Hi All,
Does anyone know if it is possible to export the list of Locations from my current SEPM and import them into a new non linked SEPM. Otherwise I have somewhere in the region of 100 locations to enter?
Cheers
PaulC
Hi All,
Does anyone know if it is possible to export the list of Locations from my current SEPM and import them into a new non linked SEPM. Otherwise I have somewhere in the region of 100 locations to enter?
Cheers
PaulC
Hello,
We have several PC's where SEP is blocking inbound Firewall Traffic on Chrome.
There are no plugins/add-ons installed. Nothing detected in Risks log. Threat Analysis as well does not show any suspicious files.
Could you please help me anylyzing the cause of it.
This is what I see in Traffic logs:
Time Stamp | Event Type | Event Time | Severity | Historical IP Address | Remote Host IP | Remote Host Name | Network Protocol | Local Port | Remote Port | Traffic Direction | Application Name | Begin Time | End Time | Repetition | ACTION | Rule Name | Alert | Send Snmp Trap | Local Host Mac | Remote Host Mac | Hardware Key | User Name |
08/31/2017 18:02:06 | UDP datagram | 08/31/2017 18:01:34 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 61608 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:35:58 | 08/31/2017 08:35:58 | 1 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 18:02:06 | UDP datagram | 08/31/2017 08:35:57 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 61608 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:35:58 | 08/31/2017 08:35:58 | 1 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 18:02:06 | UDP datagram | 08/31/2017 08:34:31 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 64504 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:34:18 | 08/31/2017 08:34:18 | 1 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 18:02:06 | UDP datagram | 08/31/2017 08:30:31 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 64972 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:30:18 | 08/31/2017 08:30:20 | 3 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 18:02:06 | UDP datagram | 08/31/2017 08:26:36 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 64964 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:26:19 | 08/31/2017 08:26:22 | 4 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 18:02:06 | UDP datagram | 08/31/2017 08:22:31 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 61077 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:22:20 | 08/31/2017 08:22:20 | 2 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 08:22:40 | UDP datagram | 08/31/2017 08:20:34 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 63656 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:20:21 | 08/31/2017 08:20:21 | 2 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 08:22:40 | UDP datagram | 08/31/2017 08:16:34 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 62696 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:16:18 | 08/31/2017 08:16:22 | 2 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 08:22:40 | UDP datagram | 08/31/2017 08:12:34 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 52160 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 08:12:20 | 08/31/2017 08:12:20 | 1 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 08:22:40 | UDP datagram | 08/31/2017 07:56:35 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 58091 | 42860 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 07:56:19 | 08/31/2017 07:56:21 | 3 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 08:22:40 | UDP datagram | 08/31/2017 07:42:33 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 60060 | 57260 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 07:42:20 | 08/31/2017 07:42:20 | 1 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 08:22:40 | UDP datagram | 08/31/2017 07:34:33 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 55230 | 57260 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 07:34:22 | 08/31/2017 07:34:22 | 1 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 07:22:36 | UDP datagram | 08/31/2017 07:04:32 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 56023 | 59948 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 07:04:20 | 08/31/2017 07:04:21 | 3 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 07:22:36 | UDP datagram | 08/31/2017 07:00:32 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 53130 | 59948 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 07:00:18 | 08/31/2017 07:00:20 | 3 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 07:22:36 | UDP datagram | 08/31/2017 06:42:31 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 54804 | 59948 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 06:42:18 | 08/31/2017 06:42:18 | 1 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 07:22:36 | UDP datagram | 08/31/2017 06:38:31 | Critical | 192.168.0.17 | 192.168.0.13 | UDP | 53148 | 59948 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 06:38:19 | 08/31/2017 06:38:20 | 4 | Blocked | Block all