One-time Norton Live Services expire 30 days after your purchase date. Each Norton Live Service is subject to acceptance of Symantec's Norton Live Service Terms & Conditions.Conduit process update the spam definition via HTTPS (port 443) from https://aztec.brightmail.com, there can be several reasons spam definitions can not be updated. In In control center, [Administration] - [Services] tab check that the status of "Conduit" is running. Perform the following commands: nslookup aztec.In case DNS server is not properly configured or any reason the name resolution service is not available, the spam definition update will fail.
telnet aztec.443 aztec.server does not respond to ping so only way we can check if has valid connection to the server is issuing telnet connection to the 443 port.
if this steps fails, problem can be any device blocking your SBG connecting to the aztec.server.
Further check should be performed on proxy server, Firewall. As we confirm Spam Def update from control center, there is a possibility that the control center is not displaying the updated information.
To verify that, restart the control center service and check the spam definition again in 10 minutes. Also there could be possibilities that the download spam definition is corrupted and the newly downloaded definition can not be rolled out.
From CLI issuing the following command to delete the spam definitions in the system and revert it factory status.
Then restart conduit service again to trigger the spam definition update. Finally if nothing above works, set the conduit log level to debug and check the log for specific reasons.Traditional signature and heuristic file scanning engines form the backbone of Symantec’s security solutions; these engines use dozens of techniques to scan files for both known as well as unknown threats.Technologies designed to block attacks just as they transition from the network cable or wireless network to the computer, before they have a chance to establish residency in a physical file on a user’s computer. Behavioral-based protection technology observes actively running threats on your computer and can terminate running programs if they exhibit malicious behaviors; this technology provides proactive protection from entirely new, previously unseen attacks. Introducing the smartest way to protect your enterprise by blocking advanced threats, detecting stealthy anomalies, and remediating them with one click.We give you real-time visibility into your risk posture. It is recommended to bypass the proxy for internal communication: In Internet Options, under Connections, choose LAN settings.