

"From sales, to implementation, to support, the FortiEDR global team was a partner ensuring our success to regain an advantage over malicious actors." Security Analyst in the Manufacturing Industry " Successfully Regain Advantage Over Malicious Actors" The agent has almost no overhead, the management interface provides detail without needing to dig, and most importantly, blocking occurs with minimal user impact." " FortiEDR Is The First Product In My 15 Year Career That Makes Me Think We Have A Chance."

Many enterprise customers realize the efficiency and effectiveness of FortiEDR and have provided positive feedback on Gartner Peer Insights. Additionally, it also shares threat intelligence with FortiSandbox.įortiEDR sends events and alerts to FortiSIEM for threat analysis and forensic investigation. FortiSIEM can also utilize JSON and REST APIs to further integrate with FortiEDR.įortiEDR native integration with FortiGuard Labs allows up-to-date intelligence, supporting real-time incident classification to enable accurate incident response playbook activation. With syslog sharing, FortiEDR management can instruct enhanced response actions for FortiNAC, such as isolating a device.įortiEDR native integration with FortiSandbox automatically submits files to the sandbox in the cloud, supporting real-time event analysis and classification. FortiEDR management can instruct enhanced response actions for FortiGate, such as suspending or blocking an IP address following an infiltration attack.įortiEDR shares endpoint threat intelligence and discovered assets with FortiNAC. The FortiEDR connector enables the sharing of endpoint threat intelligence and application information with FortiGate. Prevents errors on Citrix servers and Terminal Servers.FortiEDR leverages the Fortinet Security Fabric architecture and integrates with many Security Fabric components including FortiGate, FortiSandbox, and FortiSIEM. LaunchSmcGui_Explain="Set to Disabled to prevent SmcGui.exe from launching. KEYNAME "SOFTWARE\Symantec\Symantec Endpoint Protection\SMC" Just save the following to a file (whatever.adm) and add to administrative templates in group policy. Hopefully this will help someone else along the way. I created a custom administrative template file that will allow these settings to be pushed out with group policy. Woohoo! Turns out we already had the proper maintenance pack installed, so I tested adding the registry key and it worked great. Too much wasted time on that forum thread!!!Īfter some more googling (sp?) I came across this Symantec knowledge base article.

Reading this thread leads to nasty hacks like renaming the SmcGui.exe executable file (which doesn't work), replacing the file (which sometimes works), and some other issues. Problem: Even if you setup a policy via the SEP Management Console to disable the system tray icon, the server still launches SmcGui.exe, and fails to close the process when they logout.Ī quick google of SmcGui.exe and Citrix yeilds a terribly log thread on the issue over at Symantec's forums. Disable the icon.Ĭonfigure a policy on the SEP server for terminal servers to disable the system tray icon and the gui. Upon closing their published application (any application), the little yellow shield, as well as the SmcGui.exe process, stay running in the background. This also puts a SEP icon (little yellow shield) in the users system tray.

We have been experiencing some issues with Symantec Endpoint Protection (SEP) and Citrix.īy default, when users would launch a published application via Citrix, the Symantec Management Client (smc.exe) service launches a process called SmcGui.exe.
