The release of ITMS 7.1 SP2 MP1 Rollup v9.
ITMS 7.1 SP2 MP1 Rollup v9
12 Things to Look for in a Managed PKI Solution, Part 2
This is the second part of a four-part series covering twelve fundamentals for choosing a managed PKI solution, and questions to ask in the buying process.
In Part 1, we shared four key differences between managed public key infrastructure (PKI) providers. This week, we will discuss three features of Symantec Managed PKI that provide your organization with the ability to easily administer and deploy your managed PKI while keeping costs low. Whenever an organization deploys a technology like PKI, the total cost of ownership must be considered. The Symantec Managed PKI offers customers tools and features to maximize the use of the PKI and minimize the total cost of ownership.
5. System Management
While most managed PKI offerings provide customers with a baseline set of features, it’s important to review them and their potential impact on your business. Some providers, like Symantec, give the user complete control of the system and allow you to use the certificate authority to meet current and future use cases. The system is designed to let your organization adapt the service to any situation in your enterprise.
Other providers, such as Entrust, take a different approach and only offer you a limited set of functionality determined at the time the certificate authority is created. If your organization needs to make a change to the functionality or features, then you must work through a support organization and potentially pay additional fees. This leads to an increase in overall cost, delays in deployment, and a general frustration with certificate based technology.
6. System Administration
When administering a managed PKI solution, you need a streamlined and user-friendly web interface that provides a simple yet powerful workflow for managing certificates. Symantec’s Managed PKI offers customer a broad set of base certificate templates to address many use cases. Symantec includes certificate templates for users, devices, MDMs, and many other use cases. These templates can be used in their default state or customized through a web interface that provides instructions, recommendations, and error-checking.
All of this results in easy administration and rapid certificate deployment. These features take the complexity out of PKI deployments and allow the customer to focus on meeting their use cases. Other managed PKI vendors do not have such an easy-to-use interface. Often, these other systems require you to have extensive PKI knowledge to know how to use the system and implement basic certificate types to meet standard use cases. These organizations require expensive PKI personnel with specialized knowledge to operate the system which increases the total cost of ownership.
7. Ease of Deployment
Once an organization is set up to use a managed PKI service, they need to deploy certificates in a timely and efficient manner. Symantec Managed PKI provides you with multiple types of user registration methods that are built into the system. No custom coding or special systems required by the end user. User registration and authentication features are built into the Symantec workflow.
In addition, Symantec offers an easy-to-deploy auto-enrollment server that can seamlessly enroll Windows domain users and computers for certificates. Often this server is deployed by the customer in a short amount of time and without issue. Many other managed PKI vendors do not offer tools to ease deployment. For example, one of our major competitors does not provide built-in workflows for all certificate types, supports limited authentication options, and you cannot install the auto-enrollment server - it requires a professional services engagement which increases cost and delays deployment time.
Questions to Ask
When selecting a managed PKI, here are some questions you might want to ask your managed PKI provider regarding administration and certificate deployment:
- What certificate templates are included with the CA?
- How do I enable new features on the CA? Does it require Support or can a customer do it?
- Is there built-in certificate creation workflows?
- What types of certificate registration options are supported?
- How do you support auto enrollment in a Windows environment?
Our next post, Part 3, in this series will cover how Symantec provides usability and ease of use for end users with its managed PKI service.
How will the end of Windows XP impact your organization?
The clock is ticking down on Windows XP. Microsoft will end technical assistance for the 12-year-old operating system on April 8 and effectively stop delivering automatic updates and security patches to Windows XP users. Although many consumers, small businesses and even large enterprises have already transitioned to newer and more secure systems, an estimated 30 million desktop operating systems still run on Windows XP today and could be left vulnerable after April 8.
At Symantec, we firmly believe running up-to-date security products is a critical step in protecting your enterprise’s information, systems and devices. However, even the best security products can’t fully protect an outdated operating system. XP users will face increased risks after April 8 as cybercriminals try to take advantage of vulnerabilities.
