Symantec Endpoint Protection Latest Version For Windows 10 Free Download Full

0 views
Skip to first unread message

Laura N Gerard

unread,
Jul 25, 2024, 8:42:24 PM7/25/24
to TEPEBASI-RAM REHBER OGRETMENLER MAIL GRUBU

On 2 pc's my setup is Windows 7 Ultimate, Service Pack 1 and have WinPcap 4.1.2 and Windows 7 Professional, SP1 and WinPcap 4.1.2 on a third pc. The PC's with Windows 7 Ultimate, Service Pack have Symantec EndPoint Protection version 11.0.6005.562 and the Windows 7 Professional, SP1 pc has Symantec EndPoint Protection version 11.0.7000.975

Prior to several months ago all was working fine.
But then on 2 of my 3 PC's (win7 Ultimate & symantec 11.0.6005.562) I started having problems receiving data via the WinPcap API. In my applications (either written in C or SharpPcap) I can open a connection/handle to an interface and I can successfully transmit data over this interface but all attempts to read/receive data result in the application being blocked. However (this is the weird part) I can open Wireshark and successfully receive data on these same pc's and interfaces.

As I mentioned before these applications were working on all my pc's up until some months ago.
I suspect our corporate IT department pushed (via the evil Altiris application) some security patch on my pc and then after rebooting these applications no longer worked in the aforementioned receive mode. So I upgraded one of the non-working pc's to the version of Symantec EndPoint Protection version 11.0.7000.975 on the pc that is working, but this had no affect so I presume the root cause is not due to the presence or version of Symantec. Symantec EndPoint Protection has the runtime option of disabling protection and I have tried this but there is no change in behavior.

I have tried all reasonable combinations of pcap_open, pcap_open_live and using the classis pcap_loop vs pcap_next_ex and nothing seems to open up the reception of data. I looked at the source code to wireshark (e.g. dumpcap.c) and I am using the same api calls.

Unfortunately our corporate IT setup prevents uninstalling Symantec EndPoint Protection. But again I have a pc running Symantec EndPoint Protection in which my application works fine so I know that in some configuration my application works alongside Symantec EndPoint Protection.

It might work in some configuration. But do you know it is the same configuration? I still recommend to uninstall SEP, as I'm pretty convinced that is SEP causing the problems.

I have my UAC set to minimal setting and this has not changed. When running Wireshark, does that process execute with different rights than my own application? Is there a way to manually 'upgrade' or alter the explicit rights to my .exe application file?

Microsoft Defender for Cloud provides health assessments of supported versions of Endpoint protection solutions. This article explains the scenarios that lead Defender for Cloud to generate the following two recommendations:

As the Log Analytics agent (also known as MMA) is set to retire in August 2024, all Defender for Servers features that currently depend on it, including those described on this page, will be available through either Microsoft Defender for Endpoint integration or agentless scanning, before the retirement date. For more information about the roadmap for each of the features that are currently rely on Log Analytics Agent, see this announcement.

At the end of 2021, we revised the recommendation that installs endpoint protection. One of the changes affects how the recommendation displays machines that are powered off. In the previous version, machines that were turned off appeared in the 'Not applicable' list. In the newer recommendation, they don't appear in any of the resources lists (healthy, unhealthy, or not applicable).

For more help, contact the Azure experts in Azure Community Support. Or file an Azure support incident. Go to the Azure support site and select Get support. For information about using Azure Support, read the Microsoft Azure support common questions.

We have Symantec Endpoint Protection (14 MP1) in our environment, and after upgrading to 1703 it seems the Security Center is starting and enabled (appears in system tray). I created a registry DWORD via GPO preferences to prevent it from starting up, and have also Disabled Defender via GPO. This seems to work nicely.

We all know, that having multiple malware/anti-virus solutions running simultaneously is not a good thing. I would like to know what the implications of disabling Defender are, and also if my approach is best practice?

The GPO setting you set is supported, but all that does is disable Windows Defender antivirus, which would have already been disabled as you are using Symanten Endpoint Protection. Windows 10 only allows you to run 1 antivirus in real time protection at a time.

1. Windows Defender Security Center (WDSC) which has an overview of a lot of built-in Windows safety features (AV, Firewall, Device performance). So it's relevant even if you use SEP for AV. We currently do not support disabling this UI, but we have heard this feedback and are working on this (though no commitment/timeframe).

2. Windows Defender Antivirus. What you knew before simply as "Windows Defender". That, you can disable via GPO ( You can read more: -us/windows/threat-protection/windows-defender-antivirus/prevent-end-us... )

In both institutions, I have seen examples where for Windows 7 and Windows 10 environments, that there are occasions where even by installing these security suites, they do not disable Windows Defender outright.

Absolutely - they are different features. Please note that disabling the Windows Security Center service via regkey edits will *not* disable Windows Defender AV or the Windows Defender Security Center. The Windows Defender Security Center just presents a number of security features in a single place - disabling any one of those features individually will not disable the Windows Defender Security Center. You cannot disable the Windows Defender Security Center.

And this gives an overview of how to use Windows Defender Security Center to configure Windows Defender AV (directly on individual endpoints): -us/windows/threat-protection/windows-defender-antivirus/windows-defend...

No doubt so that Microsoft can ensure their crap Windows Defender will run no matter what AV software you have installed. I just got the 1709 version today and now I have yet another two icons for Windows services that I'll never use. I don't need Windows Defender at all and now I can't even opt out of it.

I usually recommend customers to go for what's included and configure the other security features in the operatingsystem like UEFI + Secure boot, application Control, CFA, credential guard, ASR, Exploit guard etc.

we have delta v 13.1 installed on windows 7 workstation, and there was a Symantec endpoint protection 12 installed. as the support for the 12.1 SEP antivirus ends with the current version, we want to install the newer version of Symantec end point protection 14.3. However our win 7 not updated and the new antivirus require to install SHA-2 CODE SIGNING SUPPORT UPDATE (KB4474419). my question as below:

During September and October 2020 we continuously evaluated 19 endpoint protection products using settings as provided by the vendor. We always used the most current publicly-available version of all products for the testing. They were allowed to update themselves at any time and query their in-the-cloud services. We focused on realistic test scenarios and challenged the products against real-world threats. Products had to demonstrate their capabilities using all components and protection layers.

Reply all
Reply to author
Forward
0 new messages