incoming traffic to applications which isn´t approved | 0 | 0 | E4B3181DB537 | 44650D44EF10 | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 03:20:44 | UDP datagram | 08/31/2017 03:19:36 | Minor | ff02:0000:0000:0000:0000:0000:0000:00fb | fe80:0000:0000:0000:00e0:1fce:550e:bf93 | UDP | 5353 | 5353 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 03:19:25 | 08/31/2017 03:19:25 | 1 | Blocked | Block all other applications | 0 | 0 | 3333000000FB | 40331AE6DE0B | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 03:20:44 | UDP datagram | 08/31/2017 03:19:15 | Minor | ff02:0000:0000:0000:0000:0000:0000:00fb | fe80:0000:0000:0000:00e0:1fce:550e:bf93 | UDP | 5353 | 5353 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 03:19:12 | 08/31/2017 03:19:16 | 3 | Blocked | Block all other applications | 0 | 0 | 3333000000FB | 40331AE6DE0B | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 03:20:44 | UDP datagram | 08/31/2017 03:14:04 | Minor | ff02:0000:0000:0000:0000:0000:0000:00fb | fe80:0000:0000:0000:143d:1e54:1e18:28f9 | UDP | 5353 | 5353 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 03:13:57 | 08/31/2017 03:14:04 | 10 | Blocked | Block all other applications | 0 | 0 | 3333000000FB | BC9FEF04513A | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 03:20:44 | UDP datagram | 08/31/2017 03:13:38 | Minor | ff02:0000:0000:0000:0000:0000:0000:00fb | fe80:0000:0000:0000:00e0:1fce:550e:bf93 | UDP | 5353 | 5353 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 03:13:20 | 08/31/2017 03:13:24 | 3 | Blocked | Block all other applications | 0 | 0 | 3333000000FB | 40331AE6DE0B | D1683A5566288205E870EF2B7553FAB3 | ud5249v | |
08/31/2017 03:20:44 | UDP datagram | 08/31/2017 03:12:26 | Minor | ff02:0000:0000:0000:0000:0000:0000:00fb | fe80:0000:0000:0000:00e0:1fce:550e:bf93 | UDP | 5353 | 5353 | Inbound | C:/Program Files (x86)/Google/Chrome/Application/chrome.exe | 08/31/2017 03:12:12 | 08/31/2017 03:12:13 | 2 | Blocked | Block all other applications | 0 | 0 | 3333000000FB | 40331AE6DE0B | D1683A5566288205E870EF2B7553FAB3 | ud5249v |
I'm pretty sure this is possible because I've heard it mentioned before.
I would like to install SEP on redhat linux using a different version of Java than is currently installed. I wouldn't want to interfere with whatever the current java is doing, and would want SEP to use the newly installed java version and not touch the existing version.
Is that install process documented somewhere?
I have endusers in my HR department who peform training sessions with reputable vendor-supplied disks provided by a local community college. As of last week, they've always been able to run the executable on the training disks for their classes, but suddenly this week the executable is flagged by SEP as a Trojan.Gen.2 risk and prevented from running. Since this executable is on a cd, I can't add it to the Exceptions List. I tried adding a shortcut to the enduser's desktop, then adding the shortcut to the Exceptions List, but this does not work and the executable on the disk continues to be flagged as a threat. (D:\ACDC.exe is the path/executable that is flagged as a trojan)
Any help would be greatly appreciated.
When is SEP RU1 scheduled for release ?
Hi I have problem with GUP I will tell detail below
first I install SEPM at HQ between HQ and remote site connect by leased line can ping and communication normally
so I install SEP at remote site and assign policy GUP to them like this
and status GUP is True
problem is when GUP try to download content from SEPM it have error like this:
2017/09/01 11:16:52.568 [1636:3276] GUProxy - Content-Availability-Time: (60)
2017/09/01 11:16:52.588 [1636:3800] CAsyncHttpConnection::Close - Request: HttpSendRequest; CtrlBlk: 06FF3F00 time: 0
2017/09/01 11:16:52.588 [1636:3800] SyLinkEventFunc - EVENT_LU_REQUIRE_STATUS: Calling QueryContentSeqData with Moniker: {A78E095A-8FED-4937-9D5C-0B6C20EA696C} Target Sequence: 170801034
2017/09/01 11:16:52.588 [1636:3800] LuMan: Entering QueryContentSeqData: {A78E095A-8FED-4937-9D5C-0B6C20EA696C}, 170801034
2017/09/01 11:16:52.588 [1636:3800] LuMan: QueryContentSeqData result: 0x20010006
2017/09/01 11:16:52.588 [1636:3800] SyLinkEventFunc - EVENT_LU_REQUIRE_STATUS: QueryContentSeqData returned CMC_CONTENTUPDATE_NEEDED(536936454)
2017/09/01 11:16:52.588 [1636:3800] SyLinkEventFunc - EVENT_LU_REQUIRE_STATUS: No cached content information was returned. Request full package
2017/09/01 11:16:52.588 [1636:3800] GUProxy: find the downloading which should be cancelled.
2017/09/01 11:16:52.588 [1636:3800] GUProxy: erase the downloading /content/{A78E095A-8FED-4937-9D5C-0B6C20EA696C}/170801034/Full.zip
2017/09/01 11:16:52.588 [1636:3800] GUProxy: SetDownloadStatus for /content/{A78E095A-8FED-4937-9D5C-0B6C20EA696C}/170801034/Full.zip status 8
2017/09/01 11:16:52.588 [1636:3800] GUProxy: Current GUP 10.21.71.97 staus is 1
2017/09/01 11:16:52.588 [1636:3800] GUProxy: GUP 10.21.71.97 chosen
2017/09/01 11:16:52.588 [1636:3800] AH: Setting the Browser Session end option & Resetting the URL session ..
