Jump to content

Leaderboard

Popular Content

Showing content with the most kudos since 08/31/2017 in Posts

  1. The ESET Knowledgebase YouTube Channel celebrates its 10-year anniversary today! https://www.youtube.com/user/ESETKnowledgebase/community Check out the infographic for our lifetime YouTube statistics for the channel. The ESET Knowledgebase channel includes step-by-step video tutorials demonstrating the key processes and features of our ESET products, from ESET NOD32 Antivirus and ESET Internet Security to business products like ESET Security Management Center. In addition, our channel is yet another way for our customers to reach us with feedback and questions. We make e
    5 points
  2. False positive reports To submit a possible False Positive see Submit a suspicious website / potential false positive / potential miscategorization by Parental control to ESET for analysis when you wish to submit via email or use Submit sample for analysis function from the program GUI of ESET product installed on your computer. Whitelisting ESET does provide a whitelisting service for software vendors by which you can submit your software to minimize the chances of false positives, e.g., when your software is being downloaded. This service is intended as preventive measure for t
    5 points
  3. Hello, this option is already available in ESET Cloud Administrator console. Currently, as agents are updated via "Components upgrade task", which does not differentiate between agents, and other components of the ESMC infrastructure (server / webconsole) this option was disabled. However, in Cloud the server is fully hosted / maintained by ESET, so "one click agent updates" are possible. Please note, that for the future releases we work on "automatic agent upgrades", meaning agents would automatically upgrade themselves to the version compatible / matching with the server.
    4 points
  4. Welcome to the ESET Security Forum! ESET is pleased to provide you with this resource in order to make it easy for you to ask questions and receive answers about ESET's products and services. Understand that the ESET Security Forum is a private community for existing customers of ESET, prospective customers who are interested in ESET's software, ESET employees and business partners. Because of this focus, it is not like a general public forum, where conversations take place on a variety of non-ESET and non-security related topics. With that in mind, we have the follow
    4 points
  5. Hello guys, thank you for your feedback. We will add Bitwarden to the list of whitelisted extensions that can be loaded in the protected browser. Regards, Tomas
    3 points
  6. It's been more than 5 years I've use ESET software on my computer and ESET is the best for me. here are some reasons I still use this Boy: Inexpensive Easy-to-use interface Good malware protection Secure browser for online payments Fast scans Lots of useful extra features Small system-performance impact File encryption, hardened browser extension, webcam protection What else do you need for your security? for me having a VPN access is the one but it's not a big problem. I very much appreciate your support ESET.
    3 points
  7. I think this is resolved in just-released ESMC 7.2 where it look like this:
    3 points
  8. Description: Color code failing tasks Detail: The server used to color code the tasks that are failing. I'm running the latest ESMC, and now, that doesn't happen, and I have a hard time figuring out which tasks are failing. Is there a way to color code it again, or where can I see it? All I get is a generic email saying: "At least one client task has invalid configuration and therefore will fail."
    3 points
  9. Actually advanced users love the ability to customize numerous settings. Common users don't need to go to the advanced setup at all since ESET products provide well-balanced protection out of the box.
    3 points
  10. @AStevens.SHG Hello, Concerning the more options in the reports, some of the changes are going to be introduced, but not all of them. However, we are planning a bigger redesign for the future version, which might make it simpler. Other requests are tracked in the feature backlog (authentication screen changes, AD sync changes, and export of data from "computers screen") and I believe that some of them will be done in the future versions (not in the 7.0, but into the future releases). I can´t comment now about details, as we are still scoping, and setting up the road-map plans. But y
    3 points
  11. Hello, thank you for the feedback. I have positive news for you - we are continuously improving the ways how reports are built & are adding further filtering options in the soon to be released version. So the filter by action is added in the upcoming version & you are also able to filter out some entries from the "installed applications" report, by choosing condition "is not one of" (screenshots attached).
    3 points
  12. Nice thread, I have tens of comments to ERA server / functions. ERA is not user friendly in most cases.... I will post something. Description: Dynamic groups rules / tasks Detail: I would like to be able to show all rules/tasks linked to dynamic groups. Or to be able to find where rules are linked. I would love to disable group/rules instead of only delete or edit them to dysfunction it. It is nearly imposible to read ties. Description: task history deletion / filter and so on Detail: I would like to be able to delete (mass delete) task history. I have
    3 points
  13. As introduced here (KB News) and here (KB Alerts), I am unpinning those threads and replacing with this one. We now have RSS/email subscriptions for News, Alerts, and Customer Advisories. Information and instructions to subscribe is available here: Subscribe to ESET Knowledgebase Support News, Alerts and Customer Advisories
    3 points
  14. I've tried many AVs and kept moving in the past unhappy with them but once I switched to eset I've never looked back. Doesn't hog the system, good detection and good support
    2 points
  15. Marcos

    Deleting Ransomware Notes

    Making the ransomware note undetected was already considered and pros substantially outweighted cons.
    2 points
  16. The product in question is correctly classified as PUA since they don't adhere to good practices.
    2 points
  17. Kvako

