If dmp work with powerpath , suggest turn off dmp_monitor_osevent
According engineer suggestion, If dmp work with powerpath ,we suggest turn off dmp_monitor_osevent. This suggestion is also work for 6.0.1, 6.0.3.Read more...
View ArticleLatest Symantec Endpoint Protection Release - SEP 12 RU4 MP1 (12.1.4100.4126)
Hello Everyone,Symantec Endpoint Protection 12 RU4 MP1 is released.This build's version is: 12.1.4100.4126What's new in this release:Extended upgrade supportUnlike most maintenance patch releases, you...
View ArticleFinancial Trojans’ Persistent Attacks on the Japanese Internet Community
In recent years, the Japanese Internet community has faced difficult times trying to combat financial Trojans such as SpyEye (Trojan.Spyeye) and Zeus (Trojan.Zbot). The number of victims affected and...
View Article一歩先を行くサイバーセキュリティ - 攻撃者の先手を取るために
サイバー攻撃はますます大規模に、そして大胆になっているため、セキュリティ対策にも新たなアプローチが必要になってきています。サイバー犯罪者は、従来のコンピュータシステム以外にも攻撃対象を広げており、今ではインターネットに接続できるデバイスのほとんどが標的になる恐れがあります。2013 年は大規模なデータ侵害の年であり、推定 5...
View ArticleSQL Query to show the CMDB Dataclasses and assoicated SQL Tables
select distinct vi.name as [Data Class] ,dc.DataTableName as [SQL table] ,dc.MultiRow ,p.Name as Solution , p.Description from ResourceUpdateSummary rs--...
View ArticleResolving a problem with Changing Installed Features in Symantec Endpoint...
If you have issues with changing the Installed Feature Set, ensure you disable the Uninstall Password option before deploying the Installation Package to the target group.Read more...
View ArticleHow to Convert VMDK to VHD Virtual Disk Image
2Tware Convert VHD is a tool that allow to convert VMware’s VMDK virtual disk image to Microsoft’s VHD image.The other great feature is that also allows you to convert existing physical computers into...
View ArticleDare2BDigital: Symantec Inspires Girls to Pursue Careers in Technology
For the fourth consecutive year, Symantec sponsored and partnered in the Dare2BDigital conference as a part of its Corporate Responsibility and Diversity initiative. The objective of the event was to...
View ArticleTwitter Spam: Compromised Accounts and Websites Lead to Diet Spam
Earlier this week, a large number of Twitter accounts were compromised and used by spammers to spread “miracle diet” spam. The compromised accounts included public figures, as well as average users of...
View ArticleApplying for an SSL certificate? Do your homework first!
If you need an SSL certificate to protect your website or some other business-critical application such as email or storage systems, then you need to remember your ABCDs.A is for the Appropriate...
View ArticleSQL Query for the Backup Exec catalog filename checking.
Backup Exec I want to share the following simple tip. This is to query the BE SQL DB(BEDB) for check the file name for the catalog. This information will not be directly supported by Symantec. In...
View Articleオンラインバンキングを狙うトロイの木馬: 日本のインターネットユーザーに対して執拗に続く攻撃
ここしばらく、日本のインターネットユーザーは SpyEye(Trojan.Spyeye)や Zeus(Trojan.Zbot)といった、オンラインバンキングを狙うトロイの木馬への対応に悩まされ続けています。これらのマルウェアによる被害件数も、銀行口座から引き出された金額も、驚くほどの割合で急増しています。警察庁によれば、オンラインバンキングでの不正な引き出しの件数は、2012 年の 64...
View ArticleTwitter スパム: 侵入を受けたアカウントと Web サイトからダイエットスパムが拡散
先週、Twitter アカウントが大量に侵入を受け、「miracle diet(奇跡のダイエット)」スパムを拡散するスパマーに悪用されました。侵入されたのは、有名人のアカウントだけではなく、一般の Twitter ユーザーのアカウントも被害に遭っています。図 1. Twitter...
View ArticleFake Voting Campaign Steals Facebook Users’ Identities
Contributor: Parag SawantPhishers continuously come up with various plans to enhance their chances of harvesting users’ sensitive information. Symantec recently observed a phishing campaign where data...
View ArticleTwo Things to Consider when Setting Up Shortcut Content in Enterprise Vault
Are you struggling to find the best settings to use for the shortcut content in your Enterprise Vault environment? There a myriad of options available, and all these add up to many different...
View ArticleSix months after Blackhole: Passing the exploit kit torch
While news of the downfall of the Blackhole Exploit Kit (often referred to as “BHEK”) isn’t new, its rise and subsequent collapse is the stuff of internet crime legend. Originally appearing in late...
View ArticleEV to EMC Centera Connections
A number of customer have been reporting a number of increased connections to their EMC Centera Devices.I thought I’d investigate a little further, I wrote a test app using the EMC Centera SDK, spun up...
View ArticleNew! Backup Exec Deduplication Assessment Tool
Updated: April 7, 2014 - We have launched a new and improved tool called Backup Exec Partner Toolkit (BEPT). The BEPT now includes a faster deplication assessment component. To learn more please...
View ArticleSimple and Quick Backup Analysis
A NetBackup Analyzer success story Do you know about the NetBackup Analyzer tool? Have you used it? Do you use it yearly? All questions that every NetBackup customer should be asking...
View ArticleThe Dark Power of Windows PowerShell
Windows PowerShell, the Microsoft scripting language, has made the headlines recently due to malware authors leveraging it for malicious purposes. Symantec has identified more PowerShell scripts being...
View Article