Symantec’s security solutions will continue to support Windows XP systems for the foreseeable future, but we strongly recommend that enterprises still using Windows XP upgrade to a more current operating system as soon as possible and protect it with a robust security solution. Symantec Endpoint Protection 12.1.4 is a good option that’s built on multiple layers of protection, including Symantec Insight and SONAR, and designed to protect against new and unknown threats. Symantec Critical System Protection also offers important server protections for physical and virtual data centers that allow enterprises to lock down applications, configuration settings and resources so that malicious code and vulnerabilities cannot be exploited.
The end of support for XP shouldn’t come as a surprise, especially given recent trends toward more sophisticated technologies and connected devices. Also known as the “Internet of Things,” these new technologies deliver great conveniences and value – even in the enterprise – but one thing is certain: it’s important to keep your information protected regardless of where it’s stored, accessed or shared.
ITMS 7.1.2 MP1.1 v9RU is now available
Release Notes and the actual RU can be obtained from HOWTO81832.
Un update pour Altiris 7.1 SP2 MP1
Android RATs Branch out with Dendroid
Darwinism is partly based on the ability for change that increases an individual’s ability to compete and survive. Malware authors are not much different and need to adapt to survive in changing technological landscapes and marketplaces. In a previous blog, we highlighted a free Android remote administration tool (RAT) known as AndroRAT (Android.Dandro) and what was believed to be the first ever malware APK binder. Since then, we have seen imitations and evolutions of such threats in the threat landscape. One such threat that is making waves in underground forums is called Dendroid (Android.Dendoroid), which is also a word meaning something is tree-like or has a branching structure.
Figure 1. Dendroid advertisement banner
Dendroid is a HTTP RAT that is marketed as being transparent to the user and firmware interface, having a sophisticated PHP panel, and an application APK binder package. The APK binder used by Dendroid just so happens to share some links to the author of the original AndroRAT APK binder.
Figure 2. Dendroid control panel
According to postings on underground forums, the official seller of Dendroid is known as “Soccer.” The seller markets Dendroid as offering many features that have never been seen before and comes with 24/7 support, all for a once off payment of $300 to be paid through BTC, LTC, BTC-e, or other services. Some of the many features on offer include the following:
- Delete call logs
- Call a phone number
- Open Web pages
- Record calls and audio
- Intercept text messages
- Take and upload photos and videos
- Open an application
- Initiate a HTTP flood (DoS) for a period of time
- Change the command-and-control (C&C) server
Figure 3. Dendroid APK binder
As previously mentioned, according to reports on underground forums, the author of the Dendroid APK binder included with this package had assistance writing this APK binder from the author of the original AndroRAT APK binder.
The evolution of remote access tools on the Android platform was inevitable. The creation of Dendroid and the positive feedback on underground forums for this type of threat shows that there is a strong cybercriminal marketplace for such tools. On the PC platform, other crimeware toolkits like Zeus (Trojan.Zbot) and SpyEye (Trojan.Spyeye) started off in a similar manner and grew quickly in popularity due to their ease of use and notoriety stemming from the high profile crimes perpetrated as a result of their usage. While this may be early days for Dendroid, Symantec will be keeping a close eye on this threat.
To stay protected, Symantec recommends installing a security app, such as Norton Mobile Security, which detects this threat as Android.Dendoroid. For general safety tips for smartphones and tablets, please visit our Mobile Security website.
Do you need your own private Certificate Authority?
Stronger, resilient Private CA removes risk while lowering costs
On 1 October 2016 in line with the CA/Browser Forum’s Baseline Requirements, publicly trusted SSL certificates can no longer be issued to reserved IP addresses or Internal Server Names.
To overcome this:
1. You can update all your internal servers to use publically resolvable domains names or fully qualified domain names
2. You can set up an internal self-signed certificate authority
3. Or you could use Symantec’s Private CA offering
A key part of Symantec’s Managed PKI for SSL product this allows you to continue to use reserved IP addresses or Internal Server Names utilising Symantec’s Private Certification Authority (CA) that provides a hosted private SSL certificate hierarchy and end-entity certificates specifically built to secure internal servers.
