Quantcast
Channel: Symantec Connect - Products - Discussions
Viewing all 21603 articles
Browse latest View live

Injstalled SEPM 12.1.3 RU3 (SBS package) and some clients not working

$
0
0
I need a solution

SBS 2008 I have just upgraded to the latest SEPM and A/V packages and the manager is pushing the A/V to clients. Some of our clients are showing as not connected to the server and are not working e.g. Outlook is not connecting and the server Console shows one "not connected". Can anyone advise if this is due to the new installation?

 


Product for Aix

$
0
0
I need a solution

I have to install Symantec Endpoint protection for AIX and Linux OS. What is the package for it.

Please help.

 

Relay emails to different external hosts

$
0
0
I need a solution

Hello,

I recently came up with a demand to relay emails to external hosts. To become clearer, here's what i need.

 

We have 3 sites A(Primary site),B,C. Lets assume that there is no site-to-site vpn connection.

We have one domain, @mydomain.com.

What we want to do is, when an email arrives to the messaging gateway at site A, to check where the recipient is located (site B,C) and forward it there, instead of delivering it to site A.

Drawing1.png

 

Additional info.

For the time being all 3 sites have a vpn connection. All 3 have Exchange 2010 which is configured to distribite the email to each site (but that happens after it is delivered to site A, the exchange on site A takes care of the distribution). We are having problems with the vpn site-to-site connection so we are trying to find an other way around it. All users are under the @mydomain.com (no @asite.mydomain.com etc exists, and it is something we would like to avoid)

 

Thank you

HTTPS Proxy

$
0
0
I need a solution

Hi,

Our problem is that there is a number of standalone browsers that run in our LAN.

so users even they dont have administrator rights they are able to navigate Internet through the executables.

the problem is that they use the HTTP proxy under the HTTPS one, then the HTTPS traffic is not inspected and they avoid the company policies.

so i want to know if there is a way to force Symantec Web Gateway NOT to process HTTPS requests over the HTTP port.

Thanks

Best Regards

 

verify that all exceptions on an Endpoint client are applied

$
0
0
I need a solution

Hi.

I have a cluster of VDI with latest version Sysmantec End Point , and the antivirus department confirm that the exceptions are applied.

I have fallen many incidents of cluster nodes , Can exceptions be implemented but are not in the registry?

regards and thank you very much

VonTu Install Reqs

Out of Date definitions

$
0
0
I need a solution

I am seeing the following, I want to get this corrected. It was fine for a week, I am wondering if I am just a little behind here and it will work itself out on its own, but nearly 90 % of my machines are showing that the last time this was updated was May 31st. I want to make sure my clients are current and do not fall behind. I am not certain what I am missing as everything was ok up until today.

 

SONAR Content Failures

 

Symantec Virtual Appliance Clarification

$
0
0
I need a solution
I am getting ready to begin an install of some Symantec Virtual Appliances on some of our VMware ESXI hosts to take advanatage of (SIC). I am reading through the documentation and notice the xml configuration pieces and loading the virtual appliances inside the VMware hosts. However, I am confused about the sylink and xml configuration files and the command line. When the instructions are referring to the command line are they referring to the machine I am doing the install from or the actual Linux command line of the virtual appliance inside VMware? Ultimately, where should the xml and sylink files be stored and utlized as part of the install? Should they be on the same datastore as the virtual appliance or should they reside somewhere else?
 
Thank you for your help.
 
-KeepLearning

SEPM 12.1.3 showing client NTP disabled

$
0
0
I need a solution

in the home screen, there is big cross said "Security Status - Attention Needed" and it is related to "Network Threat Protection Failures":

 
 

(Fresh install and will do the migration, so there are only 4 testing pc)

 

I have removed the Firewall policy for all client, but I through NTP included IPS as well and I have enabled the IPS features.

For the client, I have installed all component.

 

Furthermore, I open SEP on client PC, and click the "Options" of NTP, i found that the last option was "Enable Network Threat Protection"(it was dimmed because i have disable in Client User Interface Control Settings: Server Control), i am wondering is that the NTP is off?......but in the intrusion prevention, i have checked "Enabled NTP" and "Enable Browser Intrusion Prevention".

any idea?

Thansk!!!

 

Getting a spam in chinese Language

$
0
0
I need a solution

Hi,

I have symantec mail security 8.1 for Domino from few days some internal users a getting spam in chinese language.Is there is way that i can block such emails once.

