Symantec two factor authentication
Author: s | 2025-04-25
Two-factor authentication with Symantec VIP is not supported in FIPS-enabled environments or over IPv6. For more information, see: Configuring two-factor authentication with Symantec Adds a layer of security with Multi-Factor Authentication. Symantec VIP Cards are to be used with Symantec VIP Access. Two-factor authentication is easy to enable and
Symantec two factor authentication - lopersbusters
Redirection. Additionally, you can configure it to forward additional header data that identifies the user that initiated the traffic. This additional header data lets you create per-user traffic rules. To access this setting, click Policies > Integrations, open the policy, and click WSS Traffic Redirection. Scans quickly handle a large number of threats on heavily infected computers: When manual scans and Auto-Protect scans detect a large number of threats on a client computer, the scans can quickly process the threats. This aggressive mode starts when the computer has a minimum of 100 viruses. The default action for these detections is Delete. This aggressive mode does not process spyware. You do not configure this feature; it runs automatically.Management server featuresSymantec VIP two-factor authentication and smart card authentication for Symantec Endpoint Protection Manager: You can now use two additional types of authentication for Symantec Endpoint Protection Manager administrator accounts: Two-factor authentication (2FA) with Symantec VIP: When two-factor authentication is enabled, you must provide a unique, one-time verification code as well as a password when you log on to Symantec Endpoint Protection Manager. You can receive the code by voice, text, or with the free Symantec VIP Access application. Smart card authentication: You can configure Symantec Endpoint Protection Manager to log on administrators who use a Personal Identity Verification (PIV) card or a Common Access Card (CAC). Smart cards are used for administrators who work for US Federal Agencies or a US military agency. With PIV/CAC authentication, you insert the card into the reader and provide a PIN number. New communications module: A new communications module replaces the existing protocol. Both modules still use sylink.xml to establish a management connection between Symantec Endpoint Protection Manager and the client. The new communications module works with both IPv6 and IPv4 addresses, and communicates with Windows, Mac, and Linux clients. Password requirements are stronger: When you install the management server or configure the management server, you must set a strong password for the system administrator account. The password must contain at least 8 characters and fewer than 16 characters. It must include at least one lowercase letter [a-z], one uppercase letter [A-Z], one numeric character [0-9], and one special character ["/ \ [ ] : ; | = , + * ? ]. Updates for FIPS 140-2 compliance: Symantec Endpoint Protection 14.2 updates third-party components and validated modules to ensure continued compliance for data encryption with Federal Information Processing Standardization (FIPS) 140-2. Symantec Endpoint Protection 14.2 lets FIPS 140-2-compliant environments access cloud features. LiveUpdate downloads content for the Application Control engine: To patch problems with an operating system such as Windows 10, LiveUpdate now downloads content for the Application Control engine for 14.2 Windows clients. To Two-factor authentication with Symantec VIP is not supported in FIPS-enabled environments or over IPv6. For more information, see: Configuring two-factor authentication with Symantec From the dashboard. Additionally, create a Twilio Conversation API Service and obtain the Service SID. You need to use this data while configuring SMS verification methods for 2FA on Symantec Encryption Management Server Administrative Console. For more information, see the Twilio Documentation portal. Administrators configure verification methods for 2FA on Symantec Encryption Management Server Administrative ConsoleAdministrators can configure and enable 2FA and verification methods from the Administration Console and allow their Web Email Protection users to use email, or email and SMS as a multi-factor authentication method to log in to the Web Email Protection interface. To enable 2FA and verification methods, administrators need to perform the following steps:On the Administration Console, navigate to Services > Web Email Protection > the Options tab > click Edit. The Two-Factor Authentication is disabled, by default.On the Edit Web Email Protection Options page, select Enable Two-factor Authentication. By default, the email-based verification is enabled. The email-based verification method cannot be disabled when Two-factor Authentication is enabled.(Optional) To enable SMS-based verification, select SMS. If you select Clickatell, enter the API Key.If you select Twilio, enter the Account SID, Auth Token, and Service SID.Click Save.Navigate to Services > Web Email Protection > the Options tab to verify that the Two-factor Authentication is enabled for the verification methods that you configured.Web Email Protection users register and verify their phone numbers for SMS-based verification on the WEP settings page, if SMS is one of the verification methodsAs administrators configure and enable 2FA, Web Email Protection users can opt for a 2FA verification method within their account settings, where they have the flexibility to choose between receiving authentication codes via SMS or email. The email-based verification method involves generating a time-sensitive one-time password code (TOTP) that is sent to the user's email. The SMS-based verification involves generating a time-sensitive code (TOTP) that is sent to the user's registered mobile device. This adds an extra layer of security beyond the regular login credentials. Authentication (2FA) system operates with the following default time intervals: Code Generation Interval Validity: When a new code is generated, it is valid for 10 minutes. Beyond 10 minutes, the code expires. Resend Code Interval: In case you haven't received the initial 2FA code or need to request another code, note that the resend functionality operates on a 30-second interval. You may request a new code after the previous one expires, typically within this time frame.Comments
