Insight. Security Response. Deployment Best Practices
|
|
|
- Jocelyn Garrett
- 10 years ago
- Views:
Transcription
1 Insight Deployment Best Practices Overview Symantec Insight is a reputation-based security technology that leverages the anonymous software adoption patterns of Symantec s hundreds of millions of users to automatically discover and classify every single software file, good or bad, on the Internet. Based on advanced data mining techniques, Insight seeks out mutating code separating out risky, low-reputation files from those that are safe. Symantec Endpoint Protection (SEP) uses reputation-based technology to protect you in three ways: First, SEP uses Insight to evaluate new files before they are introduced to a protected machine. This feature, called Download Insight, enables SEP to block all low-reputation files when they are introduced and before they can take root and cause damage. Since most malware is introduced via Web surfing, instant messaging, or , by checking the reputation of all such files/attachments before they are saved and used drastically reduces infections on endpoints. Contents Overview... 1 Creating Effective Insight Policies... 2 False Positive Prevention Correcting a False Positive Second, all of SEP s security technologies (such as SONAR behavioral protection and Malheur heuristics) now leverage Insight reputation data as a second opinion to improve their accuracy. Just as you would want to get a second opinion from another physician about a potential medical problem, Insight provides a second, community-based assessment to our other security technologies to improve their detection rate and reduce false positives.
2 Third, since Insight can identify trusted, high-reputation files (as well as low-reputation bad files), our product now uses this data to avoid scanning highly-trusted programs, unless they are modified or change. This typically results in a reduction of percent of scanning overhead while maintaining a higher level of security than previous products. This document is separated into three key areas of recommended practices: Creating Effective Insight Policies False Positive Prevention Correcting a False Positive The Creating Effective Insight Policies section provides specific advice on recommended Insight configurations based on your corporation s specific tolerance for risk. The False Positive Prevention section is designed primarily to provide recommendations on how to proactively make sure your files and files from your trusted vendors have a good reputation. The Correcting a False Positive section helps provides information on how to submit a false positive to Symantec for correction or to create Exceptions Policies to eliminate known false positives. Creating Effective Insight Policies There are three main functionalities configurable by administrators and users in the Symantec Endpoint Protection Manager (SEPM): 1. Download Insight Configuration: The Download Insight feature helps prevent your users from downloading low-reputation software onto their machines. 2. Insight Performance Improvements: This SEP feature uses reputation data to prevent wastefully scanning files with good reputation. This reduces the overhead of the security product without compromising security. 3. Insight Submissions: By submitting anonymous application adoption data to Symantec, you help increase the accuracy and precision of our reputation system. 1. Download Insight Configuration What does Download Insight check? Download Insight is only applied to software files at the time of their introduction (i.e., at the time of download and attempted installation) through typical Internet activities. Download Insight checks: New software files as they are downloaded by Internet Explorer, Firefox, Chrome, etc. Both user-downloaded files and drive-by downloads (not initiated by the user) are checked File attachments in s when users save and/or launch these files from their readers Files sent over Instant Messaging before users can save and launch these files on their computers Files downloaded over popular file-sharing programs (e.g., Micro Torrent) before users can save and launch these files on their computers Download Insight does not check other software on protected machines, such as actively running applications that are already installed and running. It only checks new software at the time it is introduced to a machine (e.g., downloaded). Its goal is to block a high percentage of new malware before it ever has a chance to run, with minimal false positive implications. You may specify a single Download Insight policy for your entire enterprise OR you may create multiple Download Insight policies for different corporate divisions (or even for individuals) if your different divisions have different risk tolerances. Page 2
3 How-to: Download Insight configuration settings can be accessed in the SEPM by clicking on Computers -> Policies tab -> Virus and Spyware Protection Policy -> Download Protection (see Figure 1). Figure 1 Page 3