 

游怡芝 <ochb@cr.org> 
25/06/2013 01:54
 
cc
 
Subject
企业基本管理、效率管理与价值管理的核心任务-游怡芝
 
 
 
 
 
和你在一起,我连受伤都不怕,你说我还会害怕什么?
 
  中层管理者是企业的中流砥柱,他们是企业决策实施与落地的核心,是企业创新和进步的源泉,是企
业文化的推动者。因此提升中层管理者的工作管理技能,是保证各项决策顺利实施的关键。
  然而,许多中层管理者在工作中常遇到以下困惑——
--------如何界定管理者的角色定位和关键任务?
--------如何提升自我管理和时间管理能力?
--------如何建立绩效期望清晰的目标管理?
--------如何实现有效的员工指导、授权和激励?
--------如何提升沟通技能,优化团队管理?
  针对以上问题,我们特邀原华为人力资源副总监严明女士,与我们一同分享《向华为学习:MTP-中高
层管理者技能提升训练》的精彩课程,帮助管理者重新树立角色认知,掌握管理者必备的基本人事和财务
知识,以及自我管理的基本工具,树立合理的团队目标,建立团队规则,有效指导、激励、授权,以及同
级沟通,下级领导、上级管理的良性沟通机制,持续提升团队绩效。
 

Error when create Framework Installation Settings - communication

$
0
0
I need a solution

Hi All,

When i Create Framework Installation Settings - communication package on SEE console encounter the following error

"invalid server location. the underlying connection was closed: could not establish trust relationship for the SSL/TLS"

i config protocol https & add cert, verify complete

pls help me solution

Best practice to uninstall server managed Endpoint Protection client

$
0
0
I need a solution

We are trying to uninstall Symantec Endpoint Protection wich is server managed. When we tried to just uninstall manually the network cards becomes malfunctioning. We have tried doing it with Symantecs CleanWipe - same result.

It is pretty easy to fix on a stationary computer, just uninstall the network card and restart. On laptops though, it works fine with LAN card but it is worse with the wireless card. 

When we uninstall the laptop and restarts the computer both cards looks ok in the device manager but the wireless card is NOT able to see any wireless networks. We have tried on a couple of computers but it does not work.

What is best practice to do this? Should I change some policy at the server? Maybe Intrusion Prevention policy? Please help!

 

EIntrusion Prevention policy 

 

We use Endoint Protection 12.x RU1

Antvirus Removal

$
0
0
I need a solution

Bei einem Kunden, läuft auf einem Rechner WinXP SP3 Symantec Antivirus in der Version 9. Beim Versuch diese zu deinstallieren werden wir nach einem Passwort gefragt um die Deinstallation durchzuführen. Da wir das System fremd übernommen haben ist uns dies  nicht bekannt. Die von Symantec angebotenenen Removal-Tools greifen hier ebenfalls nicht. Sie finden das Product, verweisen jedoch auf die Deinstallation über den Punkt Software aus der Systemsteuerung.

Gibt es hier eine andere Lösung ?

SEPM server getting network drop frequently

$
0
0
I need a solution

Hi All,

 

SEPM server getting network drop frequently

 

Os: windows server 2003 enterprise edition,  

 

Sepm: embedded database,

           clients 4959,

            version RU3 12.1.3001.165

 

 

I am using Symantec endpoint protection all three component on same server. it is suggested or not.

ping of death attack detected

$
0
0
I need a solution

 