    ESMC MSP API Problem

    Hi, You're almost there, just need to put a single word Bearer in front of the access token (separated by a space) When using swagger - after you receive an access token, you can Authorize by clicking Authorize button on the top with Bearer {{----token----}} written into text field Using API directly, your call should look like this curl -X GET "https://mspapi.eset.com/api/User/Current" -H "accept: application/json" -H "Authorization: Bearer eyJgbGciOiJSUzI1NiIsImtpZCI6ImU1WTdkMGJEUGtORmFDV094VWlBaUU5MDBDbyIsInR5cCI6IkpXVCIsIng1dCI6ImU1WTdkMGJEUGtORmFDV094VWlBaUU5MDBDbyJ9.e
    2 points
  18. Duplicate topic, we'll draw it to a close. The discussion can continue in the original topic.
    2 points
  19. itman

    License issue

    You need to contact whomever you purchased the license from to straighten this out.
    2 points
  20. mmm999

    Mac OS 11 Big Sur

    A lot of people coming here to this thread - just to see posts about version for big sur. We are waiting
    2 points
  21. Please remove already blue micro-hints from EES. Very annoying. There is no option to disable them. Leave them for home users.
    2 points
  22. Thanks for letting us know. First part is considered as an issue and should be targeted. Second part will be discussed as an possible improvements, which seems to be legit.
    2 points
  23. Besides edf.eset.com, it's also important that clients can connect to pki.eset.com as well to perform activation.
    2 points
  24. Hello @Zen11t, thank you very much for your explanation again. It helps us to understand your needs better. I hope this trick will help you You can filter the computers with an outdated version of agents and then click on any item in the table and select "In computer page (all)". It will navigate you to the computers section, where you will have only computers with outdated agents, and here you can also check the last connection status.
    2 points
  25. The initial scan run after installation scans all files on local disks and cleans detected files. While malware, adware and riskware is cleaned automatically, potentially unwanted and unsafe applications require the user to select an action at the end of the scan. We've run a test and files were cleaned and quarantined alright. Please collect logs with ESET Log Collector and upload the generated archive here for perusal.
    2 points
  26. Rendekovic

    EFDE Monitoring

    Hi @Mr.Gains you are right, reports are in the works currently. we are panning to offer reporting (more or less) in this scope: Computers not eligible for encryption Computers eligible for encryption EFDE not installed Computers eligible for encryption. EFDE installed AND disk not encrypted Computers with encryption in progress Computers encrypted Computers encrypted using TPM chip Computers encrypted using OPAL 2.0 Computers encrypted via FileVault2 (future) Computers with boot disk only encrypted Computers with all disks
    2 points
  27. Sanctions U.S.: https://www.state.gov/iran-sanctions/ U.K.: https://www.gov.uk/guidance/sanctions-on-iran EU and UN sanctions: https://www.consilium.europa.eu/en/policies/sanctions/iran/ Slovakia where Eset is headquartered is both an EU and UN member.
    2 points
  28. William Zujkowski

    Mac OS 11 Big Sur

    Hello @Peter Randziak, Thank you for following up! Sounds good, I will bump this again in a month or so to check on it's status and hopefully remind you. William
    2 points
  29. Marcos

    RanSim test

    It would be easy if ransomware actually worked like the simulator but since there are numerous ways how to encrypt files, actual malware usually works differently. Moreover, the simulator won't encrypt your own files plus it's relatively already widespread which are another factors that substantially affect detection.
    2 points
  30. Actually aggressive vs balanced settings affect only detection, not scanning and currently affect mainly Augur detection only. We plan to make further optimizations to reduce scan times.
    2 points
  31. I am 100% there with you, I am now disappointed that you make the effort to test the software, report the errors found to the German support and all reported errors in the final, or so-called final, in my eyes nothing more than a very bad beta version is to find again + to find the errors of the previous build again, if this continues with Eset, I will also consider whether I should pay for it and that although I am an absolute Eset I'm a fan and have been using it since NOD v2, I am really very disappointed!
    2 points
  32. Marcos

    ESMC Auto Upgrade

    ESMC is a complex mission-critical product and it's important for administrators that it runs reliably all the time. Upgrade should be performed after backing up the database and at the time when administrators can afford to solve possible issues should something go haywire during upgrade. Likewise administrators do not let server systems upgrade automatically and immediately after the OS maker releases updates not addressing critical vulnerabilities.
    2 points
  33. Do you have libappindicator1 installed?
    2 points
  34. Since you are in the official ESET forum, the answer is clear Anyways, it's a good practice also to try various products to find out if a particular AV works alright on your machine. It can happen that an AV with excellent results in tests causes performance issues in your environment and vice-versa. Should you encounter an issue while trialing ESET, you can ask here for assistance.
    2 points
  35. Hi, a quick update to this older thread. With the upcoming update of the Archive support module (v1303, currently on pre-release servers) it should be now possible to remove macros from office documents in incoming emails, even in previously released Mail security products. If you define a custom rule with Attachment type condition, select "Office files/Generic OLE2 Compound Document", and choose Quarantine attachment (or Delete attachment) as an action, Office documents will be delivered without any macros. Note: you can of course combine additional conditions in the rule
    2 points
  36. Mitchell