Redirection. Additionally, you can configure it to forward additional header data that identifies the user that initiated the traffic. This additional header data lets you create per-user traffic rules. To access this setting, click Policies > Integrations, open the policy, and click WSS Traffic Redirection. Scans quickly handle a large number of threats on heavily infected computers: When manual scans and Auto-Protect scans detect a large number of threats on a client computer, the scans can quickly process the threats. This aggressive mode starts when the computer has a minimum of 100 viruses. The default action for these detections is Delete. This aggressive mode does not process spyware. You do not configure this feature; it runs automatically.Management server featuresSymantec VIP two-factor authentication and smart card authentication for Symantec Endpoint Protection Manager: You can now use two additional types of authentication for Symantec Endpoint Protection Manager administrator accounts: Two-factor authentication (2FA) with Symantec VIP: When two-factor authentication is enabled, you must provide a unique, one-time verification code as well as a password when you log on to Symantec Endpoint Protection Manager. You can receive the code by voice, text, or with the free Symantec VIP Access application. Smart card authentication: You can configure Symantec Endpoint Protection Manager to log on administrators who use a Personal Identity Verification (PIV) card or a Common Access Card (CAC). Smart cards are used for administrators who work for US Federal Agencies or a US military agency. With PIV/CAC authentication, you insert the card into the reader and provide a PIN number. New communications module: A new communications module replaces the existing protocol. Both modules still use sylink.xml to establish a management connection between Symantec Endpoint Protection Manager and the client. The new communications module works with both IPv6 and IPv4 addresses, and communicates with Windows, Mac, and Linux clients. Password requirements are stronger: When you install the management server or configure the management server, you must set a strong password for the system administrator account. The password must contain at least 8 characters and fewer than 16 characters. It must include at least one lowercase letter [a-z], one uppercase letter [A-Z], one numeric character [0-9], and one special character ["/ \ [ ] : ; | = , + * ? ]. Updates for FIPS 140-2 compliance: Symantec Endpoint Protection 14.2 updates third-party components and validated modules to ensure continued compliance for data encryption with Federal Information Processing Standardization (FIPS) 140-2. Symantec Endpoint Protection 14.2 lets FIPS 140-2-compliant environments access cloud features. LiveUpdate downloads content for the Application Control engine: To patch problems with an operating system such as Windows 10, LiveUpdate now downloads content for the Application Control engine for 14.2 Windows clients. To
2025-04-07From the dashboard. Additionally, create a Twilio Conversation API Service and obtain the Service SID. You need to use this data while configuring SMS verification methods for 2FA on Symantec Encryption Management Server Administrative Console. For more information, see the Twilio Documentation portal. Administrators configure verification methods for 2FA on Symantec Encryption Management Server Administrative ConsoleAdministrators can configure and enable 2FA and verification methods from the Administration Console and allow their Web Email Protection users to use email, or email and SMS as a multi-factor authentication method to log in to the Web Email Protection interface. To enable 2FA and verification methods, administrators need to perform the following steps:On the Administration Console, navigate to Services > Web Email Protection > the Options tab > click Edit. The Two-Factor Authentication is disabled, by default.On the Edit Web Email Protection Options page, select Enable Two-factor Authentication. By default, the email-based verification is enabled. The email-based verification method cannot be disabled when Two-factor Authentication is enabled.(Optional) To enable SMS-based verification, select SMS. If you select Clickatell, enter the API Key.If you select Twilio, enter the Account SID, Auth Token, and Service SID.Click Save.Navigate to Services > Web Email Protection > the Options tab to verify that the Two-factor Authentication is enabled for the verification methods that you configured.Web Email Protection users register and verify their phone numbers for SMS-based verification on the WEP settings page, if SMS is one of the verification methodsAs administrators configure and enable 2FA, Web Email Protection users can opt for a 2FA verification method within their account settings, where they have the flexibility to choose between receiving authentication codes via SMS or email. The email-based verification method involves generating a time-sensitive one-time password code (TOTP) that is sent to the user's email. The SMS-based verification involves generating a time-sensitive code (TOTP) that is sent to the user's registered mobile device. This adds an extra layer of security beyond the regular login credentials. Authentication (2FA) system operates with the following default time intervals: Code Generation Interval Validity: When a new code is generated, it is valid for 10 minutes. Beyond 10 minutes, the code expires. Resend Code Interval: In case you haven't received the initial 2FA code or need to request another code, note that the resend functionality operates on a 30-second interval. You may request a new code after the previous one expires, typically within this time frame.