Time StampEvent TypeEvent TimeSeverityHost NameCurrent IP AddressHistorical IP AddressRemote Host IPRemote Host NameNetwork ProtocolLocal PortRemote PortTraffic DirectionApplication NameBegin TimeEnd TimeRepetitionAlertSend Snmp TrapLocal Host MacRemote Host MacHardware KeyLocation NameUser NameHack TypeOS TypeEvent DescriptionDomain NameSite NameServer NameGroup NameComputer NameSignature IDSignature NameSignature Sub IDIntrusion URLIntrusion Payload URL
6/25/2013 2:51Denial of Service6/25/2013 2:50MajorKxxxxx172.19.96.90172.19.96.90172.19.106.184 ICMP00Inbound 6/25/2013 2:506/25/2013 2:50 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/25/2013 1:58Denial of Service6/25/2013 1:57MajorKxxxxx172.19.96.90172.19.96.90172.19.99.29 ICMP00Inbound 6/25/2013 1:586/25/2013 1:58 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/25/2013 1:41Denial of Service6/25/2013 1:39MajorKxxxxx172.19.96.90172.19.96.90172.19.99.43 ICMP00Inbound 6/25/2013 1:406/25/2013 1:40 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/25/2013 1:23Denial of Service6/25/2013 1:22MajorKxxxxx172.19.96.90172.19.96.90172.19.117.49 ICMP00Inbound 6/25/2013 1:226/25/2013 1:22 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/25/2013 1:15Denial of Service6/25/2013 1:13MajorKxxxxx172.19.96.90172.19.96.90172.19.113.51 ICMP00Inbound 6/25/2013 1:146/25/2013 1:14 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/25/2013 1:09Denial of Service6/25/2013 1:07MajorKxxxxx172.19.96.90172.19.96.90172.19.114.35 ICMP00Inbound 6/25/2013 1:076/25/2013 1:07 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/25/2013 0:32Denial of Service6/25/2013 0:31MajorKxxxxx172.19.96.90172.19.96.90172.19.117.47 ICMP00Inbound 6/25/2013 0:326/25/2013 0:32 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 23:56Denial of Service6/24/2013 23:55MajorKxxxxx172.19.96.90172.19.96.90172.19.119.212 ICMP00Inbound 6/24/2013 23:556/24/2013 23:55 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 22:56Denial of Service6/24/2013 22:53MajorK2xxxx172.19.146.90172.19.146.90172.19.147.170 ICMP00Inbound 6/24/2013 22:536/24/2013 22:53 1   841A47F10B77D6CA2B32E29F67B5E9BFDefault 4096Windows Server 2008 Standard EditionDenial of Service "Ping Flood Attack" attack detected. Description:  A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.DefaultKRESSEP551KRESSEP551My Company\Keane Noida\NOI ServerK2xxxx0 0  
6/24/2013 22:56Denial of Service6/24/2013 22:52MajorK2xxxx172.19.146.90172.19.146.90172.19.133.42 ICMP00Inbound 6/24/2013 22:526/24/2013 22:52 1   841A47F10B77D6CA2B32E29F67B5E9BFDefault 4096Windows Server 2008 Standard EditionDenial of Service "Ping Flood Attack" attack detected. Description:  A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.DefaultKRESSEP551KRESSEP551My Company\Keane Noida\NOI ServerK2xxxx0 0  
6/24/2013 21:41Denial of Service6/24/2013 21:41MajorKxxxxx172.19.96.90172.19.96.90172.19.99.33 ICMP00Inbound 6/24/2013 21:416/24/2013 21:41 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 21:23Denial of Service6/24/2013 21:21MajorKxxxxx172.19.96.90172.19.96.90172.19.117.54 ICMP00Inbound 6/24/2013 21:226/24/2013 21:22 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 21:12Denial of Service6/24/2013 21:11MajorKxxxxx172.19.96.90172.19.96.90172.19.114.51 ICMP00Inbound 6/24/2013 21:116/24/2013 21:11 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 19:13Denial of Service6/24/2013 19:12MajorKxxxxx172.19.96.90172.19.96.90172.19.117.40 ICMP00Inbound 6/24/2013 19:126/24/2013 19:12 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 18:54Denial of Service6/24/2013 18:52MajorKxxxxx172.19.96.90172.19.96.90172.19.106.51 ICMP00Inbound 6/24/2013 18:536/24/2013 18:53 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 18:51Denial of Service6/24/2013 18:49MajorK2xxxx172.19.146.90172.19.146.90172.19.132.182 ICMP00Inbound 6/24/2013 18:506/24/2013 18:50 1   841A47F10B77D6CA2B32E29F67B5E9BFDefault 4096Windows Server 2008 Standard EditionDenial of Service "Ping Flood Attack" attack detected. Description:  A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.DefaultKRESSEP551KRESSEP551My Company\Keane Noida\NOI ServerK2xxxx0 0  
6/24/2013 18:19Denial of Service6/24/2013 18:18MajorKxxxxx172.19.96.90172.19.96.90172.19.119.175 ICMP00Inbound 6/24/2013 18:186/24/2013 18:18 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 17:34Denial of Service6/24/2013 17:31MajorK2xxxx172.19.146.90172.19.146.90172.19.151.234 ICMP00Inbound 6/24/2013 17:316/24/2013 17:31 1   841A47F10B77D6CA2B32E29F67B5E9BFDefault 4096Windows Server 2008 Standard EditionDenial of Service "Ping Flood Attack" attack detected. Description:  A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.DefaultKRESSEP551KRESSEP551My Company\Keane Noida\NOI ServerK2xxxx0 0  
