viewing all 5094 articles
Browse latest View live

Monitoring Android Network Traffic Part IV: Forwarding To Wireshark

0
0

TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program. However, do not despair. This blog series will provide step-by-step instructions for cross compiling, installing, and running TCPDUMP on Android mobile devices.


Backup Exec 2014 – GA Date Confirmed

0
0

We promised to keep you updated on the progress of Backup Exec 2014. Today, I am excited to confirm that Backup Exec 2014 will reach general availability (GA) on 2 June 2014!

As indicated in my last update, we closed the Beta program a little over a week ago. I wanted to share some additional customer feedback we received since that time:

  • “Love the redesign on the UI- specifically the Job Monitor.”
  • “Happy that I have so much flexibility to see what is happening, without having to navigate between screens.”
  • “Very pleased with it. Very smooth installation and it works very good.”

Thank you for your continued support.

 

Emerging Threat - Anonymous - Operation World Cup/Hacking Cup

0
0

EXECUTIVE SUMMARY:

Who: Anonymous - a politically motivated group of hacktivists (mostly Brazil based).
What: Cyber-attacks against sponsors of the World Cup, mostly DDoS based.
When: Circa June 12th 2014, the beginning of the World Cup in Brazil.
Why: The hacker group Anonymous is preparing cyber-attacks on corporate sponsors of the World Cup in Brazil to protest the spending of money on soccer games instead of public services.

Join Us to See What's New with Symantec Backup Exec 2014

0
0
Backup anywhere, recover anything.

solve2-img.jpg

 

Virtualize the Right Way and Solve Your Backup and Recovery Challenges With Backup Exec 2014

Learn how to solve your biggest backup challenges at our live streaming event on June 17.  See Backup Exec 2014 in action; hear from Symantec executives, customers and partners; and get the latest tips and tricks for protecting your data.

What will you gain when you can recover anything in minutes, get up to 100% faster backups, and take advantage of an easy to use solution that protects your virtual and physical environments? Find out how you can save time and money, deliver better virtualization, and complete Disaster Recovery with Backup Exec 2014. superior visibility into backups with the job monitor view and multi-server backup jobs; new platform, virtual and application support; intelligent deduplication and more.

Register Now.

Backup anywhere, recover anything.

Welcome to the Enterprise Vault Engineering Blog

0
0

We are pleased to welcome you to the Enterprise Vault Engineering Blog.  We have decided that the world of Enterprise Vault is big enough for two official blogs, and whilst the Product Management team will continue to provide the same great insight and information in the existing Enterprise Vault Blog, the Engineers that are working under the product’s hood on a daily basis want to share some of their thoughts, expertise and tricks of our trade with you here. This blog’s remit is wide and varied, from simple updates on new features, to useful troubleshooting tips and deeper insight on the nuts and bolts of existing ones, all with a technical and engineering based slant.

If you have particular areas of the product or specific topics that you would find it interesting for us to blog on then please ask in the comments below. Much like an enhancement request or hotfix, we cannot always guarantee to have the answers for you immediately, but we will endeavour to meet your needs as efficiently and effectively as possible.

So keep watching this Blog and spread the word. And please allow us some leeway on our literary in-adeptness and grammatical in-correctness, Engineers are programmed to write code, not words, but we hope that what we do write will be informative and interesting enough to keep you coming back for more.
 

KC User Group revitalization effort!

May 2014: Most Popular Content in the Storage and Clustering Community

0
0

Looking for the Right Data Backup Solution for the Virtual World? Ask Yourself These Three Questions

0
0
Three key questions to simplify vendor selection

Backup is like an insurance policy. You want it for the peace of mind, but you don’t want it to dominate your workday (also, nights and weekends!). You need to protect data on your virtual machines to guard against hardware/storage failures and user errors. You may also have regulatory and compliance requirements to protect data for the longer term.

Selecting-a-VM-Backup..png

VMware made virtual machine data protection easy for administrators by introducing vStorage APIs for Data Protection (VADP). VADP is a set of APIs (Application Programming Interfaces) made available by VMware for backup software vendors. These APIs make it possible for backup software vendors to embed the intelligence needed to protect virtual machines by integrating with vSphere. Through these APIs, the backup software can create snapshots of virtual machines and copy those to backup storage.

Choosing a backup product that supports VADP may look like an overwhelming task; especially when vendors are clogging the social media channels with campaigns and promotions. What is the best way to choose a solution for protecting virtual machines?

If your organization in a transition phase to virtualized infrastructure, see what backup product is currently in use for protecting physical infrastructure. Most of the leading backup vendors have support for VADP. Symantec NetBackup, Symantec Backup Exec, IBM TSM, EMC NetWorker, CommVault Simpana are examples. No need to go shopping; most of these products have matured over years to handle modern workloads in vSphere and take advantage of VADP.

