![symantec endpoint protection download update symantec endpoint protection download update](https://it.stonybrook.edu/sites/default/files/kb/5248/images/open-symantec-mac.png)
Use the tables below to determine where and how to install this add-on in a distributed deployment of Splunk Enterprise or any deployment for which you are using forwarders to get your data in. If you need step-by-step instructions on how to install an add-on in your specific deployment environment, see the installation walkthroughs section at the bottom of this page for links to installation instructions specific to a single-instance deployment, distributed deployment, or Splunk Cloud. Perform any prerequisite steps before installing, if required and specified in the tables below.
![symantec endpoint protection download update symantec endpoint protection download update](https://pcwonderland.com/wp-content/uploads/2020/09/Symantec-Endpoint-Protection-14.3.1169.0100-Free-Download-3.jpg)
Determine where and how to install this add-on in your deployment, using the tables on this page.Get the Splunk Add-on for Symantec Endpoint Protection by downloading it from or browsing to it using the app browser within Splunk Web.This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.Install the Splunk Add-on for Symantec Endpoint Protection Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity.At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats. Follow a multi-layered approach to security.Keep all operating systems and applications current with vendor patches.
![symantec endpoint protection download update symantec endpoint protection download update](https://higherlogicdownload.s3.amazonaws.com/BROADCOM/SymantecInlineImages/sc_forum-3349321-files_symantec1.jpg)
![symantec endpoint protection download update symantec endpoint protection download update](https://i.pinimg.com/originals/8b/0e/ea/8b0eea1a5cdecb892876a8418bdbd3a2.png)
Symantec Endpoint Protection Manager, prior to 14.3, has a race condition in client remote deployment which may result in an elevation of privilege on the remote machine. Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to a directory traversal attack that could allow a remote actor to determine the size of files in the directory. Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program. Symantec Endpoint Protection Manager (SEPM) Symantec, A Division of Broadcom has released updates to address issues that were discovered in the Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Manager (SEPM) products.