6/24/2013 17:07Denial of Service6/24/2013 17:05MajorKxxxxx172.19.96.90172.19.96.90172.19.117.41 ICMP00Inbound 6/24/2013 17:066/24/2013 17:06 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 17:00Denial of Service6/24/2013 16:59MajorKxxxxx172.19.96.90172.19.96.90172.19.119.124 ICMP00Inbound 6/24/2013 17:006/24/2013 17:00 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:59Denial of Service6/24/2013 16:58MajorKxxxxx172.19.96.90172.19.96.90172.19.119.192 ICMP00Inbound 6/24/2013 16:596/24/2013 16:59 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:58Denial of Service6/24/2013 16:57MajorKxxxxx172.19.96.90172.19.96.90172.19.117.49 ICMP00Inbound 6/24/2013 16:586/24/2013 16:58 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:55Denial of Service6/24/2013 16:54MajorKxxxxx172.19.96.90172.19.96.90172.19.113.68 ICMP00Inbound 6/24/2013 16:546/24/2013 16:54 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:54Denial of Service6/24/2013 16:53MajorKxxxxx172.19.96.90172.19.96.90172.19.119.212 ICMP00Inbound 6/24/2013 16:536/24/2013 16:53 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:46Denial of Service6/24/2013 16:44MajorKxxxxx172.19.96.90172.19.96.90172.19.99.43 ICMP00Inbound 6/24/2013 16:446/24/2013 16:44 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:43Denial of Service6/24/2013 16:41MajorKxxxxx172.19.96.90172.19.96.90172.19.117.50 ICMP00Inbound 6/24/2013 16:416/24/2013 16:41 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:41Denial of Service6/24/2013 16:39MajorKxxxxx172.19.96.90172.19.96.90172.19.115.21 ICMP00Inbound 6/24/2013 16:406/24/2013 16:40 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:22Denial of Service6/24/2013 16:20MajorKxxxxx172.19.96.90172.19.96.90172.19.115.24 ICMP00Inbound 6/24/2013 16:206/24/2013 16:20 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 16:12Denial of Service6/24/2013 16:10MajorKxxxxx172.19.96.90172.19.96.90172.19.119.140 ICMP00Inbound 6/24/2013 16:106/24/2013 16:10 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 15:58Denial of Service6/24/2013 15:57MajorKxxxxx172.19.96.90172.19.96.90172.19.113.42 ICMP00Inbound 6/24/2013 15:586/24/2013 15:58 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 15:46Denial of Service6/24/2013 15:43MajorKxxxxx172.19.96.90172.19.96.90172.19.117.35 ICMP00Inbound 6/24/2013 15:446/24/2013 15:44 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 15:17Denial of Service6/24/2013 15:15MajorK2xxxx172.19.146.90172.19.146.90172.19.151.182 ICMP00Inbound 6/24/2013 15:156/24/2013 15:15 1   841A47F10B77D6CA2B32E29F67B5E9BFDefault 4096Windows Server 2008 Standard EditionDenial of Service "Ping Flood Attack" attack detected. Description:  A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.DefaultKRESSEP551KRESSEP551My Company\Keane Noida\NOI ServerK2xxxx0 0  
6/24/2013 14:44Denial of Service6/24/2013 14:43MajorKxxxxx172.19.96.90172.19.96.90172.19.114.52 ICMP00Inbound 6/24/2013 14:436/24/2013 14:43 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 14:41Denial of Service6/24/2013 14:40MajorKxxxxx172.19.96.90172.19.96.90172.19.114.194 ICMP00Inbound 6/24/2013 14:416/24/2013 14:41 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 14:11Denial of Service6/24/2013 14:06MajorK2xxxx172.19.146.90172.19.146.90172.19.132.123 ICMP00Inbound 6/24/2013 14:066/24/2013 14:06 1   841A47F10B77D6CA2B32E29F67B5E9BFDefault 4096Windows Server 2008 Standard EditionDenial of Service "Ping Flood Attack" attack detected. Description:  A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.DefaultKRESSEP551KRESSEP551My Company\Keane Noida\NOI ServerK2xxxx0 0  
6/24/2013 14:11Denial of Service6/24/2013 14:05MajorK2xxxx172.19.146.90172.19.146.90172.19.133.36 ICMP00Inbound 6/24/2013 14:056/24/2013 14:05 1   841A47F10B77D6CA2B32E29F67B5E9BFDefault 4096Windows Server 2008 Standard EditionDenial of Service "Ping Flood Attack" attack detected. Description:  A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.DefaultKRESSEP551KRESSEP551My Company\Keane Noida\NOI ServerK2xxxx0 0  
6/24/2013 13:27Denial of Service6/24/2013 13:27MajorKxxxxx172.19.96.90172.19.96.90172.19.117.41 ICMP00Inbound 6/24/2013 13:276/24/2013 13:27 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 13:26Denial of Service6/24/2013 13:15MajorKxxxxx172.19.96.90172.19.96.90172.19.117.45 ICMP00Inbound 6/24/2013 13:156/24/2013 13:15 1   C2D14DBE8D33FC02FA2E385821B55010Defaultnkalaiarasi4096Windows Server 2008 Standard EditionDenial of Service "Ping of Death" attack detected. Description:  In a Ping of Death attack, the hacker uses a packet with a size that is larger than the normal standard. When your system encounters a packet of this size, it often crashes, hangs, or reboots.Defaultkressep601kressep601My Company\Keane Hyd\ServersKxxxxx0 0  
6/24/2013 13:04Denial of Service6/24/2013 13:02MajorK2xxxx172.19.146.90172.19.146.90172.19.133.50 ICMP00Inbound 6/24/2013 13:026/24/2013 13:02 1   841A47F10B77D6CA2B32E29F67B5E9BFDefault 4096Windows Server 2008 Standard EditionDenial of Service "Ping Flood Attack" attack detected. Description:  A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.DefaultKRESSEP551KRESSEP551My Company\Keane Noida\NOI ServerK2xxxx0 0  