If you are not currently invested in a backup product or unhappy about the current solution, there are a number of things for you need to consider. VMware has a free product, called vSphere Data Protection (VDP, not to be confused with VADP) that supports some of the capabilities of VADP. It is an easy-to-use virtual appliance with which you can schedule backups and store them in deduplicated storage. There are also point products (Quest vRanger, Veeam Backup & Replication etc.), which work only on virtualized infrastructure. Established backup software vendors, like Symantec, also provide solutions tailored for VM infrastructure (e.g. Symantec Backup Exec V-Ray edition) that are built for virtual infrastructure, but that also support workloads on physical systems.

Now that we know VADP support is available in most backup solutions, it is a good idea to dissect VADP capabilities and the problems it solves in virtual environments. Not all backup products support all VADP capabilities. Hence, it is important to create a checklist of features that are important for your environment to enable you to ask the right questions while in the market looking for VM backup solutions. To begin, there are three key questions that will help you narrow down the selection. 

Virtual MachineQuiescence and Security

Security-Level_0.png

First key question to ask: Does your solution require backup admin to have access to application and/or guest operating system credentials? 

Explanation: Using VADP, the backup software can interact with guest operating system through virtual machine tools (VMware vSphere tools that you install on each guest operating system). This is how the backup software quiesces file systems and applications inside the guest. For smaller environments, where a single trusted individual acts as the administrator for applications, guest operating systems, vSphere infrastructure and backup server; you may choose solutions where the backup server software can use guest operating system credentials to access what is inside the virtual machine. The caveat here is, of course, the fact that the individual managing backups have full access and visibility to everything in the production environment. For example, the backup admin may be able to browse the contents from backup image of a virtual machine hosting Microsoft Exchange and potentially breaking privacy/security barriers without any trails.

Enterprise grade backup applications eliminate the security risk by making use of agent-assisted backups. In this method, a lightweight agent is installed on virtual machine hosting mission critical applications with sensitive data. The agent runs in the security context of the application owner inside the guest. This agent does the file system and application quiescence as well as the application object enumeration on behalf of the backup server. After that, the backup server takes over and creates the virtual machine snapshot using VADP. As the guest/application credentials is not saved in backup server, the backup administrator does not have access to the actual sensitive application content. 

Data Transport Methods

Transport_0.png

Second key question to ask: What are the VADP data transport methods you support?

Explanation: Once a VM snapshot is created. VADP provides four different methods to move data from vSphere data store to backup storage. 

  1. SAN Transport: The backup server is zoned to see the SAN storage where vSphere data stores are located. The backup server reads data directly from SAN storage using the APIs, bypassing the production ESXi infrastructure. This method is the most preferred over other methods as it is a true off-host backup. However this method works only when vSphere data store is on Fibre Channel or iSCSI SAN environments.
  2. NBD Transport: NBD stands for Network Block Device. In this method, the ESXi host presents the snapshot of the VM over network as if it is a block device. The backup server can read data through network. This is the simplest method to maintain, as there are no configuration and management required. However, this method does use resources from ESXi kernel (VMkernel).
  3. NBD SSL Transport: This is the same as NBD but inflight data stream is secure because of SSL. Recommended for environments where network traffic must be protected from sniffing.
  4. Hot-add Transport: One or more dedicated virtual machines with backup software (known as backup proxies) must be installed to use this method. In this case, the snapshot disks from VMs are mounted on proxy VM and streamed to backup server. Recommended for small environments and remote/satellite offices.

It is recommended to choose a solution that supports all transport methods even if some of these methods may not be applicable for you today. This will avoid unnecessary operational complexity and switching costs down the line. 

Think outside VADP

Think-outside-the-box_0.png

Third key question to ask: What do you recommend for protecting my environment where VADP cannot be used?

Explanation: While VADP is one of the greatest innovations in virtual machine protection, it is not the end-all. There are scenarios where VADP will not fit the bill. You don’t want to be taken by surprise. Hence, you need to ask the third question if any of the following are true: 

  • You have virtual machines with Fault Tolerance (FT) enabled. Note that FT protects against local hardware failures only. To protect against user errors, vulnerability attacks and site loss; backup is essential
  • You have virtual machines using Raw Device Mappings (RDM)
  • You have your vCenter servers and/or vCenter databases hosted on dedicated physical servers
  • You have more than one hypervisor in use (e.g. Hyper-V, KVM…)
  • You have physical systems for specialized workloads
  • You have NAS devices
  • You have applications/databases with granular recovery requirements in the security context of application/database owner

Plan for a multi-hypervisor world sprinkled with even a few purpose-built physical systems as your business grows. While VADP is a boon for VMware vSphere based virtual machine protection, you are in control if you avoid getting locked into a single hypervisor platform. A good backup solution will not only address the data protection needs, but it can also act as a migration tool in heterogeneous data centers and clouds. 