Symantec’s Private CA uses the same solid infrastructure, which has 100% up-time track record* and robust business continuity programs, organisations meaning companies can put aside the security and disaster recovery infrastructure required to develop, store, and secure private keys.
* since 2004
This Is One Conference Party You Won't Want to Miss
Symantec Vision is pleased to announce that this year's conference party will feature an exclusive performance by OneRepublic. Don’t miss your chance to enjoy one of today’s most popular bands perform hit songs from their recent Billboard top-ten album Native. Register now to reserve your spot for the conference and for Wednesday night! |
OMG a Ransomcrypt Trojan with a Conscience!
Ransomcrypt authors are not known to have a conscience, and until now have always left their victims with no way out, other than paying the extortion demand to decrypt their files. This seems to have changed somewhat with the arrival of Trojan.Ransomcrypt.G. While the authors of this malware are still total scammers, they seem to have some principles and offer to decrypt the victim’s files for free after a one month period, even if the ransom has not been paid. While this behavior does not exonerate the actions of the malware authors, it does leave some light at the end of the tunnel for any unfortunate victims of this scam.
Figure 1.“how to get data.txt” snippet from ransom file left behind by Trojan.Ransomcrypt.G
Trojan.Ransomcrypt.G was first reported by affected users in an online forum. It is a typical ransomcrypt Trojan that encrypts data files on the infected system. File extensions are checked against a long list stored in the Trojan binary file. Most common data file types are affected and you can see the full list here. Encrypted files are given an extra file extension, .OMG!, by the Trojan. For example, if the Trojan encrypted the file hello.doc, it would rename it hello.doc.OMG!.
Compromised users may notice a text file called “how to get data.txt” in directories containing encrypted files.
Figure 2. Directory containing compromised files
This file informs the user that they must send an email to the attacker and attach the text file along with some encrypted files. The attacker will reply with the decrypted files and instructions on how to obtain the unlocker tool that they can use to decrypt all of their data files.
Users may also notice an unusual string of characters at the end of the “how to get data.txt” file.
Figure 3. Binary string from ransom file
This string is actually a binary dump of an encrypted cryptographic key and infection timestamp information. This locking key is used to encrypt and decrypt files on the infected system. It is dynamically generated on the infected system using standard cryptographic Windows functions. Rather than sending this key in plaintext, the Trojan encrypts the locking key with a public cryptographic key (RSA) that is included in the configuration data in the Trojan binary data. The attacker knows the corresponding private key and so they can use it to decrypt the binary string in the text file, recover the locking key, and decrypt the encrypted files sent to them by the victim. The attacker can also recover the infection timestamp from the decrypted string and determine if the victim is eligible for the free unlocker tool.
Most ransomcrypt Trojans automate this type of key exchange with network communications between the victim’s system and a server controlled by the attacker. Trojan.Ransomcrypt.G uses a more basic approach that requires user interaction to perform the same operation.
Users should never pay any ransom to have their files decrypted. The latest Symantec technologies and Norton consumer and Symantec enterprise solutions protect against these kinds of attacks. You should always backup your files, that way you can restore them if necessary.
Symantec customers are protected from this Trojan with the following detections:
How will the end of Windows XP impact your small business?
The clock is ticking down on Windows XP. Microsoft will end technical assistance for the 12-year-old operating system on April 8 and effectively stop delivering automatic updates and security patches to Windows XP users. Although many consumers, small businesses and even large enterprises have already transitioned to newer and more secure systems, an estimated 30 million desktop operating systems still run on Windows XP today and could be left vulnerable after April 8.
At Symantec, we firmly believe running up-to-date security products is a critical step in protecting your small business’ information and devices. However, even the best security products can’t fully protect an outdated operating system. XP users will face increased risks after April 8 as cybercriminals try to take advantage of vulnerabilities.
Symantec products will continue to support Windows XP systems for the foreseeable future, but we strongly recommend small businesses still using Windows XP upgrade to a more current operating system as soon as possible and protect it with a robust security solution. Symantec Endpoint Protection Small Business Edition 2013 is a good option that’s built on multiple layers of protection, including Symantec Insight and SONAR, and designed to protect against new and unknown threats.
