Symantec Endpoint Protection 11 clients with their Proactive Threat Protection (PTP) sensitivity slider set to 100% have reported False Positives with certain virtualized applications.
These SEP 11 PTP false positives only occur when using virtualized applications like Siebel, Firefox, IE6, etc. When these detections do occur, they do not list the Filename, Original Location, Detected Process, or Path. After the client forwards its event logs to SEPM, from Policies > New centralized exceptions policy > Centralized Exceptions > Add > Windows Exceptions > TruScan Proactive Threat Scan Exceptions > Detected Processes, the File Fingerprint shows as: 1:0000000000000000000000000000000000000000001, with the hash not being unique. This makes it challenging when other virtualized applications use the same hash.
Virtualized applications are created with VMware’s ThinApp.
Should PTP FP's of this nature arise, lower the sensitivity to 70% or disable PTP.
Note as well that SEP 12.1 PTP is not affected by this issue.
Imported Document Id
This is machine translated content
Login to Subscribe
Please login to set up your
For security reasons, your link to this document has expired. Please click on the attachment link to access this file.
The attachment that you are looking for no longer exists.
There has been an issue retrieving your attachment. Please try again.
Currently server is down.
Didn't find the article you were looking for? Try these resources.