Conclusion: VMware vSphere Virtual Machine backup has been simplified with the wide adoption of vStorage APIs for Data Protection by most backup software vendors.  While evaluating a solution for VM protection, it is imperative to consider the operating model for data security, data transport methods and things that may require more than just VADP integration.


ITMS 7.5 SP1 is available now

0
0

We're happy to announce today the general availability of ITMS 7.5 SP1.

Some of the highlights for this release include:

1.   Server and Client-side platform support updates

  • Notification Server support for Windows Server 2012 R2
  • Site Server support for Windows 8/8.1 and Windows Server 2012/2012 R2
  • Client support for Windows 8.1, Windows Server 2012 R2, Mac 10.9, Windows 7 Embedded, ESXi 5.5, and RHEL 5.10
  • Console support for IE10 and IE11

2.   Reusable targets, flexible filtering

  • New visual builder
  • Immediate result verification
  • Enhanced import and export capabilities

3.   Inclusion of Workspace Streaming Agent

  • "Network mode" application streaming

4.   Ease of implementation

  • In-place upgrade from 7.1 SP2 MP1.1 and ITMS 7.5 HF6
  • Targeted agent backward compatibility

5.   Other important enhancements

  • Notification server performance improvements
  • Native 64-bit version of Symantec Management Agent for UNIX, Linux, and Mac
  • Hierarchy and replication improvements
  • Expanded reporting and error handling
  • Multitasking for VMM Tasks

Please find details about the above and many other items related to this release in the release notes and product documentation found at IT Management Suite (ITMS) 7.5 SP1 Documentation.

Thank you.

 

Esteja preparado: Não caia nas Armadilhas Online Durante a Copa do Mundo

Spammers Push Hard to Capitalize on Father’s Day

Pride Month Series - Celebrating Our Leadership in LGBT Equality

0
0

45 years ago, the Stonewall Riots of 1969 marked a turning point in the Lesbian, Gay, Bisexual and Transgender (LGBT) community’s fight for equality. On its one-year anniversary in June of 1970, New York’s "Christopher Street Gay Liberation Day" march was held attracting thousands of supporters as it weaved through the streets of one of America’s most prominent cities.

                                          ChrisStreet_0.jpg

By 1978, San Francisco artist Gilbert Baker had created what would become the international symbol for LGBT equality – the rainbow – and by the early 90s this became a symbol not only for gay pride, but for the entire LGBT community. In June of 2000, United States President Bill Clinton deemed the month of June Gay and Lesbian Pride Month. In 2003, Turkey became the first Muslim-majority country in which a Pride event was held. Each year since 2009, United States President Barack Obama has issued a proclamation officially declaring June LGBT Pride Month in the United States. An excerpt from this year’s proclamation reads:

“As progress spreads from State to State, as justice is delivered in the courtroom, and as more of our fellow Americans are treated with dignity and respect – our Nation becomes not only more accepting, but more equal as well. During Lesbian, Gay, Bisexual, and Transgender (LGBT) Pride Month, we celebrate victories that have affirmed freedom and fairness, and we recommit ourselves to completing the work that remains…..I call upon the people of the United States to eliminate prejudice everywhere it exists, and to celebrate the great diversity of the American people.”

- Presidential Proclamation -- Lesbian, Gay, Bisexual, and Transgender Pride Month, 2014

Due to the passion and courage of millions, immense progress has been made since this key turning point in 1969 to honor and ensure equality for the LGBT community. It is reassuring to see how far we’ve come in so many parts of the world, highlighted this month by the millions of people who will come together in a variety of celebrations – small and large – to celebrate LGBT Pride Month.

Honoring LGBT Equality at Symantec

At Symantec, we are proud to be recognized as a leader in LGBT diversity. Equality for the LGBT community is something we’ve supported historically and have spent years engraining in our values and benefits:

  • Symantec has scored 100% on the Human Rights Campaign’s Corporate Equality Index - the US’s national benchmarking tool for corporate policies and practices related to LGBT equality - for the last six consecutive years.
  • We offer a leading benefits package, including all of the health benefits around equality, many of which are often not included in corporate benefits programs.
  • Additionally, Symantec’s LGBTA (the A represents straight Allies) employee resource group - SymPride - is one of our most active resource groups. This community is not only active inside Symantec, but also provides ongoing community support to local pride events and initiatives.

Additionally, Symantec recently joined the Human Rights Campaign (HRC) as a national corporate partner at the Bronze level. The HRC partners with organizations that have a proven record of support for gay and lesbian employees and the LGBT community. To participate at this level, HRC requires that companies complete their Corporate Equality Index survey and score an 85% or above (as mentioned before, we’ve scored 100% on the index for six consecutive years).

