As is well known, Broadcom is the "owner" of Symantec, having acquired the Symantec business in November 2019. Broadcom continues to use the Symantec name to market its highly regarded anti-virus program. When Broadcom distributes a new update to Symantec Endpoint Protection (SEP), it does so as a digitally signed executable file. The current release of SEP is always reported by Broadcom at their website: broadcom.com. The executables distributed by Broadcom (e.g., either a full install or a client-only install) are actually 7-Zip executable files that extract themselves into a temporary file, execute the Setup file, and then clean-up after the install is complete. What one often finds on the Internet is re-compressed versions of the original Broadcom file, usually in the form of a *.rar file. Unfortunately, the digitally signed information from Broadcom is lost when this operation happens. In addition, it sometimes happens that additional files (some not created by Broadcom) are inserted into the new compressed file. The point is simple: the integrity of the re-compressed file is unknown because the digital signature from Broadcom has been lost. Consequently, a person who uses a re-compressed file of unknown provenance places them-self at risk of their computer being compromised. My advice - don't do it. Wait until the digitally signed file from Broadcom is available.
This is a repack, and not the original signed exe installer. Does anyone have the original Broadcom signed install file in english ?
Btw. For anyone doubting the need for the signed version... and had already installed one of these repacks: Open SEP, go to Help, then Troubleshooting, then export the current policy. Open it with Notepad (ideally ++) and check out the Chinese language. These were repacked alright... and done so very carefully.
hello, please can you confirm that SEP include a protection against ransomware ? if yes, then how can i check in the settings that it is enabled ?? Thanks for your help !
OK, so that's not just 1 thing to check like you do in Bitdefender endpoint protection. 11 steps/things to enable here.
If one wishes to stop SEP's Browser Intrusion Prevention in Chrome, the following steps can be used without altering the Registry. 1. Open SEP 2. Click on the "Change Settings" option 3. Click on the Configure Settings button for "Network and Host Exploit Mitigation" 4. Select the tab for "Intrusion Prevention" 5. Remove the check mark for "Enable Browser Intrusion Prevention" 6. Exit from SEP 7. Restart Chrome To re-enable Intrusion Prevention, reverse the steps just taken by enabling the check mark on "Enable Browser Intrusion Prevention".
Sorry to ask, but what is the diference between this and the last signed file that has the same product version, that was shared here some time ago? Thank you.