4 Protection Level Setting Use this setting to control the file reputation level that Download Insight should consider to be malicious. In general, a lower protection level will yield both a lower false positive rate and a lower detection rate, while higher protection levels provide better protection but tend to have a higher rate of false positives on unknown/new files that have yet to build up a good reputation. Please follow the guide below to change the protection level slider setting. Levels Description 1-3 Appropriate for highly FP-averse divisions or test environments that cannot tolerate the blocking of newly downloaded good files that are still building reputation (e.g., new files from little-known publishers). At these levels, malware that is still building reputation may evade detection, but the system is highly unlikely to convict good files at download time. 4-6 Appropriate for most desktop users downloading normal software. These levels balance FP risk and detection to capture most malware with low FPs. Level 5 is the appropriate threshold for a majority of users and we discourage users from changing the value unless advised by Symantec support personnel. 7-9 Appropriate for highly secure environments where you wish to lock-down a server or desktop that does not frequently install new or unproven software. FPs on newly downloaded good files that lack a higher reputation will occur at this level, but very little malware will evade detection. NOTE: For most enterprises, we recommend the preset default configuration at Protection Level 5. This will block lowreputation software and software still without a reputation (e.g., software that is new and not from a trusted vendor) in addition to blocking files that trigger classic fingerprints or heuristics. Age & Prevalence Setting The Download Insight feature also provides administrators the ability to restrict the Age and Prevalence of downloaded files. We call this feature Policy-Based Lockdown (see Figure 1). TIP: You may want to institute prevalence/age blocking policies for departments that require a high level of security. For example, you could block Finance employees from downloading software unless it had at least 1000 users and had been in the field at least two weeks. Such a policy limits these users to using only proven software. You may also allow files with lower prevalence/age to reach your IT/Helpdesk department if your IT staff needs to download more arcane tools to do their jobs. The Age/Prevalence values that you specify in these fields will differ according to the risk profile and the nature of applications typically downloaded by each organization or division. These Age and Prevalence policies only apply to downloaded files (at the time of download), and they only apply to untrusted software that is not from Symantec-trusted software vendors. This means that software from vendors such as Microsoft, Symantec, Oracle, etc. will not be filtered due to Age or Prevalence criteria. This prevents false positives on downloads from trusted software vendors while ensuring that unproven software from untrusted vendors is blocked. We also highly recommend that you enable the option to automatically trust any files downloaded from your company s Intranet websites (see Figure 1). This option allows the Download Insight feature to automatically trust downloads that come from the domains, URLs and IPs published in your organization s trusted domain/intranet site list. (These sites are specified in your Trusted Zones list in Internet Explorer; if this option is set, the trusted zone list is automatically imported and used by Download Insight). Page 4
5 Actions Setting The next step is to configure the actions you want Download Insight to take if it detects a malicious or unknown file being downloaded. The options can be configured through the Actions tab under Download Protection window (see Figure 2). Figure 2 Recommended settings: We recommend leaving the action setting for malicious files (files with the lowest reputation) at its recommended default of Quarantine. We recommend leaving the action setting for unproven files (i.e., files that still lack a reputation) at the default Prompt value. This will warn users against downloading files that lack a solid reputation. SEP will warn users with a message that you may customize. Users can then decide if they should allow the file onto their systems. TIP: You can customize the Download Insight warning message to suit your company s needs. For example: This file may violate company policy. If the file is necessary for business purposes and you believe this message is in error, you may proceed and use the file. Otherwise, using this file may violate company policy and result in disciplinary action. Page 5
6 If you would prefer to simply quarantine/block unproven files, you can change the action taken for the unproven files to Quarantine. For example, while you might allow your HelpDesk team to use unproven files (with a warning), you may want to make sure that your Finance department employees can only install files with a known-good reputation. Therefore, you can set the unproven file option to Quarantine for your Finance department, while leaving this option at Prompt for the HelpDesk department. NOTE: If you set the option for unproven files to Quarantine or Delete then the small subset of files that are still building reputation in the Symantec community will be blocked at download time. Note that files authored vendors trusted by Symantec will not be given an unproven rating and will never fall into this category. As mentioned above, the SEPM console enables the administrator to provide custom warning text to the end user for the Prompt option. Typical information filled in this area includes admin contact details and a warning on the enterprise policy. The same warning will also be displayed if the end user decides to restore a file from the Quarantine. The text can be entered in the Notifications tab under Download Protection as shown in Figure 3, below. Figure 3 Page 6