The end of support for XP shouldn’t come as a surprise, especially given recent trends toward more sophisticated technologies and connected devices. Also known as the “Internet of Things,” these new technologies deliver great conveniences and value – even in small businesses – but one thing is certain: it’s important to keep your information protected regardless of where it’s stored, accessed or shared.
Connect Dev Notes: 05 March 2014
Updates deployed to the Connect production servers as a result of the code sprint that ended 04 March 2014.
User Facing: Desktop
- Added the ability to browse through private messages listed in your inbox (Account > My Inbox) by clicking one of the posts and navigating via the prev and next buttons on the pages you visit. See prev-next-profile.png
- Added the ability to browse through posts in your list of bookmarks (Account > My Bookmarks) by clicking on one of the bookmarked posts and navigating via the prev and next buttons on the pages you visit. See prev-next-bookmarks.png
- Added the ability to browse through posts listed in your profile's activity feed (Account > My Profile) by clicking on one of the posts and navigating via the prev and next buttons on the pages you visit. See prev-next-profile.png
- Fixed an issue duplicate "Featured Posts" blocks in the right sidebar of blogs that are utilizing the Featured Posts functionality.
Behind the Scenes
- Added the ability for Symantec stakeholders to gather collective usage statistics on posts that appear in several languages. This will allow stakeholders, for example, to request the sum of page views to an English post and its sibling Japanese and Chinese translations.
Check out all of Symantec's recent EMM updates (Video from Mobile World Congress 2014)
From Jack Maddon's Blog -
Last week at Mobile World Congress I stopped by the Symantec booth to catch up on their latest EMM developments. In this video, Travis Grandpre, Director of Product Marketing, gives us an update in this video.
In this video:
- With Symantec's MDM and MAM acquisitions almost completely integrated, the next step is to integrate Norton Mobile Security. This will be available in the next few months.
- The Symantec Sealed program, a collection of partner apps that can utilize Symantec's mobile app management capabilities, has now launched with approximately 120-130 apps.
- Norton Zone, a file syncing product, is now being rolled into Symantec EMM. Integration work is ongoing, so expect to hear more in the future.
See the interview on BrianMadden.com
Symantec SWV and FSLogix Apps Combined Solution
Per-user control of application, add-in, and plug-in visibility for virtualized applications. Enables the use of SWV in Citrix, RDS, VDI, and shared image environments.
Android 版 RAT から枝分かれした Dendroid
ダーウィンの進化論を支える原理のひとつは、変化への適応能力が個体の生存率を高めるという説です。マルウェアの作成者も似たようなもので、技術的な環境や市場が変化するなかで生き残るためには、それらに適応していかなければなりません。以前のブログで、Android 版のリモートアクセスツール(RAT)、AndroRAT(Android.Dandro)と、初のマルウェア APK バインダと考えられる機能についてお伝えしました。それ以来、脅威を取り巻く世界では、こうした脅威の模倣と進化が繰り返されています。なかでも、アンダーグラウンドフォーラムで波紋を広げているのが、Dendroid(Android.Dendoroid)と呼ばれる脅威です。Dendroid という名前には、樹木のような形、あるいは枝分かれする構造という意味があります。
