Is there a way to SEPM via powershell and perform administrative actions?
Powershell
Third-party security software removal feature and few questions
third-party security software removal feature
Hello
We are new in this forum...
as we see new Symantec Endpoint Protection 14 we are interesting to deploy this product to our organisation
we are now testing this product and we have few questions:
1. we need to deploy SEP 14, we just builded server Windows 2016 with SEPM 14, our client computers has Microsoft Securty Essentials (AV) and our mission is to remove this AV during deployment, I as read this fiature is included in SEPM/SEP
our steps are same as described in this article:
https://support.symantec.com/en_US/article.TECH178...
client PC configuration: Windows 7 x86, Microsoft Securyti Essentials Client Version: 4.9.218.0
we trayed many times, but Microsoft Securty Essentials did't uninstalled...
2. after unsuccessfuly testing remove AV we changed testing method and we are now trying to deploy SEP with "SEPprep" software
we folowed this video guide
https://support.symantec.com/en_US/article.tech148... file name "SEPprep.mp4" and we are doing all like in this video but we get this error (please see attached file)
p.s. I think there are some problems in setup.ini file in | ProductCode=
section
3. we LOCKED all setting in SEP like described in this article:
https://support.symantec.com/en_US/article.TECH168...
now on clinet computer administrator did't able to pause or disable SEP, please instruct me how can I protect SEP settings, but some times wen we need to install some programs temporarily disable (pause) SEP
SEP 14 license
We have SEPM 12.1 licensing is it possible to upgrade version SEPM 14 or shall we buy new license.
IP that gets bounced for no reason (501 Connection refused)
We have an IP that gets bounces for no reason (501 Connection refused).
IP in question is 5.255.90.177.
It is not listed on any other blacklists (except ZabBL which blocks whole ranges but does not block email and is solely a mere opinion of varied system administrators). Neither does it have poor reputation with Symantec AFAIK.
Prompt unblock will be appreciated, we do not send unsolicited bulk mail from this e-mail address, solely legitimate e-mail traffic.
================================================================================================================
host cluster5.eu.messagelabs.com [85.158.136.83]
SMTP error from remote mail server after initial connection:
501 Connection rejected by policy [7.7] 3610, please visit www.messagelabs.com/support for more details about this error message.
host cluster5.eu.messagelabs.com [85.158.136.83]
SMTP error from remote mail server after initial connection:
501 Connection rejected by policy [7.7] 3610, please visit www.messagelabs.com/support for more details about this error message.
host cluster5.eu.messagelabs.com [85.158.136.83]
SMTP error from remote mail server after initial connection:
501 Connection rejected by policy [7.7] 3610, please visit www.messagelabs.com/support for more details about this error message.
Unable to download admin guide 14.5
Hi All,
As topic says, I can't download the admin guide 14.5 from https://support.symantec.com/en_US/article.DOC9261.html
With the following error:
An error occurred while processing your request.
Reference #50.dd57a5c.1478795293.2fa94f4
If someone could attach the admin guide here I would appreciate.
BR,
Morgado
Sharing demo clip + documentation on Scripted Checks (CCS 11.5)
Please see the attachments for a quick demo video introducing scripted checks and also a word document containing E2E instructions on how to build scripted checks.
Remote Push in SEP 14
When doing a 'install a client' task I select 'New Package Deployment' and next, then i select the group (say, my company>workstations>IT>test), then select remote push and hit next it brings up the 'browse network' tab....is there a way to select all computers in that 'test' group?
Out-of-Date Virus Definitions Alerting time frame
I have notification conditions setup to alert when virus definitions are out of date. We have noticed that when computers that are out of date by the set threshold, check into our SEPM console, and alert is triggered soon after. And by the time we get to the endpoint it has already updated itself to the current version.
Doesn't the alert give endpoints a time frame to collect new virus definitions after it checks in? I do have the Damper function set to 10 hours, but this just seems to be related to the time frame between alerts.
Also, the check box for "Include only clients that have checked in with the management server today" will not stay checked. I followed the steps in this KB article, TECH227916, recreated the conditions, and the SEPM is at 12.1.6 MP6, but still no luck.
Microsoft Windows CVE-2016-3342 Local Privilege Escalation Vulnerability
Microsoft Office CVE-2016-7244 Denial of Service Vulnerability
Microsoft Windows CVE-2016-3335 Local Privilege Escalation Vulnerability
Microsoft Internet Explorer and Edge CVE-2016-7199 Information Disclosure Vulnerability
Installed Network printer drivers through software delivery
Hello
We want to install Network printer drivers for Ricoh MP C650 printer through software delivery, can anyone suggest how we proceed for this.
How we create silent package for Ricoh MP C6502
Source Code Policy Addition
Good Afternoon,
I'm attempting to detect several new types of source code via policy in the DLP. I'm looking for assistance in the best way possible to detect the following types of source code:
COBOL
CSharp
PLSQL
Python
TSQL
Please keep in mind that at this point we're not at the stage where we need to block only proprietary code - we're trying to monitor any variation of the above types. Whether we do this via regex or Indexed Document Matching or key words or a variation of all. Any help with this matter would be greatly appreciated!
Thank you!
Content was blocked because it was not signed by a valid security certificate.
I'm getting this error on all IE browsers on the Home page after logging in to SEPM.
"Content was blocked because it was not signed by a valid security certificate. "
Works fine in Chrome which is fine with me but the boss won't budge from IE.
I generated a new self-signed certificate which promptly broke my communications with the clients and did not solve the issue.
Google and searching the forums turned up no effective solutions.
Can someone point me in the right direction?
Trojan.Flokibot
DLP for Google Drive
Hello,
Can anyone provide a documentation on how DLP can discovery and prevent any misused of confidential data in google drive?
Do I use DLP for Cloud or DLP endpoint is already enough to protect my confidential files in the cloud?
What settings and considerations should be taken to successfully implement it?
Thanks
best way to change from standard to darknet client
hi,
what is the best way to change standard clients to darknet clients in SEP 14?
Estimate SEP Manager Event per Second
Hi
Could you tell me an estimate or how can I get it for the event per second that the Symantec Endpoint Protection Manager(DB) will send logs to a SIEM sensor?
Thanks in advance.
Log for Manually Starting and Stopping SEP Firewall
When SEP is started and stopped manually, which log does that go into? Is it easy to tell which start/stops were performed manually, as opposed to the ones that were just caused by a system start or reboot?