How do I submit a false positive Symantec?

How do I submit a false positive Symantec?

To submit a false positive:

  1. 1) Navigate to the Symantec SymSubmit (symsubmit.symantec.com).
  2. 2) Select “Clean software incorrectly detected”.
  3. 3) On the submission page, choose a submission type to provide.
  4. 4) Continue to fill out details on the submission, and when the detection occurs.

How do I whitelist an application in Symantec?

Login to the Symantec Endpoint Protection Manager (SEPM) and go to the Policies page. On the Exceptions Policy page, click Exceptions. Click Add > Windows Exceptions > Application. In the View drop-down list, select All, Watched Applications, or User-allowed Applications.

What is WS Reputation1?

The WS. Reputation1 detection indicates a suspicious file and not a traditional anti-virus/malware detection. This SEP detection is from the Insight (File Reputation) feature of the SEP client.

What is whitelist submission?

Whitelisting is file specific. A new version of your software may have new files and thus new versions of the files would not be known to us. This could result in a false positive occurring on the new files. In order to mitigate this risk, we recommend submitting new versions of your software to us.

How do I exclude files from Symantec Endpoint Protection?

How to exclude particular Files and Folders from all Scanning on SEPM

  1. Right Click on Blank Space and Choose Add.
  2. Give name to Policy.
  3. Choose Add Button –> Windows Exceptions –> Files or Folders.
  4. In Folder option gives a path of Ajax Mail Sync.exe folder which is present on client machines Drive.

What is Heur AdvML B?

Heur.AdvML.b virus detected by Norton on a newly compiled C++ console application in debug mode. The executable is marked as malware by several engines on virustotal. –

What is Heur AdvML C?

Heur.AdvML.C is a cloud-based heuristic detection. It is likely to be a false positive. If you want to submit this sample for analysis, please use this system.

How do I check exclusions in Symantec Endpoint Protection?

Open the SEP client UI. Click Help > Troubleshooting….For all versions prior to 14.3 RU1, the steps below can be used.

  1. Start > Run > Regedit.
  2. Browse to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\SYMANTEC\SYMANTEC ENDPOINT PROTECTION\AV\EXCLUSIONS.
  3. Expand the key to view the various applications listed there.

How do I exclude files in Symantec Endpoint Protection?

What’s an NFT whitelist?

A whitelist in the NFT world is a list of people who get early and guaranteed access to mint at a specific date and window of time.

What is blacklisting and whitelisting?

Whitelisting and blacklisting are two methodologies to control access to websites, email, software and IP addresses on networks. Whitelisting denies access to all resources and only the “owner” can allow access. Blacklisting allows access to all with the provision that only certain items are denied.

What is Trojan gen2?

Gen. 2 is a dangerous computer trojan that may represent security risk for the affected PC system and its network environment. Trojan. Gen. 2 may try to establish connection with the remote host once it has infiltrated a computer system.

What is Trojan Gen NPE?

Trojan. gen. npe. 2 is a generic name for specific malware. It is malicious and poses a significant threat to computer safety.

How do I exclude a folder or file using Symantec Endpoint Protection Manager?

Symantec Endpoint – How to add a folder to exclusion.

  1. In the SEP SBE Management Console: Go to Policies page and click on Add Policy.
  2. Then in the Computer Protection section of the Policy Configuration page, click on Custom Exclusions.
  3. Select the Folder from the drop-down menu.

What does WL mean in NFT?

KEY POINTS. In the NFT world, whitelisting typically means that a crypto wallet address, (i.e. a public ETH address), is pre-approved for minting of NFTs on specified dates/times (usually a date/time window).

What is the difference between white list and black list?

Why is IT called a whitelist?

A whitelist (or, less commonly, a passlist or allowlist) is a mechanism which explicitly allows some identified entities to access a particular privilege, service, mobility, or recognition i.e. it is a list of things allowed when everything is denied by default.

What is a Trojan Gen?

Gen is a generic detection for many individual but varied Trojans for which specific definitions have not been created. A generic detection is used because it protects against many Trojans that share similar characteristics.

How do I submit false positives on content analysis to Symantec?

This article explains how to submit false positives on Content Analysis to Symantec. All false positive submissions are now done through the Broadcom Support portal, and there is no longer a need to open a case with support to report it. To submit a false positive: 3) On the submission page, choose a submission type to provide.

What is the maximum file size for a submission?

The maximum size for one submission is 100 MB. Do not submit more than 9 files in any zip file, regardless of size. Note: Some file types, like .jar and .cab, may be containers that include files exceeding the maximum file count. Additional information an FAQ can be found in the Connect article Symantec Insider Tip: Successful Submissions!

How do I submit suspicious files to security response for examination?

Suspicious files and suspected phishing websites which are not currently detected by your Symantec product can be submitted to Security Response for examination. Please click on Malware Not Detected tile and be sure to complete the form. If these submissions are confirmed to be malicious, protection will be added against them.

How do I submit suspected missed malware files to symsubmit?

You can submit suspected missed malware files and phishing websites to SymSubmit. Please use the Not Detected by Symantec tab when submitting files. CAUTION: Do not send any malicious, detected, or suspected files via email or upload to cases. The submission portal is the only acceptable option for submitting files to Security Response.