図 1. Dendroid の広告バナー
Dendroid は、ユーザーインターフェースやファームウェアインターフェースがわかりやすいとして出回っている HTTP RAT で、洗練された PHP パネルを備え、アプリケーション APK バインダがパッケージされています。Dendroid で使われている APK バインダには、元の AndroRAT APK バインダの作成者との関連性が見られます。
図 2. Dendroid のコントロールパネル
アンダーグラウンドフォーラムの投稿によると、Dendroid の公式な販売者は「Soccer(サッカー)」と呼ばれています。Soccer は、前例のない豊富な機能と、24 時間 365 日のサポート体制を Dendroid の売りとしており、BTC、LTC、BTC-e、またはその他の決済方法による 300 ドル 1 回払いで販売しています。多様な機能の一部を以下に挙げます。
- 通話記録を削除する
- 電話番号に電話を掛ける
- Web ページを開く
- 通話などの音声を録音する
- テキストメッセージを傍受する
- 写真や動画を撮影してアップロードする
- アプリケーションを開く
- 一定期間、HTTP フラッド(DoS)攻撃を開始する
- コマンド & コントロール(C&C)サーバーを変更する
図 3. Dendroid APK バインダ
上述したように、アンダーグラウンドフォーラムの報告によると、このパッケージに含まれる Dendroid APK バインダは、この APK バインダを作成する際に、元の AndroRAT APK バインダの作成者の力を借りていました。
Android プラットフォームで、リモートアクセスツールの進化はいわば必然でした。Dendroid が作成され、この種の脅威がアンダーグラウンドフォーラムで歓迎されていることから、このようなツールを強力に求めるサイバー犯罪者の市場の存在が裏付けられます。PC プラットフォームでも、Zeus(Trojan.Zbot)や SpyEye(Trojan.Spyeye)といったクライムウェアツールキットは、似たような経緯で始まりました。そして、その使いやすさから人気が急上昇し、これを使って実行された犯罪の知名度により悪名を馳せるようになったのです。Dendroid はまだ始まったばかりですが、シマンテックはこれを厳重に監視していく予定です。
常に安全を保つために、ノートン モバイルセキュリティなどのセキュリティアプリをインストールすることをお勧めします。ノートン モバイルセキュリティは、この脅威を Android.Dendoroidとして検出します。スマートフォンとタブレットの安全性に関する一般的なヒントについては、モバイルセキュリティの Web サイト(英語)を参照してください。
* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/jaにアクセスしてください。
「良心的な」Ransomcrypt Trojan が登場
Ransomcrypt の作成者は、良心のかけらもないことで知られています。これまでも常に、被害者は脅迫的な要求に支払いで応じ、ファイルを復号してもらうしか選択の余地がありませんでした。しかし、今回出現した Trojan.Ransomcrypt.Gでは様子が少し違うようです。Trojan.Ransomcrypt.G の作成者が詐欺師であることに違いはありませんが、何らかの行動原理に従っているらしく、身代金を支払わなくても 1 カ月が経過すれば、被害者のファイルを無償で復号すると申し出てきます。このような行動で作成者が無罪放免されるわけではないものの、残念ながらこの詐欺の被害に遭ったユーザーにとっては、一縷の望みと言えるでしょう。
図 1. Trojan.Ransomcrypt.G によって生成されるランサムウェアファイル「how to get data.txt」の一部
Trojan.Ransomcrypt.G の最初の例は、被害を受けたユーザーから、あるオンラインフォーラムに報告されました。侵入先のシステムでデータファイルを暗号化する、典型的な Ransomcrypt Trojan です。暗号化するファイルの拡張子は、Trojan.Ransomcrypt.G のバイナリファイルに格納されている長大なリストに照合してチェックされます。一般的な種類のデータファイルはほとんど影響を受けますが、完全なリストはこちらを参照してください。暗号化されたファイルには、.OMG! というファイル拡張子が追加されます。たとえば、hello.doc というファイルが Trojan.Ransomcrypt.G によって暗号化されると、hello.doc.OMG! という名前に変わります。
侵入を受けると、暗号化されたファイルと同じディレクトリに「how to get data.txt」というテキストファイルが生成されます。
図 2.暗号化されたファイルを含むディレクトリ
このファイルを開くと、暗号化されたファイルとこのテキストファイルを添付して電子メールを攻撃者に送信するようにという指示が書かれています。攻撃者からは、復号された一部のファイルが添付されたメールが返信されてきます。そのメールに、すべてのデータファイルを復号できるロック解除ツールの入手方法が記載されています。
この「how to get data.txt」ファイルの末尾には、通常とは異なる文字列が含まれています。
図 3.ランサムウェアのファイルに含まれるバイナリ文字列
この文字列が実は、暗号化された暗号鍵と、感染のタイムスタンプ情報のバイナリダンプです。ロック用のこの鍵が、感染したシステムでファイルの暗号化と復号に使われます。鍵は、Windows 標準の暗号化機能を使って、感染したシステム上で動的に生成されます。その鍵を平文で送信するのではなく、Trojan.Ransomcrypt.G のバイナリデータの設定データに含まれる公開暗号鍵(RSA)を使って、ロック用の鍵を暗号化します。攻撃者は対応する秘密鍵を知っているので、それを使ってテキストファイルのバイナリ文字列の解読、ロック用鍵の回復、送られてきた暗号化ファイルの復号を行うことができます。また攻撃者は、暗号化された文字列から感染のタイムスタンプを取り出し、被害者が無償のロック解除ツールを使える期間になったかどうかも判定できます。
Ransomcrypt Trojan では、攻撃者が制御しているサーバーと被害者のシステムとの間のネットワーク通信によって、この種の鍵交換が自動化されているのが普通です。Trojan.Ransomcrypt.G はより単純なアプローチを使っているため、同じ処理を実行する際にユーザーとのやり取りが必要になるのです。