    Microsoft Teams issues

    Seems that creating the following rule is sufficient: Name: Allow Teams Helper App: /Applications/Microsoft Teams.app/Contents/Frameworks/Microsoft Teams Helper.app Action: Allow Direction: In Protocol: TCP & UDP Ports: Remote Remote Port: All Destination: Entire internet
    2 points
  37. Marcos

    Microsoft Teams issues

    Does creating a permissive bi-directional firewall rule for the following app help? /Applications/Microsoft Teams.app/Contents/Frameworks/Microsoft Teams Helper.app
    2 points
  38. It is very simple. Use SetThreadExecutionState. See: link to Microsoft Windows Dev Center.
    2 points
  39. Description: Prevent sleep during scan. Detail: Windows can put the computer to sleep before the scan is finished. That is very annoying. There should be an option to prevent that from happening. Oops, it's a coincidence that @zeromido asked someting similar here right above. Before I started typing, I first searched the forum for "scan prevent sleep".
    2 points
  40. It's not that big deal in my opinion @nonamelab, It's a way to bring more people to use ESET and in the same time giving the person who invited the other person who doesn't use ESET , a month of usage or more I don't remember exactly.
    2 points
  41. Welcome to the official ESET Security Forum! While here, you can ask questions or give feedback about ESET products and services, receive prompt answers from qualified support technicians and interact with the ESET community. Before posting, check out the video below and read the Rules of the ESET Security Forum VIDEO: If you get stuck, please check out our dedicated FAQ section and Help section.
    2 points
  42. Description: A "Reset to Default" option for different parts of the ERA. Detail: This one has mainly been discovered due to my own fault. There are many things that can be played with within ERA which is great, however I think there are some of us that might play a little too much and then get to a point where we've changed so much of something that it doesn't work or doesn't give you what you want. For areas such as reports and policies, it might be a good idea to have a button that you can click while editing that restores the default values. That way, if you play around too much
    2 points
  43. Greetings from Australia. My name is Chris, retired Electronics Engineer. I have been using ESET products for many years and am well satisfied with the protection they give me. I am a bit of a "tinkerer" and have 4 installations Windows 7-32, Windows 8-32 , Windows 10-32 and 64 on the one machine. being able to boot into an old version of Windows for recovery procedures has "saved my bacon" a few time when things went awry or got too scrambled in W10 which I use most of the time. An interesting fact about me ?? Nothing exciting ! I am a traveller, ha
    2 points
  44. This will change as of ESMC (ERA v7) in the way that handled threats will be resolved automatically.
    2 points
  45. Description: Individual firewall rule hit count. Detail: Similar to hardware firewalls, it would be nice to see a hit count, packets matched, kind of information per individual firewall rule in Endpoint protection, also for that information (similar to above requests) to be visible in ERA, and total of the hits across all clients with the same rule. So we can generate reports, this makes it easier to find rules no longer being used and can be removed safely.
    2 points
  46. I have checked this with the developers, and we are going to change the behavior in V7. If you select "only computers", all of the computers under "DN" will be synced, not only direct parent ones. So it should behave according to your expectations. With regards to the "users", what is the usecase for you? For what do you use the? Do you manually create linking between users & devices, or use the user variables in policies for Endpoint or MDM?
    2 points
  47. @fchelp You can open the individual task entry in Admin / Client tasks, by the little "+" expand button, and then toggle a context menu for individual entry. You can remove individual triggers, or eventually even edit targets. Screenshot attached. In the next version (7.0) we will be adding possibility to save a filter set, for a various conditions (un-managed computers, computers without security product installed, computers with a specific security product version ...). You will then get the filtered view on top of all computers by few clicks. However, you won´t be able to automate
    2 points
  48. Hi Team, Description: Example REST API usage with Perl / Python Detail: An example document on how to use the API with Perl would be helpful you have one using C however I would just like to create a few script based calls to it using Perl for use with Nagios and other systems I have to integrate further with our other tools. Description: Failure Details inside Web Interface, Detail: Most of the time when a task fails it provides hardly any details why I need to follow the rabbit hole to the trace log, Description: Slackware Linux Support /+ Native
    2 points
  49. Description: More information in system cleaner Detail: I have mentioned this previously. System cleaner is the new tool in version 11 that alerts you to system settings that have been changed from default the idea being that they could have been changed by malware. The issue is they give no information on the actual setting just the type of setting. I tested this feature by clicking to change settings hoping I would be shown the changes and able to make a decision. What would make more sense is having a way to see the actual changes and a way to ignore certain changes that the
    2 points
  50. Description: Eset sysrescue linux based. Detail: I feel that Eset should offer a linux based sysrescue as well as the windows one. some malware does not allow windows discs to boot properly and this would solve the issue. Linux based rescue discs can offer wireless updating as well as Ethernet which would be good for laptops.
    2 points
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up
×
×
  • Create New...