SEP client changing from managed to "self-managed"

$
0
0
I need a solution

Hey,

I have a strange issue with the .2015 version of SEP 12. Clients are showing up as being "self-managed" under troubleshooting when looking at the client. The clients appear in the SEPM as normal and continue to upgrade and pick up vdefs/policy changes but when looking at the client by opening the troubleshooting section they keep jumping from managed ie. servername and details from the SEPM to just saying "self-managed"

This usually happens when the policy is updated the client says self managed then after another policy update it jumps to managed and the this goes on and on. I don't think any functionality of the client is affected but just wondering if anyone has seen this before as I can't find anything on it.

Any help would be great.

J

the server schema is older than database schema ...

$
0
0
I need a solution

 

We have three symantec manager 12.1.1,we want to install fourth one ,however after installation the other three sep manager show this error as below and we can’t open sep manager consoles.Could you help us about that?

 

Thanx.

Compatibility SEPM & SEP

$
0
0
I need a solution

Hello,

The latest version of SEPM 12.1 RU3 is compatible with the SEP Client 11.0.6300 ?

Thank You for your Reply.

 

Rachid

 

 

How to configure SEPM to send logs to Cisco IPS?

$
0
0
I need a solution

Hi,

Based on demonstration video of integration of Cisco IPS and SEPM (where is looks like SEPM is sending logs to Cisco IPS using SDEE protocol), could you please post instruction how to confgiure SEPM to send logs to Cisco IPS using SDEE (Security Device Event Exchange) protocol?

Video link: http://www.youtube.com/watch?v=iwRDs4On0q8

Best regards,

 

SEPM migration issue

$
0
0
I need a solution

Hello

I have already added (2 months ago) a new server sepm (SEPM2) to a deployment with aleready an old sepm (SEPM1). I assigned priority 1 to SEPM2 and priority 2 to SEPM1.

Now, I want to remove the server SEPM1 (the old one) from the deployment, but there are always some clients attached to this server. how can we force the attachment of these SEP clients from the old server to the new one?

Thank you for your help.

Best Regards.

 

 

Viewing all 21603 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>