ファイルを復号するために、けっして身代金を支払ってはいけません。シマンテックの最新技術と、コンシューマ向けのノートン製品やエンタープライズ向けのソリューションをお使いいただくことで、こういったランサムウェアの攻撃から保護することができます。ファイルは常にバックアップするようにしてください。そうすれば、必要に応じてファイルを復元することが可能です。
シマンテック製品をお使いのお客様は、以下の検出定義によって今回のトロイの木馬から保護されています。
* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/jaにアクセスしてください。
Symantec Protection Engine 7.5 Released - March 2014
Symantec has released the newest version ofSymantec Protection Engine for NASand Symantec Protection Engine for Cloud Services
The release build number is 7.5.0.34
To download this release go to: https://symantec.flexnetoperations.com/control/symc/registeranonymouslicensetoken
Symantec Protection Engine for Cloud Services:
Symantec Protection Engine for NAS:
What's New in Protection Engine for Cloud Services 7.5 and Symantec Protection Engine for NAS 7.5
- New hypervisor support: Symantec Protection Engine is certified to run on the following hypervisors:
- Windows 2012 Hyper-V
- Windows 2008 R2 Hyper-V
- Unix Xen 3.4.
- Removal of Java dependency for LiveUpdate definitions update: Symantec Protection Engine implements a version of LiveUpdate that is not built upon Java, thus removing the dependency of Java for definitions update. Note: The liveupdate.xml file is now used instead of the liveupdate.conf file.
- Removal of Java dependency in Symantec Protection Engine: You can now install and configure Symantec Protection Engine without the dependency on Java.
- Symantec Insight™: Symantec Insight™ is a file-based detection technology that classifies files as good or bad by examining properties, usage patterns, or users of a given file rather than scanning it.
- Cluster mode support: Symantec Protection Engine can now scan files from storage devices configured in a cluster.
- Microdef packages: Microdefs is a technology used to reduce the virus definition download size on client machines. To reduce the transfer size, microdefs create a dif ference between the new definition file and the source definition file. Using microdefs, a dif ference or a patch file is created for each file in the definitions set. The patch files are applied to the definitions set currently installed on the client machine to update them to the latest released definitions set.
- LogConverter utility: The LogConverter utility converts the Symantec Protection Engine log files into a readable format. This utility converts input log file(s) into text, HTML (-h switch) and CSV (-c switch) formats. The default output format is text.
- XMLModifier utility: TheXMLModifier utility is used to configure options in Symantec Protection Engine when operating in the Core server only mode.
- Security improvements for silent installation: Prior to Symantec Protection Engine 7.5, the response file, required to initiate the silent installation, had to be located in the temp directory of the user . This meant that any user had access to the file. From version 7.5,as part of security improvements, the response/no-ask-questions file must be present in the home directory of the user.