7 2. Insight Performance Improvements The Insight ( scan-less ) feature reduces the overhead of SEP by enabling it to skip the real-time scanning of extremely high-reputation files, such as Word, Excel, Windows kernel files, and other files that are discovered to have a sterling reputation. On a typical system, when enabled, this prevents scanning of 70 to 80 percent or more of the applications on a system, dramatically reducing the overhead of the SEP product when compared with other endpoint security solutions. Should such a trusted file change even a flip of a single bit from a 1 to a 0 value, for example then the file immediately becomes untrusted and is scanned using all available protection technologies. HOW-TO: The ( scan-less ) feature can be configured in SEPM through the management console by clicking on Computers -> Policies tab -> Virus and Spyware Protection Policy -> Global Scan Options (see Figure 4). Figure 4 Recommended settings: We encourage you to leave the default option set at Symantec Trusted for the best performance and security. Page 7
8 2. Insight Submissions Symantec highly encourages you to anonymously submit your file usage data to Symantec s secure reputation servers. This feedback enables Symantec s systems to provide you with better protection. The Insight submission system is designed to comply with the Personally Identifiable Information (PII) regulations of all countries to ensure privacy. NOTE: Insight submissions require very little bandwidth. The administrator can enable or disable Insight submissions for SEP client installs via Symantec Endpoint Protection Manager (SEPM) using two methods: Figure 5 1. Set the group policy to enable submissions and include it in the client installation package (see Figure 5). You can ensure that your SEP instances are properly submitting telemetry data by leaving the default File Reputation option enabled, as highlighted below. 2. If the group policy is not included in the client installation package, then the admin can pre-set the client install to enable the submissions (see Figure 6). The submissions are controlled via the Submit reputation information to Symantec Security Response option highlighted in the figure. Page 8
9 Figure 6 Symantec Endpoint Protection Client The Download Insight options may be configured both in SEPM as well as in the client SEP UI. Download Insight can be accessed in the SEP client by clicking on Change Settings -> Global Settings. Recommended settings: We highly recommend that administrators disable Download Insight controls at the endpoints. This will help make sure that the administrator can provide uniform security protection across the organization. Page 9
10 False Positive Prevention SEP 12.1 will not detect known good files as malware. There are several ways to make sure your good files are known as good. The following steps will help prevent false positives when using SEP Step 1 Using Digital Signatures One of the easiest ways to identify that a file is good is to know where it came from and who created it. An important factor in building confidence in a file being good is to check its digital signature. Executable files without a digital signature have a higher chance of being identified as unknown or low-reputation. Custom or home-grown application should be digitally signed with class three digital certificates Customers should insist that their software vendors digitally sign their applications Step 2 - Add to the Symantec White List Symantec has a growing white list of over 25 million good files. These files are used in testing signatures before they are published. Their hash values are also stored online and used to avoid false positives on the SEP client via real-time cloud lookups whenever a file is detected by any of our client security technologies (e.g., SONAR behavioral technology, a fingerprint, etc.). This white list is a powerful tool for avoiding false positives. Customers and vendors can add files to this list. Software vendors can request that their executable be added to the Symantec white list at symantec.com/whitelist/ BCS Customers can have their system images submitted to the white-listing program here: symantec.com/whitelist/bcs.cgi Symantec provides customers with simple whitelisting tools that can greatly simplify the submission of information on known good files to Symantec. NOTE: Do not use the above links to correct a false positive. See below for instructions on correcting a false positive. Step 3 - Test The initial deployment of SEP 12.1 during beta should include test machines with representative images of the software you run in your environment, including common third-party applications Monitor for potential issues during beta testing Step 4 - Feedback Each security technology in SEP 12.1 can collect data that is sent back to Symantec to measure and mitigate false positives via analysis, heuristic training against collected data sets, and custom generic whitelisting. Enable automated submission of meta data on detections Page 10
11 Correcting a False Positive Symantec wants to know about and correct false positives. Having a submission not only allows Symantec to correct a current issue, it also allows us study the causes of the false positive to avoid similar files from having issues in the future. Step 1 - Submit False positive submissions can be made immediately to Symantec via a Web form. All suspected false positives should be submitted to It is critical for resolution of Reputation (Download Insight) false positives that the file or the SHA256 value of the file be included with the submission. (Hash value of a file is also presented in notices on client third-party tools.) False positives should not be submitted via the malware submission system. This is a change in procedure and not specific to SEP The URL above should be used to report false positives, no matter which product involved. Once the submission has been processed and the file whitelisted by Symantec, the quarantine rescan feature will automatically restore the file out of quarantine. Step 2 - Exclude SEP 12.1 supports multiple ways to exclude good files from detection. Exclusions can be performed from the SEP management console to mitigate false positives