2017/09/01 11:16:52.588 [1636:3316] GUProxy: accepted socket 9004 for 10.21.71.97 port 49482
2017/09/01 11:16:52.588 [1636:3284] GUProxy: Begin to handle accepted socket 9004
2017/09/01 11:16:52.588 [1636:3284] GUPROXY - GUProxy HTTP in - GET /content/{A78E095A-8FED-4937-9D5C-0B6C20EA696C}/170801034/Full.zip
2017/09/01 11:16:52.588 [1636:3284] GUPROXY - GUProxy File - /content/{A78E095A-8FED-4937-9D5C-0B6C20EA696C}/170801034/Full.zip
2017/09/01 11:16:52.588 [1636:3284] GUPROXY - GUProxy mangled file - #content#{A78E095A-8FED-4937-9D5C-0B6C20EA696C}#170801034#Full!zip
2017/09/01 11:16:52.588 [1636:3284] GUProxy - Add request into download queue.
2017/09/01 11:16:52.588 [1636:3244] GUPROXY - GUProxy - TARGET_IP: - 172.16.0.99;
2017/09/01 11:16:52.588 [1636:3244] GUProxy - GET SEPM info from SYLINK(1) ,GET /content/{A78E095A-8FED-4937-9D5C-0B6C20EA696C}/170801034/Full.zip BEGIN with 15757,total with 303
2017/09/01 11:16:52.608 [1636:3244] GUProxy - DownloadThread: 15454 bytes need to be resumed
2017/09/01 11:16:52.608 [1636:3244] GUProxy - DownloadThread() max abort times will use the default value
2017/09/01 11:16:52.608 [1636:3244] GUProxy - Download loop, remain 15454 bytes to download
2017/09/01 11:16:52.618 [1636:3244] GUProxy - **downloadHelper.CreateUrlRequest Faile GET://172.16.0.99:8014/content/{A7i8E095A-8FED-4937-9D5C-0B6C20EA696C}/170801034/Full.zip
, begin from 0 with size 15454
and apache log from SEPM look like this :
(I have more then 1 GUP log error is same differance at url,ip,port)
[Fri Sep 01 11:15:19.022233 2017] [mpm_winnt:error] [pid 5544:tid 4528] (OS 64)The specified network name is no longer available. : [client 10.21.71.97:49487] Thread(7428) TransmitFile failed, socket: 05432, Threads ready: 498, URI: GET /content/%7B5A7367E1-D1F6-43b5-BD94-4AFFA896D724%7D/161121023/Full.zip HTTP/1.1
I also test GUP and SEPM connect
GUP can access SEPM:8014/content/contentinfo.txt
and SEPM can access GUP:2967/content/contentinfo.txt but this is empty page because GUP can't download it from SEPM
in SharedUpdate have file but it size about 1KB
I'm also try to access url 172.16.0.99:8014/content/{A7i8E095A-8FED-4937-9D5C-0B6C20EA696C}/170801034/Full.zip from GUP and it download full.zip
I try to uninstall and install it for few time it not fix
SEPM version is
|
install it in windows server 2008 r2
and SEP that act as GUP is 14.0.2415.0200 generate from SEPM install in win7 close UAC already
i think problem is **downloadHelper.CreateUrlRequest Faile but no idea why this happen Anyone found this problem plese tell me how to fix it : )
Thank you
Dear Support,
We had a former technician who installed trial license for symantec endpoint protection 14 manager on our server but he is no longer with us. We intend to pay for permannet 10 user license but the problem is that we can't login to the SEPM console becuase no one has the login credentials to the manager.
I intend uninstalling SEPM, SEP and live updates and start installation afresh.
I would like someone to advice if this will be a possible solution to the issues we are having or if there is a better way to resolve this kindly let me know.
Regards
Udensi
Hi,
I have SEP 14.0.1904.000 version. Recently I put a full update on all of my windows 10 PCs so that all the workstations are up to date with the Windows 10 latest version. During the update there was a message from windows that my version of SEP is incompatible with Windows 10. After that I uninstall it and try to install it again, but it failed.
What should I do to install SEP on Windows 10? I have the SEP 12x licenses but I got 14x free upgrade during the license period.
Thanks
I got the latest standalone client SEP 14 build 2415 installed.
When trying to open device manager either from windows 10 start menu or anywhere else, it takes it 2-3 seconds to open up, on my high end computer.
Before installing SEP client it launched instantly. I uninstalled it to test, rebooted and again it launches instantly.
I tried to have it installed and disabled it from the taskbar, but the device manager is still launching in 2-3 seconds.
I tested this on multiple computers with completely different hardware and was able to reproduce this issue on all.
Why is SEP slowing down the machines so badly?
Hello,
I am in a situation where I have few clients that show as Symantec Endpoint Protection with Network Access Control in the licensing tab on the Homepage.