- New Product Catalog for Symantec Protection Engine: Customers who use Symantec LiveUpdate™ Administrator (LUA) to download definitions to their local LiveUpdate server for distribution, must update their product catalog in the LUA. T o download new definitions, you must add Symantec Protection Engine 7.5 to the product catalog in the LUA.
System requirements:
Supported operating systems
32-bit OS
• Windows® 2008 (English and Japanese)
• Red Hat® Enterprise Linux 6.x
• Red Hat® Enterprise Linux 5.x
• SUSE® Linux Enterprise Server 11
64-bit OS
• Windows® 2012 (English and Japanese)
• Windows® 2012 R2 (English and Japanese)
• Windows® 2008 (English and Japanese)
• Windows® 2008 R2 (English and Japanese)
• Solaris (SPARC) 10 and 11
• Red Hat® Enterprise Linux 6.x
• Red Hat® Enterprise Linux 5.x
• SUSE® Linux Enterprise Server 11Supported Virtualization systems
• VMware® vSphere Hypervisor™ v5.1 or later
• Windows ® 2012 Hyper-V
• Windows ® 2008 R2 Hyper-V
• Xen 3.4.3 on RHEL 5.4 x64
All supported operating systems (Windows and Linux) are supported in above Hypervisors.Supported browsers
• Mozilla Firefox® 24 ESR or later
• Microsoft® Internet Explorer® 9 or laterMinimum hardware configuration
• Intel or AMD Server Grade Single Processor Quad Core systems or higher or UltraSPARC
• Java™ Runtime Environment 7 (If UI is required)
• 4 GB random-access memory (RAM)
• 5 GB hard disk space available (10 GB of hard disk space if using URL Filtering)
• 1 NIC with static IP address running TCP/IP
• 100 Mbps Ethernet link (1 Gbps recommended)
Documentation for 7.5 Release:
Symantec™ Protection Engine for Network Attached Storage 7.5 Release Notes
http://www.symantec.com/docs/DOC7184Symantec™ Protection Engine for Network Attached Storage 7.5 Getting Started Guide
http://www.symantec.com/docs/DOC7182Symantec™ Protection Engine for Network Attached Storage 7.5 Implementation Guide
http://www.symantec.com/docs/DOC7185Symantec™ Protection Engine for Network Attached Storage 7.5 Software Developer's Guide
http://www.symantec.com/docs/DOC7188Symantec™ Protection Engine for Network Attached Storage 7.5 C SDK Guide
http://www.symantec.com/docs/DOC7189
Symantec™ Protection Engine for Cloud Services 7.5 Release Notes
http://www.symantec.com/docs/DOC7183Symantec™ Protection Engine for Cloud Services 7.5 Getting Started Guide
http://www.symantec.com/docs/DOC7181Symantec™ Protection Engine for Cloud Services 7.5 Implementation Guide
http://www.symantec.com/docs/DOC7191Symantec™ Protection Engine for Cloud Services 7.5 Software Developer's Guide
http://www.symantec.com/docs/DOC7186Symantec™ Protection Engine for Cloud Services 7.5 C SDK Guide
http://www.symantec.com/docs/DOC7187
How to list the contents of an item folder?
The following query will list the contents of all item folders found within the console:
SELECT vi1.Name As Folder,vi2.Name AS Item
FROM vItem vi1
JOIN vItemFolder vif ON vif.ParentFolderGuid = vi1.[Guid]
JOIN vItem vi2 ON vi2.[Guid] = vif.ItemGuid
ORDER BY Folder,Item ASC
--WHERE vif.ParentFolderGuid = 'folderguid'
--WHERE vi1.Name = 'foldername'
If you wish to use one of the WHERE clauses, then make sure you remark (--) the ORDER BY line.
Workflow Collaboration/Peer Confab Space
Workflow (including ServiceDesk) collaboration and learning effort.
Extending MSP solutions by Partnering with Biomni
Back in December, Symantec partnered with Biomni to deliver an integrated solution that couples Symantec’s industry leading NetBackup solution with Biomni Front Office to complete, an IT Self-Service platform. This results in a more comprehensive Backup as a Service (BaaS) solution with Multi-tenanted Backup and Recovery capabilities on the NetBackup Platform. Customers and end-users can now self-serve their Backup requirements, on-demand. This solution is generally available through all Symantec channels.