enterprise-wide. You may exclude files downloaded from known, trusted domains (e.g., your corporation s Web domain or your company s vendors domains) from Download Insight detections (see Chapter 20 of the SEP Implementation Guide) You may add exclusions/exceptions in SEPM for critical files, directories or URLs/IPs Adding Exceptions Administrators can add new exceptions for files (e.g., File X is always safe ) or domains (e.g., All files downloaded from domain are safe ) in two ways: 1. Define Exceptions Policy To add a single or small number of domain/file exclusions, use the Exceptions Policy screens in SEPM. The Exceptions Policy can be used, for example, to add a new exclusion for an internally developed enterprise application. It can also be used to whitelist the domain of a new enterprise vendor that hosts trusted applications used by employees. HOW-TO: To add one or more files/domains to the Exceptions Policy, administrators can do so from SEPM through the management console by clicking on Computers -> Policies tab -> Exceptions -> Add an Exceptions Policy. Exceptions can be created to always trust a File or a Web Domain (see figure 7 and figure 8). Page 11
12 Figure 7 Figure 8 Page 12
13 2. Use Risk Log to View Recent Download Insight Blocking Events Administrators can also use SEPM Risk Log to review Download Insight blocking events in order to identify and address recent false positives encountered by their employees. The Risk Log includes every blocking event from every endpoint in the enterprise, and includes files blocked by our classic fingerprint-based antivirus scanner, our SONAR behavioral engine, and our new Insight technology. HOW-TO: To review recent blocking events, administrators can navigate to the Risk Log section of the SEPM console. Click on Monitors -> Logs -> Risk (under Log type) -> View Log button (see Figure 9). You can identify Insight-blocked files can be identified by their WS.Reputation.1 name in the Risk Name column of the table (see Figure 10). For each such Insight-blocked file, SEPM also displays the domain or IP address from where the file was downloaded (e.g., or Figure 9 TIP: If the Risk Logs show many malicious downloads blocked by Insight, you can select to view block events By Application or By Web Domain (see Figure 10). Figure 10 Page 13
14 By Application If you select the view By Application option, you can get a list of all unique files that were blocked across the enterprise as well as the prevalence of each such blocked file. This data helps identify high-prevalence any malware that may be affecting employees. It also lets you identify high-prevalence false positives on good files. You may order this list by the prevalence of each false positive by clicking on the Count tab. This will allow you to quickly identify all high-prevalence false positives that are affecting users. The Risk Log provides a view of blocked files (ordered by prevalence) and enables rapid whitelisting of such high-prevalence false positives. This process will be described in more detail below. HOW-TO: To permanently allow (whitelist) a file across the enterprise, click on the + sign in the Action column for a particular file and select Allow Application from the drop-down list (see Figure 11). Future downloads of the selected file will no longer be blocked. Figure 11 By Web Domain Selecting to view events By Web Domain, will provide a list of domains from which your employees downloaded blocked files. These domains could either be malicious domains or potentially legitimate domains of vendors that host lower-reputation files. This view will also show that many legitimate files from trusted vendors websites are being blocked by Download Insight because they have a low reputation. If so, you might want to whitelist these domains so that Download Insight will no longer block the site. You can easily identify the highest-prevalence false positives by clicking on the Count tab. This will place those domains with the highest number of blocked files first, enabling rapid whitelisting of your important domains. The Risk Log also provides such a view and enables rapid whitelisting of such high-prevalence domains. HOW-TO: To permanently allow downloads from a domain, click the + sign in the Action column for that domain and select Trust Web Domain from the drop-down list (see Figure 12). Future downloads from the selected domain will be no longer be blocked based on Insight reputation. NOTE: Whitelisting a domain will not prevent our other technologies (e.g., fingerprints) from blocking files downloaded from such a domain. This will only override our Insight reputation rating for files downloaded from such a domain. Page 14
15 Figure 12 Page 15
16 Any technical information that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical information is being delivered to you as is and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained herein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Moutain View, Calif., Symantec has operations in more than 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) Symantec Corporation World Headquarters 350 Ellis Street Mountain View, CA USA +1 (650) Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
Securing the endpoint and your data
#SymVisionEmea #SymVisionEmea Securing the endpoint and your data Piero DePaoli Sr. Director, Product Marketing Marcus Brownell Sr. Regional Product Manager Securing the Endpoint and Your Data 2 Safe harbor
Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper
Symantec Endpoint Protection 12.1.5 Sizing and Scalability Best Practices White Paper Symantec Endpoint Protection Sizing and Scalability Best Practices White Paper Product version: 12.1.5 Documentation
SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.