The partnership includes many opportunities to publicize our commitment to LGBT equality as well as meet and network with like-minded individuals, companies, celebrities, politicians and media, all with the same goal – to increase equality for the LGBT community. We have also signed on as a member of HRC’s Business Coalition, which means Symantec supports the United States Employment Non-Discrimination Act (ENDA). ENDA is legislation proposed in the United States Congress that would prohibit discrimination in hiring and employment on the basis of sexual orientation or gender identity by employers with at least 15 employees.

Additionally, we recently joined top companies in signing an amicus brief to be filed in marriage equality cases currently pending in Michigan, Kentucky, Tennessee, and Ohio. The brief will advise the court on the burden to employers resulting from the inability of an employee to marry his or her same-sex spouse (or for the marriage to be recognized) in these states. For example, burdens to employers may include:

  • Lack of certainty and business uniformity;
  • Recruiting/retention challenges;
  • Corporate administrative and financial burdens; and
  • Requiring employers to uphold and affirm discrimination that is injurious to their corporate missions.  

At Symantec, we define diversity as all of the differences that make each of us unique individuals, and will not stop at developing new and innovative ways to foster an open and inclusive environment for our LGBT employees, and the wider global LGBT community. Please join us in celebrating this month and honoring all within and outside our organization who stand strongly for equality.  

 

Antoine Andrews is Symantec’s Director of Global Diversity and Inclusion. 

ITMS 7.5 SP1 Webcast Recording - June 12, 2014

4.5 Cools Things in Data Insight 4.5

0
0

Symantec Data Insight 4.5 is out, here are 4.5 things I think are pretty cool in this product release

upgrade to 7.5 SP1 tip

0
0
Backup deployment folder

Here's a little tip if you are thinking to upgrade to ITMS 7.5 SP1.

 

During the upgrade of deployment, I discovered that the installation deletes deployment folder, and then makes a new one. So if you have your unattended xml files in this folder, make sure that you make a backup of them. When the upgrade is complete, you will see that your image jobs ar corrupted. because xml files are missing. You now need to copy your XML files into the deployment folder again. But image jops ar still not working.

 

I contacted symantec support and they gave me this sql query,

 

UPDATE ItemVersionData 
   SET [State] = cast([State] as nvarchar(max)) + '</vItem>' 
 WHERE [State] like '<vItem>%' and [State] not like '%</vItem>' and LEN(cast([State] as nvarchar(max))) < 4000

 

Run this after you copy youre xml files to the deployment folder. and youre image jobs will now work again.

it is a good idea to open your image task and save them again, as it will get sql database to save a new version of the image task.

I hope this will help someone


The Elderwood Gang: One Relentless Group Behind Current Targeted Attacks

0
0

"Unveiled by Symantec in April 2012, the Elderwood project was a good example of an advanced threat group that was capable of launching highly focused, yet large and persistent campaigns. In April 2012, we observed nearly 2,000 spear- phishing emails being sent by the Elderwood attackers within the same campaign to a large number of recipients who were employees of two major defense industries." - Symantec ISTR Report, 2014

The Mushrooming of Mobile Malware

0
0
The Surprising Scope of Mobile Malware Growth Around The World

Mobile workforces and BYOD have brought smartphone security to the forefront for enterprises and consumers alike. Due to Android’s widespread adoption and open environment, most of security the conversation has, understandably, centered on these devices. But our latest Symantec Internet Security Threat Report reveals that mobile security is a nuanced and varied problem that potentially affects users on all devices.

Connect Dev Notes: 12 June 2014

0
0

Updates deployed to the Connect production servers as a result of the code sprint that ended 10 June 2014.

User Facing: Desktop

  • Added code that would limit posts that display in the list of "Recent Blog Posts" to those that are in an published (not draft) state.
  • Added code that will keep users from running into access denied errors when they submit feedback to the Tranlsate.cloud system.
  • Fixed an issue with email notifications not always firing when a solution is marked.
  • Fixed the sort order of RSS feeds to display the most current posts at the beginning of the feed.

Performance Wins

  • Optimized code by removing legacy "Views" that were generating the various article list pages.
  • Wrote code that identified and removed ~5,000 invalid records in the Accreditations and Certifications database tables.

SEO Wins

  • Added "noindex, follow" meta information to utility landing pages (that don't add value to search indexes).
  • Fixed an issue with missing analytics tracking codes on blog collector pages.

.club gTLD Used in Hit-and-Run Spam Attacks

0
0

Spammers have been abusing generic top-level domains, released by the Internet Corporation for Assigned Names and Numbers earlier this year, in hit-and-run spam attacks.

Simplocker: ファイルを暗号化する Android 版ランサムウェアを初確認

0
0

今回確認された最新の脅威は、より高度なモバイルランサムウェアの登場を予感させるものです。

Viewing all 5094 articles
Browse latest View live




Latest Images