Link to home
Start Free TrialLog in
Avatar of TTCTECH
TTCTECHFlag for United States of America

asked on

Symantec Endpoint IP Whitelisting

We use Symantec Endpoint Protection v11.

We are attempting to perform employee Phishing testing via Core Impact as follows:
1. Test Phishing emails are initiated from Core Impact, to select employees.
2. Once an employee clicks an embedded hyperlink (which resolves to "http://<Core Impact Device's IP Address/..."), they are redirected back through the Core Impact device (all behind the firewall) to a designated URL (e.g. www.Google.com or an Intranet page).  
3. Core impact notes which employee(s) click the link.

The issue I'm seeing is that, in doing its job, Symantec is blocking step #2 at the clients.

We've found that, by temporarily disabling "Network Threat Protection" on a client workstation, everything works correctly

How can I create an exclusion (or whitelist) to state that access to "http://<Core Impact Device's IP Address/...") is allowed?

Thank you
Avatar of Sudeep Sharma
Sudeep Sharma
Flag of India image

You could exclude the IP or host from IPS on Symantec Endpoint Protection, check below link:

http://www.symantec.com/connect/de/forums/dhcp-server-notworing-after-installing-sep-client-1106

I hope that would help.

Sudeep
Avatar of TTCTECH

ASKER

Hi Sudeep.

I realize that the settings can be changed at the client, but we have over 700 clients (I need to be able to chnge this globally, via the Admin console).

Thanks
ASKER CERTIFIED SOLUTION
Avatar of Member_2_4421735
Member_2_4421735

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Member_2_4421735
Member_2_4421735

Forgot to ask... can you re-zone your question to 'Symantec Anti-Virus Software' please so it can be categorized properly? Thanks
Avatar of TTCTECH

ASKER

I beileve we already have that setting in place (see screenshot) but it was still blocking the URL.
SEP-Settings.gif
Confirm that the policy is applied to the group where the impacted clients are. If that's ok, open the Security Log on one of the clients and look for the event that corresponds to the block. There should be an associated SID for the event. We can do next steps after that.
Avatar of TTCTECH

ASKER

There is evidently a period of time (after the exception is added to the policy) before the policy actually works (is applied).