What’s new in Symantec Endpoint Security

Symantec Endpoint Security is updated with new features and fixes on a monthly basis.

FeatureWhat’s new
Adaptive ProtectionSES Complete OnlyAdaptive Protection adaptations are now called exceptions.  For more information, see Using Adaptive Protection.
Custom Application BehaviorCustom Application Behavior now prevents you from creating a rule that blocks all applications or disables all local drives.A message appears to alert you that you cannot save the rule. The message appears when you use an asterisk wildcard (*) by itself for included applications in a rule with a condition that specifies the asterisk (*) wildcard for a behavior and an action of Block access.For more information, see Configuring rules in Custom Application Behavior rule sets.
PoliciesOn the Versions tab of a policy, a new Modified By column indicates who modified the policy and created the version. A new Time column shows the date and time when the version was created.  For more information, see Reviewing the version history for a policy.
Endpoint Detection and Response (EDR)SES Complete OnlyYou can now connect to remote devices by launching Live Shell’s Connect with one-time PIN (OTP) authentication setting configured for the corresponding Detection and Response policy enabled for the remote device. This setting can be configured by a Super Administrator only, and is applicable for any custom user role that has permission in the Live Shell > Live Shell Connect with OTP option on the Settings > Administrators and Roles > Roles page of the cloud console.For more information, see Live Shell Connect for Windows.A saved search query retains the same grid columns that were active when the search was saved.For more information, see Saving and sharing search queries.Investigation privileges are enhanced for custom roles. You can now create different roles to view, create, edit and update the incident and incident rules.Users who are assigned to a custom role for managing incidents lose the privileges to view incident rules and adaptations; enable and disable incident rules and adaptations; create, edit, and delete custom incident rules; and edit settings after the August 2023 refresh deployment. The Super Administrator must reconfigure the custom role to enable the privileges for Incident Rules and Adaptations.For more information, see Creating and managing custom roles.You can now expand the incident details flyout pane into a separate browser tab. This allows you to make the maximum use of the available screen size and leverage enhanced event filtering functionality when viewing incident details.For more information, see Expanding the incident details to a new browser tab.The incident rules summary view now includes additional event count columns that give you more confidence in incident volumes if you choose to enable a rule.For more information, see Examining information in the Incident Rules summary view.New monthly updates are available for:MITRE event enrichment updatesAdvanced Attack Technique incident rules updates
SEP MobileSupport has been added for a new Unwanted Mobile Application policy that lets you define an application as unwanted based on permissions or behaviors.For more information, see Defining the risk level for determining a mobile application as unwanted.
APIA public API is now available to fetch file details by hash. You can do the following:Retrieve all file details by specifying the hash value in the API.Retrieve a list of devices on which a file hash is seen.Retrieve the file path values on a device by specifying the file hash and the device ID in the API.For more information, see the Symantec Enterprise Security Products API Portal.

Symantec Agent Updates: August 2023

FeatureWhat’s new
SEP Mobile Android AgentAndroid 4.15.0Provided an option for legacy users to delete their unwanted accounts.Added events to indicate start and end of a scan for ICDm enrolled devices.App updates to support the Unwanted app list policy for ICDm enrolled devices.
SEP Mobile iOS AgentiOS 6.14.0App updates to support the Unwanted app list policy for ICDm enrolled devices.Added a feature that enables you to use only the legacy Management Console instead of ICDm for all of your manual device enrollments.Added the app version details to all of the file detections events for ICDm.