Key features include:
• Flexible, configurable self-service portal
• Multi-tenancy support
• Automated backup and restore requests
• Dashboards and reporting
• Support for multiple datacenter locations
• Support for mixed platform environments
• Optimized for VMware vCloud
Video Demonstrations at: http://www.youtube.com/user/Biomni
More to come in April!
Celebrating International Women's Day and Our Efforts to Promote Gender Equality
International Women’s Day, which is observed this Saturday, March 8, has been celebrated in the United States since 1909. Since that time, women have continually broken new ground in the technology fields – from Elsie Eaves becoming the first female member of the American Society of Civil Engineers in 1927, to Stephanie Kwolek inventing Kevlar® in 1965, to Susan Hockfield becoming the first female president of the Massachusetts Institute of Technology in 2004.
The celebration of International Women’s Day serves as a reminder that we must continuously strive towards full gender equity, particularly in the technology fields.
We are proud of our efforts to make opportunities at Symantec and within the technology sector as a whole more accessible to women. This is not just the right thing to do; it also ensures a broad pool of talent, contributes to a diversity of perspectives, and helps our business remain a world-class leader in our field.
Following are highlights of two initiatives demonstrating our commitment to gender equity and world-class performance.
Women on the Board of Directors
Among the largest companies in the San Francisco Bay Area, women comprise only 11.2% of corporate directors. In an effort to ensure that women are represented at the highest levels of leadership at Symantec, we have committed to increasing the representation of women on the Symantec Board of Directors to a minimum of 30 percent.
When working recently to fill two available seats on Symantec’s Board of Directors, the nominating committee took special care to consider all qualified candidates for the roles. Selection criteria at many companies implicitly limit their pool of female candidates. But by looking at broader Board membership experience, rather than just at candidates who had been CEOs, Symantec’s nominating committee was able to identify a number of extremely well-qualified female candidates.
As a result, when the Board welcomed two new Directors in October 2013, not only did the company deepen its highly qualified leadership, it also met the goal of 30 percent representation of women. Anita M. Sands joined Symantec after most recently serving at UBS Financial Services as Group Managing Director and Head of Change Leadership. Major General Suzanne M. Vautrinot came to Symantec after a 31-year career with the US Air Force, most recently having directed 14,000 people as part of a multi-billion dollar cyber-focused enterprise conducting military, law-enforcement, and intelligence operations.
Going forward, Symantec will continue to apply inclusive, rather than exclusionary, hiring and advancement criteria to ensure access to a wide and diverse pool of qualified applicants.
Gender Equity Image Project
As the public face of our company, our marketing efforts are a particularly important area in which Symantec must address gender equity. Through the Gender Equity Image Project, Symantec is conducting an organized effort to reduce stereotypical imagery in our promotional, sales, and advertising communications. As part of this project, Symantec conducts an annual audit of gender representation in its communications with the public. While we have worked on this informally for several years, the project was formalized in 2013.
The goal of the project is to increase the percentage of imagery that is considered a positive representation of gender roles. After completing the first gender representation audit, Symantec worked with its marketing agencies and key stakeholders to set a target of 5% improvement in scores over the first year. We have also used the lessons from this project to update our Visual Guidelines and our Corporate Editorial Style Guide in order to educate all groups involved with marketing and sales on the company’s commitment to positive gender representation.
Looking Forward
Our work to promote gender equity in the technology field demonstrates our deliberate and systematic approach to continuing this world-class performance, as in our achievement in FY13 of increasing the participation of women in management from 25 to 27 percent, matching the overall percentage of women who are employees. As we move forward, we will continue to pay careful attention to these issues, as well to focus on increasing opportunity for women within management roles.
To learn more about Symantec’s commitment to gender equality, visit the Diversity and Inclusion page of the Corporate Responsibility website.
Cecily Joseph is Symantec's Vice President, Corporate Responsibility.