Preface 1 Virus scanner administration 2 SIMATIC Configuration 3 Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Commissioning Manual 04/2013 A5E03874574-02 Legal information
Symantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who
Reputation based Security. Vijay Seshadri Zulfikar Ramzan Carey Nachenberg
Reputation based Security Vijay Seshadri Zulfikar Ramzan Carey Nachenberg Agenda Reputation Based Security The Problem Reputation Concept Implementing Reputation Deploying Reputation Conclusion 2 The Problem
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
W H I T E P A P E R : T E C H N I C AL
W H I T E P A P E R : T E C H N I C AL Using Symantec Endpoint Protection 12.1 to Protect Against Advanced Persistent Threats (APTs) Configuration guidelines for endpoint protection against APTs White
Symantec Endpoint Security Management Solutions Presentation and Demo for:
Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate
End to End Security do Endpoint ao Datacenter
do Endpoint ao Datacenter Piero DePaoli & Leandro Vicente Security Product Marketing & Systems Engineering 1 Agenda 1 Today s Threat Landscape 2 From Endpoint: Symantec Endpoint Protection 3 To Datacenter:
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Installation and Administration Guide Symantec Endpoint Protection Small Business Edition Installation and Administration Guide The software described
Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection
SYMANTEC TECHNOLOGY NETWORK: SECURITY Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection Purpose of this Whitepaper:... 3 Overview... 4 The SEP Client Interface... 5
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
Symantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Symantec Hosted Mail Security. Console and Spam Quarantine User Guide
Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license
INFORMATION PROTECTED
INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure
Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus
Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control
Award-winning messaging security for inbound protection and outbound control Overview The delivers inbound and outbound messaging security for email and IM, with effective and accurate antispam and antivirus
Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009
Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for
Integrating MSS, SEP and NGFW to catch targeted APTs
#SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information
UP L17 Virtualization: Security Without Sacrificing Performance
UP L17 Virtualization: Security Without Sacrificing Performance Hands on lab Description In this hands on lab you will learn how to optimize SEP 12 for your virtual desktops to get maximum protection without
Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems
Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,
2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec
UP L13: Leveraging the full protection of SEP 12.1.x
UP L13: Leveraging the full protection of SEP 12.1.x Martial RICHARD Principal Field Enablement Manager Endpoint Security UP L13 1 Threat landscape (ISTR Vol.18 April 2013) http://www.symantec.com/threatreport/
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in
Solution Brief: Enterprise Security
Symantec Brightmail Gateway and VMware Solution Brief: Enterprise Security Symantec Brightmail Gateway and VMware Contents Corporate overview......................................................................................
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished
Comodo Mobile Security for Android Software Version 3.0
Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
Symantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
Symantec Endpoint Protection
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Enterprise Vault 11 Feature Briefing
Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or
Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0
Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0 Let me phone a friend Jimmy Sandberg Presale Engineer What s new in Symantec Endpoint Protection 12.1 Unrivaled Security Blazing Performance
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Symantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Integrating Trend Micro OfficeScan 10 EventTracker v7.x
Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
Security Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Symantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today
ESET NOD32 Antivirus. Table of contents
ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32
Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses
A simple, effective and affordable solution designed for small businesses Overview Symantec Protection Suite Small Business Edition is a simple, affordable, security and backup solution. It is designed
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Symantec Endpoint Protection Small Business Edition Implementation Guide
Symantec Endpoint Protection Small Business Edition Implementation Guide Symantec Endpoint Protection Small Business Edition Implementation Guide The software described in this book is furnished under
Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS
Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
GFI WebMonitor 2011. Administration and Configuration Manual
GFI WebMonitor 2011 Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as
LogLogic Trend Micro OfficeScan Log Configuration Guide
LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and
Comodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:
Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Email Quick Reference. Administrator Guide
Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
Microsoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
Direct or Transparent Proxy?
Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
Shavlik Patch for Microsoft System Center
Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