2025-04-01Web Email Protection users can use the two-factor authentication (2FA) feature for greater account security. The Two-factor Authentication (2FA) provides both SMS-based verification and email-based verification. This security measure adds an extra layer of protection to Web Email Protection user accounts by requiring them to enter a Time-based One-Time Password (TOTP) before gaining access to the WEP interface. To implement 2FA and protect Web Email Protection user accounts, the following is the order of the workflow: Administrators determine a verification method strategy—only email, or email and SMSAdministrators register and set up SMS-based verification with an SMS provider if SMS is one of the verification methods.Administrators configure verification methods for 2FA on Symantec Encryption Management Server Administrative ConsoleWeb Email Protection users register and verify their phone numbers for SMS-based verification on the Web Email Protection Settings page, if SMS is one of the verification methods. Administrators determine a verification method strategy—only email, or email and SMSThe choice between using only email or a combination of email and SMS for two-factor authentication (2FA) depends on various factors, including security requirements, user convenience, associated costs, and regulatory compliance requirements of your organization. A combination of both email and SMS for 2FA is recommended to provide a balance between security and user convenience while mitigating the risks associated with each method. Therefore, you may review your organization’s requirements, consult with your security administration, and determine a verification method strategy that best suits your security requirements.Administrators register and set up SMS-based verification with an SMS provider if SMS is one of the verification methodsAt a high level, setting up SMS-based verification for two-factor authentication (2FA) involves creating and registering an account with the supported SMS provider service, such as Clickatell or Twilio. Ensure that you allow the URL and URL over port 443 for 2FA to work. Clickatell: If you decide to use the Clickatell SMS service, you must create a Clickatell account, and then generate an API key. You need to use the API key while configuring SMS verification methods for 2FA on Symantec Encryption Management Server Administrative Console. For more information, see the Getting started with SMS topic available on the Clickatell Documentation portal.Twilio: If you decide to use the Twilio SMS service, you must create a Twilio account, and then obtain Account SID, Auth Token, and Service SID. Once you register on Twilio, log in and obtain Account SID and Auth Token
2025-04-21Comparison to Symantec VIP Access Manager?Yubico YubiKey is considered economical with lower upfront costs and favorable ROI due to robust performance and minimal maintenance needs. Symantec VIP Access Manager carries higher initial setup costs but justifies this with substantial value from its features, providing satisfactory ROI for those willing to invest more initially. To learn more, read our detailed Symantec VIP Access Manager vs. Yubico YubiKey Report (Updated: March 2025).Review summaries and opinionsCategories and RankingSymantec VIP Access ManagerRanking in Authentication Systems15thRanking in other categoriesAccess Management (15th)Ranking in Authentication Systems7thRanking in other categoriesPasswordless Authentication (4th), Multi-Factor Authentication (MFA) (2nd)Mindshare comparisonAs of March 2025, in the Authentication Systems category, the mindshare of Symantec VIP Access Manager is 1.7%, down from 2.7% compared to the previous year. The mindshare of Yubico YubiKey is 9.6%, down from 10.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.Featured ReviewsQuotes from MembersProsConsPricing and Cost AdviceUse our free recommendation engine to learn which Authentication Systems solutions are best for your needs.841,302 professionals have used our research since 2012.Top IndustriesCompany SizeQuestions from the CommunityComparisonsProduct ReportsAlso Known AsOverviewSample Customers Find out what your peers are saying about Symantec VIP Access Manager vs. Yubico YubiKey and other solutions. Updated: March 2025.841,302 professionals have used our research since 2012.See our Symantec VIP Access Manager vs. Yubico YubiKey report. We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
2025-04-2421.04Global MFA ManagementSymantec VIP global MFA settingsAt the global level, configure the Symantec Validation and ID Protection (VIP) token. Users can use a Symantec VIP token to authenticate into a resource.You can limit the use of this MFA method in a policy.PrerequisitesImport the trusted certificate into the certificate store on the Identity Platform server.Trusted certificate must have read-only access permissions to:IIS AppPool\SecureAuth0poolNetwork serviceGlobally configure Symantec VIP tokenOn the left side of the Identity Platform page, click Multi-Factor Methods.Click the pencil icon for Symantec VIP.The configuration page for Symantec VIP appears.To enable or disable the global Symantec VIP multi-factor method, slide the toggle On or Off.In the Configuration mode section, set any of the following configurations.Timed passcodeWhen the Symantec VIP multi-factor method toggle is On, it enables the option users to receive a timed passcode on a Symantec VIP token.Issued Certificate Serial NumberThe certificate serial number provided by Symantec.NoteFor the certificate permissions, see the Prerequisites at the beginning of this topic. Host WhitelistBy default, two allowed URLs are included. You can add or modify URL entries.Symantec VIP FieldIndicate whether to show or hide the Symantec VIP field on the login page.Click Save.Next stepsConfigure a policy on the Multi-Factor Methods tab to allow users to authenticate using Symantec VIP tokens in the login workflow.
2025-04-17