Is there a way to find out which 4 clients are these?
I went to the Clients tab and did a search for client type, but nothing comes up.
Thanks,
I installed 2 Symantec Endpoint Protection Managers in load balancing ( sharing the same SQL Database).
Is there a way to find out from the Endpoint Protection Manager console by which of both Managers each client connect ?
The idea is to change the priority of both servers, so all clients connect via the newest management server, and then decommision the older management server.
But I want to make sure all clients connect via the newest management point first.
Thx
I have been struggling for a while with a memory leak in non-paged pool on a number of computers belonging to an industrial SCADA system. Using "Driver Verifier", I've been able to trace the leak to two driver files belonging to SEP: symefasi.sys and symtdi.sys. The computers are running XP and Server 2003, and because those OS'es have a rather limited non-paged pool (256MB), it gets exhausted after approximately 100 days. This will eventually cause the computer to either respond extremely slow or even crash completely.
The SEP version in use is 12.1.7166.6700 (12.1 RU6 MP7)
Unfortunately, upgrading the operating systems is at the moment not an option.
I can't find anything about correcting for memory leaks in the release notes for the later version 12.1.6 MP8.
Does anyone have a suggestion on how to solve this issue?
Whenever I have SEP 14 MP1 (2332) or MP2 (2415) "Proactive Threat Protection" installed and an active network connection (tried wireless and wired WAN. Didn't try just LAN), any system I tried is running much slower than usual. Most programs take seconds to launch, instead of instantly.
This happens on any windows 10 1703 x64 system that I tested (multiple configurations, including vanilla WIN 10 Creators Update systems), so can be easily reproduced.
As a workaround, I am able to eliminate the performance issues by:
1) Uninstalling the "Proactive Threat Protection" module. This completely restores performance.
2) Disconnecting from the internet wired or wiresless connection. This almost completely restores performance.
An easy way to test this is by opening up "device manager" from the start menu search or from cortana search. Typically it should launch instantly, but it can take 2-10 seconds (depends on the machine I tested) with "Proactive Threat Protection" module and an active internet connection.
Is there any other way to fix this without uninstalling PTP module or disabling the connection?
Hi Team,
Please let me know coverage from Symantec on "Locky Ransomware Makes a Comeback with New .Diablo6 and .Lukitus Variants"
Hi
Today it was discovered that the policy had stopped working. Global change was just an update to 14 mp2.
Any ideas why it happened?
thnx.
Hi Team,
Currently i have 1 no. of SEPM 12.1 RU4 MP1a server in LAN Zone with 300 client. 1 no. of SEPGUP Server in same zone. I have installed Symantec NAC integrated enforcer for DHCP servers in DHCP Server. My quesiton is that if i upgrade my SEPM server from 12.1 ru4 mp1a to 14 mp2 directly, is there any impact in host integrity checking part in user's client system while getting IPs through DHCP.
To check this, i have restored bare metal backup of existing SEPM 12.1 into one of spare server. Uprgraded to 14MP2 in standalone mode successfully without error and remove the patch chord from live server and connected to this server for testing purpose. After sometime all the laptops got notification like host integrating checking failed and their pc gets quarantine IP and all the services got blocked. So my question is that why this type of error generated in user's client laptop. In Host Integrity checking, there are 3 nos. of parameter checking defined, domain, service pack and windows 7 and the error was generated for service pack and windows 7 only.
Hello everyone!!!
Recently I've detected 3 workstations that are creating multiple files in the directory:
C:\ProgramData\Symantec\Symantec Endpoint Protection\14.0.2332.0100.105\Data\ErrMgmt\Queue\Incoming
The folder is growing rapidly and reached: 700gb.
These cases are isolated, so I would like to know if it is possible to disable the creation of these error logs directly in regedit equal to SEP12.
Symdiag did not return any faults, I already uninstalled with cleanwipe and reinstalled from scratch, but I still have this failure.
Could someone help me in this case?
Thank you
Hi There,
We are in a process of upgrading all our clients to version 14.
Just wanted to know, if it is possible to upgrade clients(Server 2008/2012) from 12.x to 14 without any kind to restart - neither manually or automatically.
If not, then please let me know the best practise to perfom upgrade for the servers.
Kind Regards,
Inder Jhita
Setting up a new 14.x deployment and some of our admins are insisting that SQL files / folders must be excluded from scans
Investigating this, the only related articles I can find are several years old. I saw something that mentioned that SEP does not not scan databases by default.
So I am just seeking clarification whether it is still recommended / required to exclude any SQL content from active or scheduled scans
thanks
Hello everyone. I have a problem.
The essence of the problem: what will happen when the Symantec Endpoint Protection 14.0 Enterprise Edition licenses become over-deployed.
How will this affect the functionality of clients and the server?
What are the critical changes in functioning can happen?
Thank you.