
This period is too long, my clients are mainly 10 or 20 minutes online before the close the notebook and drive to the next customer. Now I did a test with an client, and the result was: after connecting to the WAN – it took about 50 minutes!!! only with the rules “use a l live update server” and to use the “default Symantec Server” with enabled scheduling, with setting “continuously”. I split our LiveUpdate policy, one for the internal gups and created a new liveupdate policy for the external clients. these 600 clients are mainly external staff and they are normally not often connected to the internal lan to get gup updates.ĭefinitions older 10 days is definitive to old! We have enabled location awareness, our internal clients are using gup and that works fine and fast.īut i always receive a notification about 600 clients with virus definitions older than 10 Days.

I have the admin rights for our site (or sub group?!). so I’ve maybe not the full overview about our sepm landscape. After running a report, we find that SEP has blocked the domain 195.22.28.222 Users started noticing Malicious domain attack pop ups on their computers.I’m a site admin for SEPM solution, our site is about 2600 clients small, the sepm server is managed by an external company.

Symantec is blocking the attack but we are not seeing anything locally.

We still have all machines trying to ping out to that address using local rescources. Task Scan is Clean as well on any of the affected hosts:Īs per firewall report - see the local file trying to connect to remote host. My Company\Corelogic\General User - USB CD Disabled Traffic has been blocked for this application: C:\WINDOWS\SYSTEM32\SVCHOST.EXE Traffic has been blocked for this application: C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OFFICECLICKTORUN.EXEĤ0A73317AC3ADC9236338920FF106CEB9844AF15295F02D6F85A9427D1DAC01DĬ:/PROGRAM FILES/COMMON FILES/MICROSOFT SHARED/CLICKTORUN/OFFICEC2RCLIENT.EXEĤ7FFE729F666E6D19EADDD771E166F1BE2B055C47D1B8507761106CF5F2BE2DE Malicious Site: Malicious Domains Request Malicious Site: Malicious Domains Request attack blocked.
