

Symantec Endpoint Protection (SEP) was susceptible to a number of security findings that could potentially result in an authorized but less privileged user gaining elevated access to the Management Console. Security Advisories Relating to Symantec Products – Symantec Endpoint Protection Multiple Security Issues The Symantec update will be available in the Software section at the top left of the screen. To install the updated version of Symantec, please visit:, and click Ask NYU IT. This update address the security vulnerabilities detailed below.

The image above is a representation and does not include the actual regex or format string values required for a proper workaround for all administrators.We recommend that you update your install of Symantec Endpoint Protection (anti-virus software) to the recent version (March 2016 update, 12.1.6). NOTE: If you have questions about Syslog Redirect and how this protocol works, you can discuss this protocol in our forums. The event pipeline receives the data with the new header and is able to properly parsed by the QRadar appliance. This protocol works by using a regular expression to generate a new Syslog header, so you have. The Syslog Redirect Protocol allows the Syslog header from the event payload to be substituted with another header to ensure that an IP or hostname can be used to parse the event properly. If you cannot update to Symantec Endpoint Protection 12.1.6 MP4Īn alternate option for administrators is to use the Syslog Redirect Protocol and send Symantec Endpoint Protection Syslog events to port 517 on the QRadar system. This issue was corrected by Symantec in a bugfix in SEP 12.1.6 MP4. Note: In the Example above that SymanterServer is in the place of the host name, instead of the actual server name ServerAĪdministrators with Symantec Endpoint Protection appliances should review the fix provided by Symantec. Jun 2 09:37:57 SymantecServer ServerA: Virus found,Computer name:ServerA,Source: Real Time Scan,Risk name: CAR Test String,Occurrences:1,D:/ffirectoryA/DirectoryB,"",Actual action: Cleaned by deletion,Requested action:Cleaned,Secondary action: Quarantined,Event time: 14:22:10,Inserted: 14:32:57,End: 14:32:10,Domain: Default,Group: My Group\WAN\Offline Servers,Server:ServerA,User: exampleuser1,Source computer: ,Source IP: 0.0.0.0 This information in most RFC Syslog payloads is normally reserved for the host name or IP Address of the appliance that generated the event, not a generic value. This issue is due to how Symantec generates Syslog headers as the header always contains an application name of SymantecServer. This issue has been resolved by Symantec in software version 12.1.6.MP4.įor Symantec appliances on older firmware: The Symantec Endpoint Protection Server is out of date.
