Jump to content

All Activity

This stream auto-updates

  1. Past hour
  2. Today
  3. even after uninstalling Adguard VPN still ESET can't block the website and it does not show ESET SSL certificate.
  4. Yesterday
  5. It's not very clear what exactly are you asking about, an example with a screenshot would help us to better understand your problem. Based on this I think you want to keep the detection, but automatically resolve it? If that's the case, MarkAsResolved action may be the thing you are looking for. Check the rule Common Misconfigurations or Recurring Detections [X9803] as an example on how to use the MarkAsResolved action.
  6. I tested Adguard with enabling Wintun as instructed and still ESET can't detect the phishing link also, once I connected to Adguard VPN for once ESET can't detect the phishing link anymore even when I disconnect the VPN and closed Adguard VPN app.
  7. Some detections are tied to this "system" process, which is not real process, it's more of a placeholder for anything that originates in the kernel. These are just warning severity alerts and are prone to being on the nosier side. Unless you can see any value in the detection I suggest to also exclude it. It's a common mistake to be overly careful when creating exclusions. Alert fatigue from spammy detections is a bigger security risk than any coverage gaps you're likely to introduce with this specific exclusion.
  8. You could use loki to ingest syslogs from ESET Protect which will also sends messages about Inspect detections. However I've not tried this setup myself.
  9. hello when i push an updated version of the antivirus or it's auto updated by policy users get a popup to reboot but how they can get popup again if they ignore the reboot my users are not good at rebooting cannot force it since they can lose opened stuff. Thanks
  10. Please carry on as follows: Enable advanced logging under Help and support -> Technical support Reproduce the issue Stop logging Collect logs with ESET Log Collector and upload the generated archive here.
  11. The verification email was sent to the license owner's email address saxxxxxxxxxro@sxxo.pt who must click the verification link to enable you to add the license to your ESET HOME account.
  12. What about using a filter like this in the report?
  13. So with the lack of response from Eset I assume it is not possible to exclude this file from the cloud and have it unblock the file? Exclude from submission in Liveguard does absolutely nothing.
  14. I purchased an ESET Internet Security key and added it to my ESET account. The page then asks me to confirm via email. But the email never arrived. The license's status is currently pending verification. My license ID is 3B3-FUB-JA7 Help me as soon as possible
  15. Ever since updating to the new NOD32 17.1.9.0 last night my VPN which is hide.me can't connect until I either disable NOD32 temporarily or disable the Network Traffic Scanner, once it is connected and I enable NOD32 the VPN will continue to work but the initial connection doesn't happen anymore until NOD32 is disabled or the Network Traffic Scanner is diabled. I have also added the VPN to the exclusions and also allowed it in the web access under excluded apps
  16. It appears that you have attempted to add a misused Afghan license in your ESET HOME account. Please purchase a license from an authorized ESET distributor or reseller.
  17. Since we could not find any issue in the attached logs, please raise a support ticket. A logging version of the Safe banking and payment module will need to be installed to get more information.
  18. ESET is a reputable security company that has been on the market for more than 30 years already. Out products do not perform any malicious actions nor do contain a remote control function. Even the remote management agent cannot control the machine and merely maintenance connection between Endpoint and the ESET PROTECT server. Also running a script cannot be considered malicious unless the script is malicious. Many legitimate programs and also Windows itself may run script for legitimate purposes. The best would be if you could provide some screenshots for illustration but I'm sure there must be some misunderstanding of what you were seeing.
  19. During agent replication the connection is initiated by agent on clients, not by the ESET PROTECT server.
  20. hello we see applications version but not the agent version i need a report to know what pc i need to update agent version Thanks
  21. I had found some unknown files on my PC leading me to investigate. Upon doing so it was obvious to me remote access has been used to gain entry into my pc. Inspection of event logs shows ESET to have done a full scan of my pc. The next logged event was seconds after the scan had finished and shows that ESET ran a script
  22. Good Morning, I was wondering if anyone could point me in the right direction. We've recently setup Zscaler ZPA/ZIA which allows machines to remotely access on-prem resources (such as our ESET Protect server) The system allows connections to originate from the client to the server, but not the other way around. Is ESET Endpoint Security(the agent) not compatible with this type of setup? Do ESET protect connections always originate from the server? Thanks!
  23. Hello, I have activated the vunerability management on all my machines and I have also set the autmatic patch policy but I see that nothing is automatically corrected. See the attached image. Do you have any solutions? Thanks
  1. Load more activity
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up
×
×
  • Create New...