update! bleepingcomputer.com/news/security/symantec-fixes-privilege-escalation-flaw-in-endpoint-protection/
just curious, is this new version of SEP coming out of Broadcom now? Read a news this morning: After symantec sold its enterprise antivirus software to Broadcom, the remaining is renamed NortonLifelock, selling Norton antivirus and Lifelock. and now McAfee is interested in buying NortonLifeLock. Guess Norton antivirus will be combined with McAfee endpoint security.
Today an old 14.x version was crashing Chrome in a few PC in my company, i fixed it by uninstalling and installing the latest version.
Symantec_Endpoint_Protection_14.2.2_Win64-bit_Client_EN (14.2.5323.2000) doesn't allow standard users the access to STATUS > NETWORK AND HOST EXPLOIT MITIGATION > OPTIONS > VIEW APPLICATION SETTINGS ... Previous releases allowed standard users to view and modify applications network access rule which was very useful (even risky in principle). Any idea on how to overcome? What was the last release that allowed it?
Version 14.2 RU2 MP1 (14.2.5569.1000) Release date: 26 January, 2020 What's new in this version: - Made the following improvements: The Website Traffic Redirection policy lets you configure fail open and fail close behavior. A REST API enhancement lets you query the Location Awareness policy assigned to clients. External Logging allows Syslog servers to receive the name of Location Awareness policies applied to endpoints for SONAR events. This change adds a new "Location" column in External Logging for SONAR protection events. SEP Manager notifications let you to specific email distribution lists that contain special characters as the recipient. - Added the following operating system support for the Linux client: Red Hat Enterprise Linux Server (RHEL) 8 and 8.1 CentOS 8 with Kernel 4.18 - Upgraded Jackson-databind and SQLite third-party components.
Anyone is getting this error in event viewer? [SID: 31999] Audit: P2P Torrent Traffic 4 attack detected but not blocked